<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/cybersecurity-tech-brief-by-hackernoon" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Cybersecurity Tech Brief By HackerNoon</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/cybersecurity-tech-brief-by-hackernoon</itunes:new-feed-url>
    <description>Learn the latest Cybersecurity updates in the tech world.</description>
    <copyright>© 2026 HackerNoon</copyright>
    <podcast:guid>3e0a12e0-e122-57f3-a237-35abc384a93c</podcast:guid>
    <podcast:locked owner="marcos@hackernoon.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Fri, 27 Mar 2026 10:49:55 -0700</pubDate>
    <lastBuildDate>Fri, 27 Mar 2026 10:51:18 -0700</lastBuildDate>
    <link>https://hackernoon.com/c/cybersecurity</link>
    <image>
      <url>https://img.transistorcdn.com/FGIwueC9IDCZTR6LxgKkyddWnFNh4fbI5rAnEZblWk8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQxMjY2LzE2ODM1/ODIzNTYtYXJ0d29y/ay5qcGc.jpg</url>
      <title>Cybersecurity Tech Brief By HackerNoon</title>
      <link>https://hackernoon.com/c/cybersecurity</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>HackerNoon</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/FGIwueC9IDCZTR6LxgKkyddWnFNh4fbI5rAnEZblWk8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQxMjY2LzE2ODM1/ODIzNTYtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>Learn the latest Cybersecurity updates in the tech world.</itunes:summary>
    <itunes:subtitle>Learn the latest Cybersecurity updates in the tech world..</itunes:subtitle>
    <itunes:keywords>cybersecurity, cyber, security, hacker, hackernoon, cyber security, tech, cybersecurity brief, tech brief </itunes:keywords>
    <itunes:owner>
      <itunes:name>HackerNoon</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>The Secure Force: Building an End-to-End SDLC Without Breaking the Bank</title>
      <itunes:title>The Secure Force: Building an End-to-End SDLC Without Breaking the Bank</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e0905af7-ec2f-42a7-927f-d64efb6a2a23</guid>
      <link>https://share.transistor.fm/s/8e9b2230</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank">https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank</a>.
            <br> Secure your SDLC without breaking the bank. Learn phase-wise security practices and open-source tools nonprofits can use to build safer, resilient software.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/nonprofits">#nonprofits</a>, <a href="https://hackernoon.com/tagged/sdlc-phases">#sdlc-phases</a>, <a href="https://hackernoon.com/tagged/secure-software-development">#secure-software-development</a>, <a href="https://hackernoon.com/tagged/end-to-end-sdlc">#end-to-end-sdlc</a>, <a href="https://hackernoon.com/tagged/sdlc">#sdlc</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Stop treating security as an afterthought. Learn how to integrate it into every phase of the SDLC—requirements, design, development, testing, deployment, and maintenance—using practical, low-cost open-source tools to build safer, more resilient software.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank">https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank</a>.
            <br> Secure your SDLC without breaking the bank. Learn phase-wise security practices and open-source tools nonprofits can use to build safer, resilient software.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/nonprofits">#nonprofits</a>, <a href="https://hackernoon.com/tagged/sdlc-phases">#sdlc-phases</a>, <a href="https://hackernoon.com/tagged/secure-software-development">#secure-software-development</a>, <a href="https://hackernoon.com/tagged/end-to-end-sdlc">#end-to-end-sdlc</a>, <a href="https://hackernoon.com/tagged/sdlc">#sdlc</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Stop treating security as an afterthought. Learn how to integrate it into every phase of the SDLC—requirements, design, development, testing, deployment, and maintenance—using practical, low-cost open-source tools to build safer, more resilient software.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 12 Feb 2026 08:00:33 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/8e9b2230/10ae1353.mp3" length="5598912" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9m6iiYdaRESAOM6jtshukNIbIKU-_KlhWmoExswqMC0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNzU2/Yzg1MWExYzQ4Yzc2/NzgwZTdlMmVmOWQz/MThhMS5qcGVn.jpg"/>
      <itunes:duration>700</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank">https://hackernoon.com/the-secure-force-building-an-end-to-end-sdlc-without-breaking-the-bank</a>.
            <br> Secure your SDLC without breaking the bank. Learn phase-wise security practices and open-source tools nonprofits can use to build safer, resilient software.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/nonprofits">#nonprofits</a>, <a href="https://hackernoon.com/tagged/sdlc-phases">#sdlc-phases</a>, <a href="https://hackernoon.com/tagged/secure-software-development">#secure-software-development</a>, <a href="https://hackernoon.com/tagged/end-to-end-sdlc">#end-to-end-sdlc</a>, <a href="https://hackernoon.com/tagged/sdlc">#sdlc</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Stop treating security as an afterthought. Learn how to integrate it into every phase of the SDLC—requirements, design, development, testing, deployment, and maintenance—using practical, low-cost open-source tools to build safer, more resilient software.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cyber-security,open-source,nonprofits,sdlc-phases,secure-software-development,end-to-end-sdlc,sdlc,software-development</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Myth of “Unhackable” Biometrics (and What Attackers Actually Try)</title>
      <itunes:title>The Myth of “Unhackable” Biometrics (and What Attackers Actually Try)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b445839c-01a6-4395-8a37-9adb74c10d7d</guid>
      <link>https://share.transistor.fm/s/fe844751</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try">https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try</a>.
            <br> Biometrics feel unhackable—until you learn how spoofing works. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/biometrics">#biometrics</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/security-research">#security-research</a>, <a href="https://hackernoon.com/tagged/biometric-spoofing">#biometric-spoofing</a>, <a href="https://hackernoon.com/tagged/face-id-spoofing">#face-id-spoofing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybersafetyzone386">@cybersafetyzone386</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybersafetyzone386">@cybersafetyzone386's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Biometric authentication isn’t unhackable. Researchers continue to find ways to spoof Face ID and fingerprint systems, but real-world attacks usually combine technical tricks with social engineering. Biometrics remain effective when used as part of layered security — not as a standalone defense.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try">https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try</a>.
            <br> Biometrics feel unhackable—until you learn how spoofing works. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/biometrics">#biometrics</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/security-research">#security-research</a>, <a href="https://hackernoon.com/tagged/biometric-spoofing">#biometric-spoofing</a>, <a href="https://hackernoon.com/tagged/face-id-spoofing">#face-id-spoofing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybersafetyzone386">@cybersafetyzone386</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybersafetyzone386">@cybersafetyzone386's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Biometric authentication isn’t unhackable. Researchers continue to find ways to spoof Face ID and fingerprint systems, but real-world attacks usually combine technical tricks with social engineering. Biometrics remain effective when used as part of layered security — not as a standalone defense.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 12 Feb 2026 08:00:30 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/fe844751/f6f6ca02.mp3" length="2928000" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HjQcPiSobdIpcPOggAXtSYEobud-KuvSGy2eVYCpZlo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NTEx/ODRiNzRiMjFjYTgx/MWE0MDc4Mjc4ODVl/YjJlZS5wbmc.jpg"/>
      <itunes:duration>366</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try">https://hackernoon.com/the-myth-of-unhackable-biometrics-and-what-attackers-actually-try</a>.
            <br> Biometrics feel unhackable—until you learn how spoofing works. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/biometrics">#biometrics</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/security-research">#security-research</a>, <a href="https://hackernoon.com/tagged/biometric-spoofing">#biometric-spoofing</a>, <a href="https://hackernoon.com/tagged/face-id-spoofing">#face-id-spoofing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybersafetyzone386">@cybersafetyzone386</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybersafetyzone386">@cybersafetyzone386's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Biometric authentication isn’t unhackable. Researchers continue to find ways to spoof Face ID and fingerprint systems, but real-world attacks usually combine technical tricks with social engineering. Biometrics remain effective when used as part of layered security — not as a standalone defense.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,biometrics,authentication,privacy,infosec,security-research,biometric-spoofing,face-id-spoofing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing the Digital Nerve System: A Practical Guide to Implementing Zero Trust API Security</title>
      <itunes:title>Securing the Digital Nerve System: A Practical Guide to Implementing Zero Trust API Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95e00b3b-fc79-438b-962d-15558862f643</guid>
      <link>https://share.transistor.fm/s/84920c06</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security">https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security</a>.
            <br> Learn how Zero Trust secures APIs, prevents breaches, and ensures every request is verified in modern microservices and cloud environments. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cloud-computing">#cloud-computing</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/microservices">#microservices</a>, <a href="https://hackernoon.com/tagged/oauth2">#oauth2</a>, <a href="https://hackernoon.com/tagged/mtls">#mtls</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                APIs are the backbone of modern enterprises, connecting services, data, and business logic across microservices and cloud environments. Traditional perimeter-based security is no longer enough, as remote work, cloud adoption, and constant machine-to-machine communication blur internal and external boundaries. Zero Trust shifts the security model from “trust but verify” to “never trust, always verify,” treating every API request as potentially malicious. By enforcing strong identity verification through OAuth2, OpenID Connect, and mTLS, and applying granular authorization with attribute-based access control and JWT scopes, organizations can ensure that only the right entities access the right resources. API gateways and policy enforcement points provide centralized control, logging, and rate-limiting, while micro-segmentation and continuous inspection prevent lateral movement and detect anomalies in real time. Implementing Zero Trust requires collaboration across development, security, and operations teams but results in resilient, secure APIs that protect sensitive data, limit risk, and enable business agility.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security">https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security</a>.
            <br> Learn how Zero Trust secures APIs, prevents breaches, and ensures every request is verified in modern microservices and cloud environments. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cloud-computing">#cloud-computing</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/microservices">#microservices</a>, <a href="https://hackernoon.com/tagged/oauth2">#oauth2</a>, <a href="https://hackernoon.com/tagged/mtls">#mtls</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                APIs are the backbone of modern enterprises, connecting services, data, and business logic across microservices and cloud environments. Traditional perimeter-based security is no longer enough, as remote work, cloud adoption, and constant machine-to-machine communication blur internal and external boundaries. Zero Trust shifts the security model from “trust but verify” to “never trust, always verify,” treating every API request as potentially malicious. By enforcing strong identity verification through OAuth2, OpenID Connect, and mTLS, and applying granular authorization with attribute-based access control and JWT scopes, organizations can ensure that only the right entities access the right resources. API gateways and policy enforcement points provide centralized control, logging, and rate-limiting, while micro-segmentation and continuous inspection prevent lateral movement and detect anomalies in real time. Implementing Zero Trust requires collaboration across development, security, and operations teams but results in resilient, secure APIs that protect sensitive data, limit risk, and enable business agility.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 11 Feb 2026 08:00:54 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/84920c06/852e3033.mp3" length="5136192" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tEHVpsG2F9qyx_Y3Zbhb3Cc4FUUyWVTeWSU2J6yqHRA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNWY5/ZThlNjdhNjhiZDYw/NTJmZTM1NDkxMmYx/MTc0MC5qcGVn.jpg"/>
      <itunes:duration>643</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security">https://hackernoon.com/securing-the-digital-nerve-system-a-practical-guide-to-implementing-zero-trust-api-security</a>.
            <br> Learn how Zero Trust secures APIs, prevents breaches, and ensures every request is verified in modern microservices and cloud environments. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cloud-computing">#cloud-computing</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/microservices">#microservices</a>, <a href="https://hackernoon.com/tagged/oauth2">#oauth2</a>, <a href="https://hackernoon.com/tagged/mtls">#mtls</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                APIs are the backbone of modern enterprises, connecting services, data, and business logic across microservices and cloud environments. Traditional perimeter-based security is no longer enough, as remote work, cloud adoption, and constant machine-to-machine communication blur internal and external boundaries. Zero Trust shifts the security model from “trust but verify” to “never trust, always verify,” treating every API request as potentially malicious. By enforcing strong identity verification through OAuth2, OpenID Connect, and mTLS, and applying granular authorization with attribute-based access control and JWT scopes, organizations can ensure that only the right entities access the right resources. API gateways and policy enforcement points provide centralized control, logging, and rate-limiting, while micro-segmentation and continuous inspection prevent lateral movement and detect anomalies in real time. Implementing Zero Trust requires collaboration across development, security, and operations teams but results in resilient, secure APIs that protect sensitive data, limit risk, and enable business agility.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>zero-trust-security,cybersecurity,cloud-computing,devsecops,cyber-security,microservices,oauth2,mtls</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>One Identity Appoints Gihan Munasinghe as Chief Technology Officer</title>
      <itunes:title>One Identity Appoints Gihan Munasinghe as Chief Technology Officer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">80ea369e-e787-4355-a8dc-5be46c77744c</guid>
      <link>https://share.transistor.fm/s/4e3a7cd0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer">https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer</a>.
            <br> He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Ident <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gihan Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Identity and the identity security industry,” said Munasing he.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer">https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer</a>.
            <br> He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Ident <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gihan Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Identity and the identity security industry,” said Munasing he.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 08:00:34 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/4e3a7cd0/b76a8f02.mp3" length="1605696" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0Ab8pvueLij5Cj27JO9IUu2dSTsA-Vf55iYjurkMGq8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmVi/Mjc4MmUwNTljODBk/NTdiZTAzYjZiY2M1/YzUyOS5qcGVn.jpg"/>
      <itunes:duration>201</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer">https://hackernoon.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer</a>.
            <br> He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Ident <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gihan Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. He specializes in scaling global engineering teams and modernizing complex legacy platforms to drive product innovation. “This is a pivotal moment for One Identity and the identity security industry,” said Munasing he.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,cybernewswire,press-release,cyber-security-awareness,cybercrime,cybersecurity-awareness,cyber-attack,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Next Generation of Cybersecurity Protection for Healthcare</title>
      <itunes:title>The Next Generation of Cybersecurity Protection for Healthcare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">575d4ca8-6bab-4758-ac0d-fdcac7445b13</guid>
      <link>https://share.transistor.fm/s/d0222dc2</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare">https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare</a>.
            <br> Mohammed Nayeem pioneers AI-driven cybersecurity and hospital-specific frameworks, protecting clinical systems, devices, and patient lives worldwide. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/healthcare-cybersecurity">#healthcare-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-anomaly-detection-hospitals">#ai-anomaly-detection-hospitals</a>, <a href="https://hackernoon.com/tagged/clinical-it-security-framework">#clinical-it-security-framework</a>, <a href="https://hackernoon.com/tagged/patient-safety-cybersecurity">#patient-safety-cybersecurity</a>, <a href="https://hackernoon.com/tagged/hybrid-data-corruption-attacks">#hybrid-data-corruption-attacks</a>, <a href="https://hackernoon.com/tagged/predictive-hospital-security">#predictive-hospital-security</a>, <a href="https://hackernoon.com/tagged/medical-device-security">#medical-device-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Mohammed Nayeem transforms healthcare cybersecurity, developing AI anomaly detection platforms and hospital-specific security frameworks that reduce response times from hours to minutes, secure medical devices, and protect patient data. His proactive approach integrates security into clinical workflows, preventing ransomware, hybrid data attacks, and operational shutdowns while safeguarding patient safety at scale.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare">https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare</a>.
            <br> Mohammed Nayeem pioneers AI-driven cybersecurity and hospital-specific frameworks, protecting clinical systems, devices, and patient lives worldwide. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/healthcare-cybersecurity">#healthcare-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-anomaly-detection-hospitals">#ai-anomaly-detection-hospitals</a>, <a href="https://hackernoon.com/tagged/clinical-it-security-framework">#clinical-it-security-framework</a>, <a href="https://hackernoon.com/tagged/patient-safety-cybersecurity">#patient-safety-cybersecurity</a>, <a href="https://hackernoon.com/tagged/hybrid-data-corruption-attacks">#hybrid-data-corruption-attacks</a>, <a href="https://hackernoon.com/tagged/predictive-hospital-security">#predictive-hospital-security</a>, <a href="https://hackernoon.com/tagged/medical-device-security">#medical-device-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Mohammed Nayeem transforms healthcare cybersecurity, developing AI anomaly detection platforms and hospital-specific security frameworks that reduce response times from hours to minutes, secure medical devices, and protect patient data. His proactive approach integrates security into clinical workflows, preventing ransomware, hybrid data attacks, and operational shutdowns while safeguarding patient safety at scale.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 08:00:31 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d0222dc2/06a010e4.mp3" length="2624256" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bv752qrSZMbsqNwsVIYXGwlcc_t-ykclRsfo-VFwqZA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTYw/NTVhYTBiMTBiNDEz/MmVjOWUyOWEwNjU0/YmZmYy5wbmc.jpg"/>
      <itunes:duration>329</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare">https://hackernoon.com/the-next-generation-of-cybersecurity-protection-for-healthcare</a>.
            <br> Mohammed Nayeem pioneers AI-driven cybersecurity and hospital-specific frameworks, protecting clinical systems, devices, and patient lives worldwide. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/healthcare-cybersecurity">#healthcare-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-anomaly-detection-hospitals">#ai-anomaly-detection-hospitals</a>, <a href="https://hackernoon.com/tagged/clinical-it-security-framework">#clinical-it-security-framework</a>, <a href="https://hackernoon.com/tagged/patient-safety-cybersecurity">#patient-safety-cybersecurity</a>, <a href="https://hackernoon.com/tagged/hybrid-data-corruption-attacks">#hybrid-data-corruption-attacks</a>, <a href="https://hackernoon.com/tagged/predictive-hospital-security">#predictive-hospital-security</a>, <a href="https://hackernoon.com/tagged/medical-device-security">#medical-device-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Mohammed Nayeem transforms healthcare cybersecurity, developing AI anomaly detection platforms and hospital-specific security frameworks that reduce response times from hours to minutes, secure medical devices, and protect patient data. His proactive approach integrates security into clinical workflows, preventing ransomware, hybrid data attacks, and operational shutdowns while safeguarding patient safety at scale.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>healthcare-cybersecurity,ai-anomaly-detection-hospitals,clinical-it-security-framework,patient-safety-cybersecurity,hybrid-data-corruption-attacks,predictive-hospital-security,medical-device-security,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The AI Arms Race (Offense vs Defense)</title>
      <itunes:title>The AI Arms Race (Offense vs Defense)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">57f3878f-8a19-4e16-aea9-543d9b8a7fa4</guid>
      <link>https://share.transistor.fm/s/dd4ddcc1</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ai-arms-race-offense-vs-defense">https://hackernoon.com/the-ai-arms-race-offense-vs-defense</a>.
            <br> Welcome to the AI arms race. It's been happening for years, and the data confirms what security professionals feared: most organizations are on the losing side. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-defense">#ai-defense</a>, <a href="https://hackernoon.com/tagged/ai-arms-race">#ai-arms-race</a>, <a href="https://hackernoon.com/tagged/ai-security-awareness">#ai-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-cyber-security">#ai-cyber-security</a>, <a href="https://hackernoon.com/tagged/ai-cyber-threats">#ai-cyber-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjaligopinadhan">@anjaligopinadhan</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjaligopinadhan">@anjaligopinadhan's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Check Point's Cyber Security Report 2026 shows 70% increase in cyber attacks since 2023. 60% of executives reported their organizations faced AI-powered attacks, but only 7% had deployed AI defenses at scale. Moody's 2026 cyber outlook warns that AI-related threats will "become more prevalent and pronounced"
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ai-arms-race-offense-vs-defense">https://hackernoon.com/the-ai-arms-race-offense-vs-defense</a>.
            <br> Welcome to the AI arms race. It's been happening for years, and the data confirms what security professionals feared: most organizations are on the losing side. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-defense">#ai-defense</a>, <a href="https://hackernoon.com/tagged/ai-arms-race">#ai-arms-race</a>, <a href="https://hackernoon.com/tagged/ai-security-awareness">#ai-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-cyber-security">#ai-cyber-security</a>, <a href="https://hackernoon.com/tagged/ai-cyber-threats">#ai-cyber-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjaligopinadhan">@anjaligopinadhan</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjaligopinadhan">@anjaligopinadhan's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Check Point's Cyber Security Report 2026 shows 70% increase in cyber attacks since 2023. 60% of executives reported their organizations faced AI-powered attacks, but only 7% had deployed AI defenses at scale. Moody's 2026 cyber outlook warns that AI-related threats will "become more prevalent and pronounced"
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 04 Feb 2026 08:01:12 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/dd4ddcc1/e3f75e00.mp3" length="7768512" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/c4YL6k2WcjeKcwFy_WNkbZOX4ev9ej1ZBCrxdStB-NA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTI1/Njk3MzE3NDEwN2E1/MWUwYWI3ZWI5MmI1/MTE3Ny5qcGVn.jpg"/>
      <itunes:duration>972</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ai-arms-race-offense-vs-defense">https://hackernoon.com/the-ai-arms-race-offense-vs-defense</a>.
            <br> Welcome to the AI arms race. It's been happening for years, and the data confirms what security professionals feared: most organizations are on the losing side. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-defense">#ai-defense</a>, <a href="https://hackernoon.com/tagged/ai-arms-race">#ai-arms-race</a>, <a href="https://hackernoon.com/tagged/ai-security-awareness">#ai-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-cyber-security">#ai-cyber-security</a>, <a href="https://hackernoon.com/tagged/ai-cyber-threats">#ai-cyber-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjaligopinadhan">@anjaligopinadhan</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjaligopinadhan">@anjaligopinadhan's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Check Point's Cyber Security Report 2026 shows 70% increase in cyber attacks since 2023. 60% of executives reported their organizations faced AI-powered attacks, but only 7% had deployed AI defenses at scale. Moody's 2026 cyber outlook warns that AI-related threats will "become more prevalent and pronounced"
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,artificial-intelligence,ai-security,ai-defense,ai-arms-race,ai-security-awareness,ai-cyber-security,ai-cyber-threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Keycloak Client-Aware Access Control</title>
      <itunes:title>Keycloak Client-Aware Access Control</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">05ca4258-a8d4-48af-b859-5c89c8be0d20</guid>
      <link>https://share.transistor.fm/s/1896f6a1</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/keycloak-client-aware-access-control">https://hackernoon.com/keycloak-client-aware-access-control</a>.
            <br> Keycloak's realm model allows any user in a realm to authenticate any registered client. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/keycloak">#keycloak</a>, <a href="https://hackernoon.com/tagged/keycloak-authentication">#keycloak-authentication</a>, <a href="https://hackernoon.com/tagged/aware-access-control">#aware-access-control</a>, <a href="https://hackernoon.com/tagged/opensource-identity-management">#opensource-identity-management</a>, <a href="https://hackernoon.com/tagged/access-management-solution">#access-management-solution</a>, <a href="https://hackernoon.com/tagged/access-management">#access-management</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/erindeji">@erindeji</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/erindeji">@erindeji's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Keycloak's realm model allows any user in a realm to authenticate any registered client.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/keycloak-client-aware-access-control">https://hackernoon.com/keycloak-client-aware-access-control</a>.
            <br> Keycloak's realm model allows any user in a realm to authenticate any registered client. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/keycloak">#keycloak</a>, <a href="https://hackernoon.com/tagged/keycloak-authentication">#keycloak-authentication</a>, <a href="https://hackernoon.com/tagged/aware-access-control">#aware-access-control</a>, <a href="https://hackernoon.com/tagged/opensource-identity-management">#opensource-identity-management</a>, <a href="https://hackernoon.com/tagged/access-management-solution">#access-management-solution</a>, <a href="https://hackernoon.com/tagged/access-management">#access-management</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/erindeji">@erindeji</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/erindeji">@erindeji's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Keycloak's realm model allows any user in a realm to authenticate any registered client.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 04 Feb 2026 08:01:10 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/1896f6a1/1ffbe81c.mp3" length="3417600" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PcgCsUvZ7Ath29tG4I3rMV1vCBnZYp91JTLlDXxJ_6g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZDhk/NzRmNTc1OTQ1YWI0/N2JiYTkyNWZjOWIz/Yjk3OC5wbmc.jpg"/>
      <itunes:duration>428</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/keycloak-client-aware-access-control">https://hackernoon.com/keycloak-client-aware-access-control</a>.
            <br> Keycloak's realm model allows any user in a realm to authenticate any registered client. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/keycloak">#keycloak</a>, <a href="https://hackernoon.com/tagged/keycloak-authentication">#keycloak-authentication</a>, <a href="https://hackernoon.com/tagged/aware-access-control">#aware-access-control</a>, <a href="https://hackernoon.com/tagged/opensource-identity-management">#opensource-identity-management</a>, <a href="https://hackernoon.com/tagged/access-management-solution">#access-management-solution</a>, <a href="https://hackernoon.com/tagged/access-management">#access-management</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/erindeji">@erindeji</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/erindeji">@erindeji's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Keycloak's realm model allows any user in a realm to authenticate any registered client.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,keycloak,keycloak-authentication,aware-access-control,opensource-identity-management,access-management-solution,access-management,authentication</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How GenAI Security Engineer Chetan Pathade Is Protecting the Next Era of AI</title>
      <itunes:title>How GenAI Security Engineer Chetan Pathade Is Protecting the Next Era of AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">432f39c7-7ff6-4c35-9b12-5600d1ea6adc</guid>
      <link>https://share.transistor.fm/s/c4a2dce4</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai">https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai</a>.
            <br> Chetan Pathade, GenAI Security Engineer, protects AI systems from adversarial attacks, data leaks, and cloud vulnerabilities at enterprise scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/genai-security-engineer">#genai-security-engineer</a>, <a href="https://hackernoon.com/tagged/llm-model-protection">#llm-model-protection</a>, <a href="https://hackernoon.com/tagged/cloud-security-ai-2026">#cloud-security-ai-2026</a>, <a href="https://hackernoon.com/tagged/adversarial-ai-threats">#adversarial-ai-threats</a>, <a href="https://hackernoon.com/tagged/prompt-injection-defense">#prompt-injection-defense</a>, <a href="https://hackernoon.com/tagged/cybersecurity-leadership-ai">#cybersecurity-leadership-ai</a>, <a href="https://hackernoon.com/tagged/chetan-pathade-aws-security">#chetan-pathade-aws-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Chetan Pathade, a GenAI Security Engineer at AWS, secures AI systems and cloud infrastructure against data leaks, adversarial attacks, and emerging cyber threats. From bug bounty beginnings to advanced LLM protection, Pathade blends practical skill, academic rigor, and continuous learning to safeguard enterprises while preparing the next generation of cybersecurity talent.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai">https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai</a>.
            <br> Chetan Pathade, GenAI Security Engineer, protects AI systems from adversarial attacks, data leaks, and cloud vulnerabilities at enterprise scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/genai-security-engineer">#genai-security-engineer</a>, <a href="https://hackernoon.com/tagged/llm-model-protection">#llm-model-protection</a>, <a href="https://hackernoon.com/tagged/cloud-security-ai-2026">#cloud-security-ai-2026</a>, <a href="https://hackernoon.com/tagged/adversarial-ai-threats">#adversarial-ai-threats</a>, <a href="https://hackernoon.com/tagged/prompt-injection-defense">#prompt-injection-defense</a>, <a href="https://hackernoon.com/tagged/cybersecurity-leadership-ai">#cybersecurity-leadership-ai</a>, <a href="https://hackernoon.com/tagged/chetan-pathade-aws-security">#chetan-pathade-aws-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Chetan Pathade, a GenAI Security Engineer at AWS, secures AI systems and cloud infrastructure against data leaks, adversarial attacks, and emerging cyber threats. From bug bounty beginnings to advanced LLM protection, Pathade blends practical skill, academic rigor, and continuous learning to safeguard enterprises while preparing the next generation of cybersecurity talent.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 03 Feb 2026 08:00:35 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c4a2dce4/c461e299.mp3" length="2540544" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4sJDFhYqgFO7TeuzHAvojGCjlWcVMJsD8tW3bms_cUI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZDI3/ZTliNjk5M2IzYzhi/YWNkYzUzNzdjOTI5/M2M1MS5qcGVn.jpg"/>
      <itunes:duration>318</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai">https://hackernoon.com/how-genai-security-engineer-chetan-pathade-is-protecting-the-next-era-of-ai</a>.
            <br> Chetan Pathade, GenAI Security Engineer, protects AI systems from adversarial attacks, data leaks, and cloud vulnerabilities at enterprise scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/genai-security-engineer">#genai-security-engineer</a>, <a href="https://hackernoon.com/tagged/llm-model-protection">#llm-model-protection</a>, <a href="https://hackernoon.com/tagged/cloud-security-ai-2026">#cloud-security-ai-2026</a>, <a href="https://hackernoon.com/tagged/adversarial-ai-threats">#adversarial-ai-threats</a>, <a href="https://hackernoon.com/tagged/prompt-injection-defense">#prompt-injection-defense</a>, <a href="https://hackernoon.com/tagged/cybersecurity-leadership-ai">#cybersecurity-leadership-ai</a>, <a href="https://hackernoon.com/tagged/chetan-pathade-aws-security">#chetan-pathade-aws-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Chetan Pathade, a GenAI Security Engineer at AWS, secures AI systems and cloud infrastructure against data leaks, adversarial attacks, and emerging cyber threats. From bug bounty beginnings to advanced LLM protection, Pathade blends practical skill, academic rigor, and continuous learning to safeguard enterprises while preparing the next generation of cybersecurity talent.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>genai-security-engineer,llm-model-protection,cloud-security-ai-2026,adversarial-ai-threats,prompt-injection-defense,cybersecurity-leadership-ai,chetan-pathade-aws-security,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Ephemerality Is a Stronger Privacy Primitive Than Encryption Alone</title>
      <itunes:title>Why Ephemerality Is a Stronger Privacy Primitive Than Encryption Alone</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8015213f-6b2d-42fd-bf70-4b50c6e96378</guid>
      <link>https://share.transistor.fm/s/6f86fac3</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone">https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone</a>.
            <br> Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/browsers">#browsers</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/ephemerality">#ephemerality</a>, <a href="https://hackernoon.com/tagged/privacy-primitive">#privacy-primitive</a>, <a href="https://hackernoon.com/tagged/digital-privacy">#digital-privacy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/akshat666">@akshat666</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/akshat666">@akshat666's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone">https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone</a>.
            <br> Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/browsers">#browsers</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/ephemerality">#ephemerality</a>, <a href="https://hackernoon.com/tagged/privacy-primitive">#privacy-primitive</a>, <a href="https://hackernoon.com/tagged/digital-privacy">#digital-privacy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/akshat666">@akshat666</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/akshat666">@akshat666's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 03 Feb 2026 08:00:32 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6f86fac3/9f7d9696.mp3" length="2937408" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3B7KGdpQXNcmJpcZ12X1TsW81yfLjo5Vbaa-kYoBSJo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNDE1/ODk1YTgyY2UzODc2/MTIwNGQwNDY3NDJh/ZDhhNy5qcGVn.jpg"/>
      <itunes:duration>368</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone">https://hackernoon.com/why-ephemerality-is-a-stronger-privacy-primitive-than-encryption-alone</a>.
            <br> Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/browsers">#browsers</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/ephemerality">#ephemerality</a>, <a href="https://hackernoon.com/tagged/privacy-primitive">#privacy-primitive</a>, <a href="https://hackernoon.com/tagged/digital-privacy">#digital-privacy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/akshat666">@akshat666</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/akshat666">@akshat666's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Why ephemerality beats encryption alone for privacy: a technical deep dive into data lifecycles, threat models, and modern privacy-preserving architectures. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,privacy,security,browsers,encryption,ephemerality,privacy-primitive,digital-privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Outlook vs. Gmail: Choosing the Kind of Email Security Your Business Can Live With</title>
      <itunes:title>Outlook vs. Gmail: Choosing the Kind of Email Security Your Business Can Live With</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e9ee7194-a64f-4531-acf3-8ad1e7f14c26</guid>
      <link>https://share.transistor.fm/s/c6e7b3ed</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with">https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with</a>.
            <br> Outlook and Gmail are both secure, but built differently. See how control, compliance, and risk management compare for business email in 2025. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/email-security">#email-security</a>, <a href="https://hackernoon.com/tagged/it-security">#it-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-security">#outlook-vs-gmail-security</a>, <a href="https://hackernoon.com/tagged/business-email-security">#business-email-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-for-business">#outlook-vs-gmail-for-business</a>, <a href="https://hackernoon.com/tagged/microsoft-365-security">#microsoft-365-security</a>, <a href="https://hackernoon.com/tagged/google-workspace-security">#google-workspace-security</a>, <a href="https://hackernoon.com/tagged/secure-business-email">#secure-business-email</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Both Outlook and Gmail offer strong business email security in 2025, but Outlook favors granular control and compliance, while Gmail prioritizes simplicity and low-maintenance protection.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with">https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with</a>.
            <br> Outlook and Gmail are both secure, but built differently. See how control, compliance, and risk management compare for business email in 2025. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/email-security">#email-security</a>, <a href="https://hackernoon.com/tagged/it-security">#it-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-security">#outlook-vs-gmail-security</a>, <a href="https://hackernoon.com/tagged/business-email-security">#business-email-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-for-business">#outlook-vs-gmail-for-business</a>, <a href="https://hackernoon.com/tagged/microsoft-365-security">#microsoft-365-security</a>, <a href="https://hackernoon.com/tagged/google-workspace-security">#google-workspace-security</a>, <a href="https://hackernoon.com/tagged/secure-business-email">#secure-business-email</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Both Outlook and Gmail offer strong business email security in 2025, but Outlook favors granular control and compliance, while Gmail prioritizes simplicity and low-maintenance protection.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 02 Feb 2026 08:00:49 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c6e7b3ed/288cb4a2.mp3" length="8716800" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wZKUdxLO36UEJM3W55qxHkt1viSk2NERxmbSWojyQzo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNWUx/MjA1Y2UxNzMzMWI0/ZmM3NDFjODMxMDhk/NTE3MS5wbmc.jpg"/>
      <itunes:duration>1090</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with">https://hackernoon.com/outlook-vs-gmail-choosing-the-kind-of-email-security-your-business-can-live-with</a>.
            <br> Outlook and Gmail are both secure, but built differently. See how control, compliance, and risk management compare for business email in 2025. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/email-security">#email-security</a>, <a href="https://hackernoon.com/tagged/it-security">#it-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-security">#outlook-vs-gmail-security</a>, <a href="https://hackernoon.com/tagged/business-email-security">#business-email-security</a>, <a href="https://hackernoon.com/tagged/outlook-vs-gmail-for-business">#outlook-vs-gmail-for-business</a>, <a href="https://hackernoon.com/tagged/microsoft-365-security">#microsoft-365-security</a>, <a href="https://hackernoon.com/tagged/google-workspace-security">#google-workspace-security</a>, <a href="https://hackernoon.com/tagged/secure-business-email">#secure-business-email</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Both Outlook and Gmail offer strong business email security in 2025, but Outlook favors granular control and compliance, while Gmail prioritizes simplicity and low-maintenance protection.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>email-security,it-security,outlook-vs-gmail-security,business-email-security,outlook-vs-gmail-for-business,microsoft-365-security,google-workspace-security,secure-business-email</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Beyond Smartphones: Motorola's Pivot to IoT Security and Smart Home Surveillance</title>
      <itunes:title>Beyond Smartphones: Motorola's Pivot to IoT Security and Smart Home Surveillance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">744a93c4-0a82-47dd-aa87-f9a8a5f0edc7</guid>
      <link>https://share.transistor.fm/s/755c613f</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance">https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance</a>.
            <br> Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iot-security">#iot-security</a>, <a href="https://hackernoon.com/tagged/iot-applications">#iot-applications</a>, <a href="https://hackernoon.com/tagged/mobile">#mobile</a>, <a href="https://hackernoon.com/tagged/mobile-app-development">#mobile-app-development</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/smart-home-surveillance">#smart-home-surveillance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ASmith">@ASmith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ASmith">@ASmith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance">https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance</a>.
            <br> Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iot-security">#iot-security</a>, <a href="https://hackernoon.com/tagged/iot-applications">#iot-applications</a>, <a href="https://hackernoon.com/tagged/mobile">#mobile</a>, <a href="https://hackernoon.com/tagged/mobile-app-development">#mobile-app-development</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/smart-home-surveillance">#smart-home-surveillance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ASmith">@ASmith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ASmith">@ASmith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 31 Jan 2026 08:00:39 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/755c613f/685d398d.mp3" length="3339264" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ej19sZOccT2wKqv5csTgyiQnGaLivnH2ZfL7DG7p9-o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMDAx/MTNlNGI3M2Q3Y2Mw/ODcyNjQ1N2ZiNjA1/MTA1Ny5qcGVn.jpg"/>
      <itunes:duration>418</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance">https://hackernoon.com/beyond-smartphones-motorolas-pivot-to-iot-security-and-smart-home-surveillance</a>.
            <br> Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iot-security">#iot-security</a>, <a href="https://hackernoon.com/tagged/iot-applications">#iot-applications</a>, <a href="https://hackernoon.com/tagged/mobile">#mobile</a>, <a href="https://hackernoon.com/tagged/mobile-app-development">#mobile-app-development</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/smart-home-surveillance">#smart-home-surveillance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ASmith">@ASmith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ASmith">@ASmith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Examine Motorola’s pivot to IoT security and smart home surveillance. We highlight key features and infrastructure to decode what's important in home safety. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>iot-security,iot-applications,mobile,mobile-app-development,cybersecurity,cybercrime,cyber-threats,smart-home-surveillance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The DDoS of Human Attention: Why cURL Killed Its Bug Bounty (And What It Means for DevOps)</title>
      <itunes:title>The DDoS of Human Attention: Why cURL Killed Its Bug Bounty (And What It Means for DevOps)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5f048d87-ae74-46c1-897a-f38ca0ef466b</guid>
      <link>https://share.transistor.fm/s/308ed613</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops">https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops</a>.
            <br> AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-slop">#ai-slop</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/ddos-of-human-attention">#ddos-of-human-attention</a>, <a href="https://hackernoon.com/tagged/curl">#curl</a>, <a href="https://hackernoon.com/tagged/command-line-tool">#command-line-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/omotayojude">@omotayojude</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/omotayojude">@omotayojude's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops">https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops</a>.
            <br> AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-slop">#ai-slop</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/ddos-of-human-attention">#ddos-of-human-attention</a>, <a href="https://hackernoon.com/tagged/curl">#curl</a>, <a href="https://hackernoon.com/tagged/command-line-tool">#command-line-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/omotayojude">@omotayojude</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/omotayojude">@omotayojude's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 31 Jan 2026 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/308ed613/46f74917.mp3" length="2889984" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/f6fYnq55a9YaYbY1z-gEB27F-4474xZKfnBjLFTVDc4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYmQ3/NmZjZWQ0MmZlMjU2/MmJjYmEwY2Q2MzQw/OTdkNC5qcGVn.jpg"/>
      <itunes:duration>362</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops">https://hackernoon.com/the-ddos-of-human-attention-why-curl-killed-its-bug-bounty-and-what-it-means-for-devops</a>.
            <br> AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-slop">#ai-slop</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/open-source">#open-source</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/ddos-of-human-attention">#ddos-of-human-attention</a>, <a href="https://hackernoon.com/tagged/curl">#curl</a>, <a href="https://hackernoon.com/tagged/command-line-tool">#command-line-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/omotayojude">@omotayojude</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/omotayojude">@omotayojude's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI-gen "slop" is killing bug bounties. Learn why cURL shut down its program and how to protect your team from the new DDoS: the flood of low-quality AI noise.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-slop,devops,open-source,bug-bounty,ddos-of-human-attention,curl,command-line-tool</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero-Trust Security in 2026: A Complete Implementation Roadmap for CTOs</title>
      <itunes:title>Zero-Trust Security in 2026: A Complete Implementation Roadmap for CTOs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fccbcf52-5591-46dc-9859-d09bfb3aa11d</guid>
      <link>https://share.transistor.fm/s/d56ef793</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos">https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos</a>.
            <br> Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/roadmap">#roadmap</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cto">#cto</a>, <a href="https://hackernoon.com/tagged/2026">#2026</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/zero-trust-security-in-2026">#zero-trust-security-in-2026</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mahipal.nehra">@mahipal.nehra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mahipal.nehra">@mahipal.nehra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. As AI systems become deeply embedded into business workflows, organizations must rethink how they protect sensitive data and automated decision pipelines.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos">https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos</a>.
            <br> Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/roadmap">#roadmap</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cto">#cto</a>, <a href="https://hackernoon.com/tagged/2026">#2026</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/zero-trust-security-in-2026">#zero-trust-security-in-2026</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mahipal.nehra">@mahipal.nehra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mahipal.nehra">@mahipal.nehra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. As AI systems become deeply embedded into business workflows, organizations must rethink how they protect sensitive data and automated decision pipelines.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 30 Jan 2026 08:01:01 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d56ef793/dafddbfd.mp3" length="9499200" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fJg8siCG1ugaGr9eIUeV0Y6m_07-Wb2oPJb95t1ZGGQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZjQx/ZmYxYjE4NWI4NWM4/NDAyNDdhM2EyNTNi/Y2NmZS5qcGVn.jpg"/>
      <itunes:duration>1188</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos">https://hackernoon.com/zero-trust-security-in-2026-a-complete-implementation-roadmap-for-ctos</a>.
            <br> Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/roadmap">#roadmap</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cto">#cto</a>, <a href="https://hackernoon.com/tagged/2026">#2026</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/zero-trust-security-in-2026">#zero-trust-security-in-2026</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mahipal.nehra">@mahipal.nehra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mahipal.nehra">@mahipal.nehra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust Security focuses on not believing on any user, any device or anyone even if they are in your network perimeter. As AI systems become deeply embedded into business workflows, organizations must rethink how they protect sensitive data and automated decision pipelines.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,roadmap,zero-trust-security,cto,2026,software-development,zero-trust-security-in-2026,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Understanding Testing vs. Evaluation in AI Systems</title>
      <itunes:title>Understanding Testing vs. Evaluation in AI Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">813b5726-59bb-4f9f-8040-a26da64ce19a</guid>
      <link>https://share.transistor.fm/s/75c977cb</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems">https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems</a>.
            <br> The distinction between testing and evaluation in AI systems <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/ai-systems">#ai-systems</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/testing-ai-systems">#testing-ai-systems</a>, <a href="https://hackernoon.com/tagged/security-testing">#security-testing</a>, <a href="https://hackernoon.com/tagged/best-testing-practices">#best-testing-practices</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI systems introduce complexity: behaviors emerge from training rather than explicit programming. Many companies and organizations building AI systems, especially AI agents, run into problems. They focus heavily on evaluations while neglecting systematic testing.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems">https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems</a>.
            <br> The distinction between testing and evaluation in AI systems <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/ai-systems">#ai-systems</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/testing-ai-systems">#testing-ai-systems</a>, <a href="https://hackernoon.com/tagged/security-testing">#security-testing</a>, <a href="https://hackernoon.com/tagged/best-testing-practices">#best-testing-practices</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI systems introduce complexity: behaviors emerge from training rather than explicit programming. Many companies and organizations building AI systems, especially AI agents, run into problems. They focus heavily on evaluations while neglecting systematic testing.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 08:00:36 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/75c977cb/26e25500.mp3" length="2687616" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/T5E72mdkDomCe5oEKQhHDtongFlU0c0gZ-pBGtTO1Zw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYmZi/ZDE0MmIwZTI4NzE0/NDFlY2YwMzVlNDY3/MTQ5OS5qcGVn.jpg"/>
      <itunes:duration>336</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems">https://hackernoon.com/understanding-testing-vs-evaluation-in-ai-systems</a>.
            <br> The distinction between testing and evaluation in AI systems <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/ai-systems">#ai-systems</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/testing-ai-systems">#testing-ai-systems</a>, <a href="https://hackernoon.com/tagged/security-testing">#security-testing</a>, <a href="https://hackernoon.com/tagged/best-testing-practices">#best-testing-practices</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                AI systems introduce complexity: behaviors emerge from training rather than explicit programming. Many companies and organizations building AI systems, especially AI agents, run into problems. They focus heavily on evaluations while neglecting systematic testing.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ai-security,ai-agent,ai-systems,ai-red-teaming,artificial-intelligence,testing-ai-systems,security-testing,best-testing-practices</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>OWASP Top 10: The Security Stuff You Keep Meaning to Learn</title>
      <itunes:title>OWASP Top 10: The Security Stuff You Keep Meaning to Learn</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4db76222-bd90-4573-b4e1-7fec39966331</guid>
      <link>https://share.transistor.fm/s/62c3eb94</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn">https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn</a>.
            <br> A practical, plain-English guide to the OWASP Top 10—what they mean, how they show up in real apps, and where to start fixing them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/owasp-top-10">#owasp-top-10</a>, <a href="https://hackernoon.com/tagged/broken-access-control">#broken-access-control</a>, <a href="https://hackernoon.com/tagged/security-misconfiguration">#security-misconfiguration</a>, <a href="https://hackernoon.com/tagged/server-side-request-forgery">#server-side-request-forgery</a>, <a href="https://hackernoon.com/tagged/injection-attacks">#injection-attacks</a>, <a href="https://hackernoon.com/tagged/insecure-application-design">#insecure-application-design</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                OWASP is a nonprofit that publishes a Top 10 list of security breaches. The list reflects what's actually hurting organizations right now. Broken access control is at the top for a reason. Insecure design is the problem.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn">https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn</a>.
            <br> A practical, plain-English guide to the OWASP Top 10—what they mean, how they show up in real apps, and where to start fixing them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/owasp-top-10">#owasp-top-10</a>, <a href="https://hackernoon.com/tagged/broken-access-control">#broken-access-control</a>, <a href="https://hackernoon.com/tagged/security-misconfiguration">#security-misconfiguration</a>, <a href="https://hackernoon.com/tagged/server-side-request-forgery">#server-side-request-forgery</a>, <a href="https://hackernoon.com/tagged/injection-attacks">#injection-attacks</a>, <a href="https://hackernoon.com/tagged/insecure-application-design">#insecure-application-design</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                OWASP is a nonprofit that publishes a Top 10 list of security breaches. The list reflects what's actually hurting organizations right now. Broken access control is at the top for a reason. Insecure design is the problem.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 08:00:34 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/62c3eb94/a8d7a019.mp3" length="3339648" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Srfq_3SZ3-clmpeVC6glzrTtEHi_LMCIXxdCliWAIYc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yY2Ni/ZDc2Y2Y2MDEwODZj/ZTc1ZTk4MjA4NDM3/ZmY1Yy5qcGVn.jpg"/>
      <itunes:duration>418</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn">https://hackernoon.com/owasp-top-10-the-security-stuff-you-keep-meaning-to-learn</a>.
            <br> A practical, plain-English guide to the OWASP Top 10—what they mean, how they show up in real apps, and where to start fixing them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/owasp-top-10">#owasp-top-10</a>, <a href="https://hackernoon.com/tagged/broken-access-control">#broken-access-control</a>, <a href="https://hackernoon.com/tagged/security-misconfiguration">#security-misconfiguration</a>, <a href="https://hackernoon.com/tagged/server-side-request-forgery">#server-side-request-forgery</a>, <a href="https://hackernoon.com/tagged/injection-attacks">#injection-attacks</a>, <a href="https://hackernoon.com/tagged/insecure-application-design">#insecure-application-design</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                OWASP is a nonprofit that publishes a Top 10 list of security breaches. The list reflects what's actually hurting organizations right now. Broken access control is at the top for a reason. Insecure design is the problem.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>web-security,owasp,owasp-top-10,broken-access-control,security-misconfiguration,server-side-request-forgery,injection-attacks,insecure-application-design</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Class For Mom Part 2: Cybersecurity</title>
      <itunes:title>A Class For Mom Part 2: Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">520e759e-47d5-4a78-bf91-add286ec784f</guid>
      <link>https://share.transistor.fm/s/903f9370</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-class-for-mom-part-2-cybersecurity">https://hackernoon.com/a-class-for-mom-part-2-cybersecurity</a>.
            <br> This is a cybersecurity class for senior citizens. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/education">#education</a>, <a href="https://hackernoon.com/tagged/senior-wisdom">#senior-wisdom</a>, <a href="https://hackernoon.com/tagged/learning">#learning</a>, <a href="https://hackernoon.com/tagged/online-learning">#online-learning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/turbulence">@turbulence</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/turbulence">@turbulence's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is a cybersecurity class for senior citizens.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-class-for-mom-part-2-cybersecurity">https://hackernoon.com/a-class-for-mom-part-2-cybersecurity</a>.
            <br> This is a cybersecurity class for senior citizens. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/education">#education</a>, <a href="https://hackernoon.com/tagged/senior-wisdom">#senior-wisdom</a>, <a href="https://hackernoon.com/tagged/learning">#learning</a>, <a href="https://hackernoon.com/tagged/online-learning">#online-learning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/turbulence">@turbulence</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/turbulence">@turbulence's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is a cybersecurity class for senior citizens.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 26 Jan 2026 08:00:31 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/903f9370/36ec2410.mp3" length="3661056" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2uhBidrymLTlp0oTe3pPdMQu2ftfOq1EzW5llrStkME/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Yzk1/ZTcxMmUxYWFhOTE5/NjhjODYwZTA5YmQ0/ZGFmMC5qcGVn.jpg"/>
      <itunes:duration>458</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-class-for-mom-part-2-cybersecurity">https://hackernoon.com/a-class-for-mom-part-2-cybersecurity</a>.
            <br> This is a cybersecurity class for senior citizens. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/education">#education</a>, <a href="https://hackernoon.com/tagged/senior-wisdom">#senior-wisdom</a>, <a href="https://hackernoon.com/tagged/learning">#learning</a>, <a href="https://hackernoon.com/tagged/online-learning">#online-learning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/turbulence">@turbulence</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/turbulence">@turbulence's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is a cybersecurity class for senior citizens.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,education,senior-wisdom,learning,online-learning</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside Brevity AI: The Architecture Powering Real-Time, HIPAA-Compliant Clinical Documentation</title>
      <itunes:title>Inside Brevity AI: The Architecture Powering Real-Time, HIPAA-Compliant Clinical Documentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22cce924-60fa-476b-b059-e83b250cebc2</guid>
      <link>https://share.transistor.fm/s/e4daf071</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation">https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation</a>.
            <br> Brevity AI’s CTO architected a HIPAA-compliant platform using real-time AI to transform clinical documentation and visit prep at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/hipaa-compliant-documentation">#hipaa-compliant-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-system">#healthcare-ai-system</a>, <a href="https://hackernoon.com/tagged/healthcare-nlp-clinical-notes">#healthcare-nlp-clinical-notes</a>, <a href="https://hackernoon.com/tagged/secure-healthcare-data">#secure-healthcare-data</a>, <a href="https://hackernoon.com/tagged/medical-documentation">#medical-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-architecture">#healthcare-ai-architecture</a>, <a href="https://hackernoon.com/tagged/medical-transcription-platform">#medical-transcription-platform</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Brevity AI’s clinical documentation platform compresses hours of chart review and note-taking into minutes through real-time, HIPAA-compliant AI. Architected end-to-end by CTO Purv Rakeshkumar Chauhan, the system combines scalable microservices, medical NLP, secure data infrastructure, and real-time transcription to improve clinician efficiency, accuracy, and patient care.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation">https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation</a>.
            <br> Brevity AI’s CTO architected a HIPAA-compliant platform using real-time AI to transform clinical documentation and visit prep at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/hipaa-compliant-documentation">#hipaa-compliant-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-system">#healthcare-ai-system</a>, <a href="https://hackernoon.com/tagged/healthcare-nlp-clinical-notes">#healthcare-nlp-clinical-notes</a>, <a href="https://hackernoon.com/tagged/secure-healthcare-data">#secure-healthcare-data</a>, <a href="https://hackernoon.com/tagged/medical-documentation">#medical-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-architecture">#healthcare-ai-architecture</a>, <a href="https://hackernoon.com/tagged/medical-transcription-platform">#medical-transcription-platform</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Brevity AI’s clinical documentation platform compresses hours of chart review and note-taking into minutes through real-time, HIPAA-compliant AI. Architected end-to-end by CTO Purv Rakeshkumar Chauhan, the system combines scalable microservices, medical NLP, secure data infrastructure, and real-time transcription to improve clinician efficiency, accuracy, and patient care.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 26 Jan 2026 08:00:28 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/e4daf071/04ccee29.mp3" length="4597824" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Cw7ij9GILxW0Lv3jL--CLt71GytU4kctYKDlqAY9FfU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNmYx/Nzg2MmE0N2RhN2Mw/ZmU5YzliMjVjNTU2/ZmU4NC5qcGVn.jpg"/>
      <itunes:duration>575</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation">https://hackernoon.com/inside-brevity-ai-the-architecture-powering-real-time-hipaa-compliant-clinical-documentation</a>.
            <br> Brevity AI’s CTO architected a HIPAA-compliant platform using real-time AI to transform clinical documentation and visit prep at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/hipaa-compliant-documentation">#hipaa-compliant-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-system">#healthcare-ai-system</a>, <a href="https://hackernoon.com/tagged/healthcare-nlp-clinical-notes">#healthcare-nlp-clinical-notes</a>, <a href="https://hackernoon.com/tagged/secure-healthcare-data">#secure-healthcare-data</a>, <a href="https://hackernoon.com/tagged/medical-documentation">#medical-documentation</a>, <a href="https://hackernoon.com/tagged/healthcare-ai-architecture">#healthcare-ai-architecture</a>, <a href="https://hackernoon.com/tagged/medical-transcription-platform">#medical-transcription-platform</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Brevity AI’s clinical documentation platform compresses hours of chart review and note-taking into minutes through real-time, HIPAA-compliant AI. Architected end-to-end by CTO Purv Rakeshkumar Chauhan, the system combines scalable microservices, medical NLP, secure data infrastructure, and real-time transcription to improve clinician efficiency, accuracy, and patient care.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>hipaa-compliant-documentation,healthcare-ai-system,healthcare-nlp-clinical-notes,secure-healthcare-data,medical-documentation,healthcare-ai-architecture,medical-transcription-platform,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How You Can Test Your Kids' Smart Toys For Privacy </title>
      <itunes:title>How You Can Test Your Kids' Smart Toys For Privacy </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b6d1cc1-0b7f-4bd1-b531-f4dfab6d214f</guid>
      <link>https://share.transistor.fm/s/b7c53b40</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy">https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy</a>.
            <br> Are those toys secure? And precisely what data is being handed over when a kid is using these toys? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/kids-safety">#kids-safety</a>, <a href="https://hackernoon.com/tagged/children-privacy">#children-privacy</a>, <a href="https://hackernoon.com/tagged/children-data-safety">#children-data-safety</a>, <a href="https://hackernoon.com/tagged/kids-toys-privacy">#kids-toys-privacy</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/bluetooth-toys">#bluetooth-toys</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Markup is looking into what other toys collect private data on your children. A Wi-Fi-enabled toy will likely communicate with your wireless router. A Bluetooth toy will send data to another smart device, such as a smartphone. We’re here to help.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy">https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy</a>.
            <br> Are those toys secure? And precisely what data is being handed over when a kid is using these toys? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/kids-safety">#kids-safety</a>, <a href="https://hackernoon.com/tagged/children-privacy">#children-privacy</a>, <a href="https://hackernoon.com/tagged/children-data-safety">#children-data-safety</a>, <a href="https://hackernoon.com/tagged/kids-toys-privacy">#kids-toys-privacy</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/bluetooth-toys">#bluetooth-toys</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Markup is looking into what other toys collect private data on your children. A Wi-Fi-enabled toy will likely communicate with your wireless router. A Bluetooth toy will send data to another smart device, such as a smartphone. We’re here to help.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 25 Jan 2026 08:00:49 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/b7c53b40/43cb99ee.mp3" length="7110336" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/E6bIgHC8F4kQqW81e-L1eE-4hygBCcMQrn2k0Zk-_HY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMDcx/ODc2MzZjYmM0M2Nl/YWI2ZmY0NjgzNDU1/YWE4OC5qcGVn.jpg"/>
      <itunes:duration>889</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy">https://hackernoon.com/how-you-can-test-your-kids-smart-toys-for-privacy</a>.
            <br> Are those toys secure? And precisely what data is being handed over when a kid is using these toys? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/kids-safety">#kids-safety</a>, <a href="https://hackernoon.com/tagged/children-privacy">#children-privacy</a>, <a href="https://hackernoon.com/tagged/children-data-safety">#children-data-safety</a>, <a href="https://hackernoon.com/tagged/kids-toys-privacy">#kids-toys-privacy</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/bluetooth-toys">#bluetooth-toys</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Markup is looking into what other toys collect private data on your children. A Wi-Fi-enabled toy will likely communicate with your wireless router. A Bluetooth toy will send data to another smart device, such as a smartphone. We’re here to help.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>privacy,kids-safety,children-privacy,children-data-safety,kids-toys-privacy,the-markup,bluetooth-toys,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>New Research Shows 64% of Third-Party Applications Access Sensitive Data Without Authorization</title>
      <itunes:title>New Research Shows 64% of Third-Party Applications Access Sensitive Data Without Authorization</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98f45028-a898-499c-98a1-51733f630ce3</guid>
      <link>https://share.transistor.fm/s/d0c21e84</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization">https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization</a>.
            <br> 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%)  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/reflectiz">#reflectiz</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Reflectiz releases its 2026 State of Web Exposure Research. 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%) are top drivers of sensitive data exposure.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization">https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization</a>.
            <br> 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%)  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/reflectiz">#reflectiz</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Reflectiz releases its 2026 State of Web Exposure Research. 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%) are top drivers of sensitive data exposure.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 23 Jan 2026 08:00:59 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d0c21e84/12d13951.mp3" length="1873728" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GtKwek_9hVsfMRBIJzOYxSHvBMLEJf4NxJN4G0D9-GA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZDQz/ZGQ3ZjUzY2UxNTk1/NGEwZGVhOTViYjkw/MDc3Mi5qcGVn.jpg"/>
      <itunes:duration>235</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization">https://hackernoon.com/new-research-shows-64percent-of-third-party-applications-access-sensitive-data-without-authorization</a>.
            <br> 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%)  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/reflectiz">#reflectiz</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Reflectiz releases its 2026 State of Web Exposure Research. 64% of third‑party applications access sensitive data without legitimate business justification. Google Tag Manager (8%), Shopify (5%), and Facebook Pixel (4%) are top drivers of sensitive data exposure.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,reflectiz,cybernewswire,press-release,cyber-threats,cyber-security-awareness,cybersecurity-tips,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Essential Cybersecurity Measures Every Modern Business Should Take</title>
      <itunes:title>Essential Cybersecurity Measures Every Modern Business Should Take</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ff2d8f2-62f5-4359-bb81-0454f34629b0</guid>
      <link>https://share.transistor.fm/s/38148813</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take">https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take</a>.
            <br> No business can remove all cyber risk, but every business can make smart moves that reduce it.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/business-intelligence">#business-intelligence</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/essential-cybersecurity">#essential-cybersecurity</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/setudeora">@setudeora</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/setudeora">@setudeora's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                No business can remove all cyber risk, but every business can make smart moves that reduce it. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take">https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take</a>.
            <br> No business can remove all cyber risk, but every business can make smart moves that reduce it.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/business-intelligence">#business-intelligence</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/essential-cybersecurity">#essential-cybersecurity</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/setudeora">@setudeora</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/setudeora">@setudeora's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                No business can remove all cyber risk, but every business can make smart moves that reduce it. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 23 Jan 2026 08:00:57 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/38148813/73c6ac2e.mp3" length="2955264" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/h-WiYCb4JAU3ryhttg29lDfCqq-bMN4RjnPQyDOvqNE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMjVm/ZDBmNzg5NDZkZWU1/ZTU0NGIyNzk1Y2Ez/OThjMy53ZWJw.jpg"/>
      <itunes:duration>370</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take">https://hackernoon.com/essential-cybersecurity-measures-every-modern-business-should-take</a>.
            <br> No business can remove all cyber risk, but every business can make smart moves that reduce it.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/business-intelligence">#business-intelligence</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-attack">#cyber-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/essential-cybersecurity">#essential-cybersecurity</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/setudeora">@setudeora</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/setudeora">@setudeora's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                No business can remove all cyber risk, but every business can make smart moves that reduce it. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity-tips,business-intelligence,cyber-threats,cyber-security-awareness,cyber-attack,cybersecurity,essential-cybersecurity,startup</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI &amp; Security Impact</title>
      <itunes:title>Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI &amp; Security Impact</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a1dc761c-2016-40da-ab3f-c23ba3ae269c</guid>
      <link>https://share.transistor.fm/s/f6f0363d</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact">https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact</a>.
            <br> The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyberattacks">#cyberattacks</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Airlock Digital's allowlisting solution provides a 224% return on investment (ROI) and a $3.8 million net present value (NPV) over three years for organizations adopting Airlock Digital’s approach. The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact">https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact</a>.
            <br> The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyberattacks">#cyberattacks</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Airlock Digital's allowlisting solution provides a 224% return on investment (ROI) and a $3.8 million net present value (NPV) over three years for organizations adopting Airlock Digital’s approach. The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 22 Jan 2026 08:00:55 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/f6f0363d/4b9f1d40.mp3" length="2538624" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NK7VOIQ1HJpTASG2PgCbDKzBvPRBChjqZOC4NGkgDB0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmZh/ODU1NDg1OTI3ZTM1/NzY4N2VkZWVhNWI2/N2ExZi5qcGVn.jpg"/>
      <itunes:duration>318</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact">https://hackernoon.com/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-and-security-impact</a>.
            <br> The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/cyberattacks">#cyberattacks</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Airlock Digital's allowlisting solution provides a 224% return on investment (ROI) and a $3.8 million net present value (NPV) over three years for organizations adopting Airlock Digital’s approach. The study noted that a single security analyst can effectively manage Airlock digital policies in much less time than traditional solutions require.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,cybernewswire,press-release,cyber-security-awareness,cyber-threats,cybercrime,cyberattacks,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifying</title>
      <itunes:title>Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifying</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7edd42b1-91be-4051-b4ea-d3ef6de3fcc5</guid>
      <link>https://share.transistor.fm/s/9e40be79</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying">https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying</a>.
            <br> Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ransomware">#ransomware</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/data-breach">#data-breach</a>, <a href="https://hackernoon.com/tagged/cybersecurity-threats">#cybersecurity-threats</a>, <a href="https://hackernoon.com/tagged/crypto-threats">#crypto-threats</a>, <a href="https://hackernoon.com/tagged/internet-threats">#internet-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attacks now skip encryption entirely. Payments are declining, but the damage is worse than ever.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying">https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying</a>.
            <br> Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ransomware">#ransomware</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/data-breach">#data-breach</a>, <a href="https://hackernoon.com/tagged/cybersecurity-threats">#cybersecurity-threats</a>, <a href="https://hackernoon.com/tagged/crypto-threats">#crypto-threats</a>, <a href="https://hackernoon.com/tagged/internet-threats">#internet-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attacks now skip encryption entirely. Payments are declining, but the damage is worse than ever.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 22 Jan 2026 08:00:53 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/9e40be79/e3db0918.mp3" length="4219776" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/93a5asgGR9WnOZAwGuHk71p1hxGqIgGjUUzuuhC3-7A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMWZl/MDM3NWEwYjBmNjg1/YjdlNzkyMTM3ZmQ4/ZTAyNy53ZWJw.jpg"/>
      <itunes:duration>528</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying">https://hackernoon.com/ransomware-doesnt-need-to-lock-your-files-anymore-heres-why-thats-terrifying</a>.
            <br> Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ransomware">#ransomware</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/data-breach">#data-breach</a>, <a href="https://hackernoon.com/tagged/cybersecurity-threats">#cybersecurity-threats</a>, <a href="https://hackernoon.com/tagged/crypto-threats">#crypto-threats</a>, <a href="https://hackernoon.com/tagged/internet-threats">#internet-threats</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attacks now skip encryption entirely. Payments are declining, but the damage is worse than ever.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ransomware,infosec,hacking,data-breach,cybersecurity-threats,crypto-threats,internet-threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Zero-Day Deduction</title>
      <itunes:title>The Zero-Day Deduction</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c69b8a44-82fe-4819-bd60-5e55a46af4c1</guid>
      <link>https://share.transistor.fm/s/1cffda70</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-zero-day-deduction">https://hackernoon.com/the-zero-day-deduction</a>.
            <br> A bug bounty hunter finds an IDOR vuln in a major tax portal, exposing millions of financial records. A story about privacy, ethics, and the HTTP protocol. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/web-development">#web-development</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/fiction">#fiction</a>, <a href="https://hackernoon.com/tagged/contest-tags">#contest-tags</a>, <a href="https://hackernoon.com/tagged/api-bug-bounty">#api-bug-bounty</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/legit">@legit</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/legit">@legit's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                While testing a tax software API for a bug bounty, I discovered a critical Insecure Direct Object Reference (IDOR). By changing a single integer in the URL, I bypassed authentication and accessed a stranger's full tax return. I realized I was one script away from downloading the entire country's financial data.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-zero-day-deduction">https://hackernoon.com/the-zero-day-deduction</a>.
            <br> A bug bounty hunter finds an IDOR vuln in a major tax portal, exposing millions of financial records. A story about privacy, ethics, and the HTTP protocol. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/web-development">#web-development</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/fiction">#fiction</a>, <a href="https://hackernoon.com/tagged/contest-tags">#contest-tags</a>, <a href="https://hackernoon.com/tagged/api-bug-bounty">#api-bug-bounty</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/legit">@legit</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/legit">@legit's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                While testing a tax software API for a bug bounty, I discovered a critical Insecure Direct Object Reference (IDOR). By changing a single integer in the URL, I bypassed authentication and accessed a stranger's full tax return. I realized I was one script away from downloading the entire country's financial data.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 21 Jan 2026 08:00:30 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/1cffda70/d657b89d.mp3" length="1244544" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/v9mkAsPmicdZtkwIKRmLmzcDL1sQ5O4JNtaq9m3DKi8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjA4/ZDRkNDhkOTc4ZmM0/OTgzMjE4NzI4ZWIw/MWFlMy5wbmc.jpg"/>
      <itunes:duration>156</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-zero-day-deduction">https://hackernoon.com/the-zero-day-deduction</a>.
            <br> A bug bounty hunter finds an IDOR vuln in a major tax portal, exposing millions of financial records. A story about privacy, ethics, and the HTTP protocol. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bug-bounty">#bug-bounty</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/web-development">#web-development</a>, <a href="https://hackernoon.com/tagged/hacking">#hacking</a>, <a href="https://hackernoon.com/tagged/fiction">#fiction</a>, <a href="https://hackernoon.com/tagged/contest-tags">#contest-tags</a>, <a href="https://hackernoon.com/tagged/api-bug-bounty">#api-bug-bounty</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/legit">@legit</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/legit">@legit's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                While testing a tax software API for a bug bounty, I discovered a critical Insecure Direct Object Reference (IDOR). By changing a single integer in the URL, I bypassed authentication and accessed a stranger's full tax return. I realized I was one script away from downloading the entire country's financial data.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,bug-bounty,privacy,web-development,hacking,fiction,contest-tags,api-bug-bounty</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside the Passwordless Architecture Redefining Security for Telecom Giants</title>
      <itunes:title>Inside the Passwordless Architecture Redefining Security for Telecom Giants</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96e07724-05bc-4540-926c-0c3d3f5042da</guid>
      <link>https://share.transistor.fm/s/91753510</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants">https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants</a>.
            <br> Passwordless identity is redefining telecom security by replacing fragile credentials with resilient, cryptographic access built for national scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cryptographic-identity-control">#cryptographic-identity-control</a>, <a href="https://hackernoon.com/tagged/passwordless-telecom-identity">#passwordless-telecom-identity</a>, <a href="https://hackernoon.com/tagged/oss-bss-identity-integration">#oss-bss-identity-integration</a>, <a href="https://hackernoon.com/tagged/workforce-identity-at-scale">#workforce-identity-at-scale</a>, <a href="https://hackernoon.com/tagged/telecom-access-resilience">#telecom-access-resilience</a>, <a href="https://hackernoon.com/tagged/passwordless-critical-networks">#passwordless-critical-networks</a>, <a href="https://hackernoon.com/tagged/large-scale-access-control">#large-scale-access-control</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Passwords were never designed for telecom environments operating at national scale. This article explores how passwordless identity architectures—built as core infrastructure rather than login tools—solve long-standing issues around availability, legacy system integration, Zero Trust alignment, and operational resilience. At telecom scale, identity becomes a control plane, not a credential.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants">https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants</a>.
            <br> Passwordless identity is redefining telecom security by replacing fragile credentials with resilient, cryptographic access built for national scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cryptographic-identity-control">#cryptographic-identity-control</a>, <a href="https://hackernoon.com/tagged/passwordless-telecom-identity">#passwordless-telecom-identity</a>, <a href="https://hackernoon.com/tagged/oss-bss-identity-integration">#oss-bss-identity-integration</a>, <a href="https://hackernoon.com/tagged/workforce-identity-at-scale">#workforce-identity-at-scale</a>, <a href="https://hackernoon.com/tagged/telecom-access-resilience">#telecom-access-resilience</a>, <a href="https://hackernoon.com/tagged/passwordless-critical-networks">#passwordless-critical-networks</a>, <a href="https://hackernoon.com/tagged/large-scale-access-control">#large-scale-access-control</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Passwords were never designed for telecom environments operating at national scale. This article explores how passwordless identity architectures—built as core infrastructure rather than login tools—solve long-standing issues around availability, legacy system integration, Zero Trust alignment, and operational resilience. At telecom scale, identity becomes a control plane, not a credential.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 20 Jan 2026 08:00:51 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/91753510/3d64bc13.mp3" length="2211072" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/d7FmdvgoczS103B8MsNRU3ti_wA4bH1z2iCgSvlShOU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xODAw/Y2NhYjFmYjM5ZGNl/MjNjMjY2ODE2ODBj/ZTg5ZS5wbmc.jpg"/>
      <itunes:duration>277</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants">https://hackernoon.com/inside-the-passwordless-architecture-redefining-security-for-telecom-giants</a>.
            <br> Passwordless identity is redefining telecom security by replacing fragile credentials with resilient, cryptographic access built for national scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cryptographic-identity-control">#cryptographic-identity-control</a>, <a href="https://hackernoon.com/tagged/passwordless-telecom-identity">#passwordless-telecom-identity</a>, <a href="https://hackernoon.com/tagged/oss-bss-identity-integration">#oss-bss-identity-integration</a>, <a href="https://hackernoon.com/tagged/workforce-identity-at-scale">#workforce-identity-at-scale</a>, <a href="https://hackernoon.com/tagged/telecom-access-resilience">#telecom-access-resilience</a>, <a href="https://hackernoon.com/tagged/passwordless-critical-networks">#passwordless-critical-networks</a>, <a href="https://hackernoon.com/tagged/large-scale-access-control">#large-scale-access-control</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Passwords were never designed for telecom environments operating at national scale. This article explores how passwordless identity architectures—built as core infrastructure rather than login tools—solve long-standing issues around availability, legacy system integration, Zero Trust alignment, and operational resilience. At telecom scale, identity becomes a control plane, not a credential.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cryptographic-identity-control,passwordless-telecom-identity,oss-bss-identity-integration,workforce-identity-at-scale,telecom-access-resilience,passwordless-critical-networks,large-scale-access-control,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Third-Party Risks in 2026: Outlook and Security Strategies</title>
      <itunes:title>Third-Party Risks in 2026: Outlook and Security Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f0127419-fed4-4893-a268-340d73a492df</guid>
      <link>https://share.transistor.fm/s/c46ff534</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies">https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies</a>.
            <br> Third-party risk is everywhere in 2026. Here's an overview of current risks and security best practices as we start the new year. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/third-party-risk-management">#third-party-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-risk-management">#vendor-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-security">#vendor-security</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/security-culture">#security-culture</a>, <a href="https://hackernoon.com/tagged/incident-response-plan">#incident-response-plan</a>, <a href="https://hackernoon.com/tagged/third-party-risks">#third-party-risks</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most companies rely on external services to keep their operations running smoothly, leaving lots of openings for third-party breaches. To create a resilient TPRM program in 2026, companies should embrace automation and AI, foster a culture of security, adopt a zero-trust approach, and more.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies">https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies</a>.
            <br> Third-party risk is everywhere in 2026. Here's an overview of current risks and security best practices as we start the new year. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/third-party-risk-management">#third-party-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-risk-management">#vendor-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-security">#vendor-security</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/security-culture">#security-culture</a>, <a href="https://hackernoon.com/tagged/incident-response-plan">#incident-response-plan</a>, <a href="https://hackernoon.com/tagged/third-party-risks">#third-party-risks</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most companies rely on external services to keep their operations running smoothly, leaving lots of openings for third-party breaches. To create a resilient TPRM program in 2026, companies should embrace automation and AI, foster a culture of security, adopt a zero-trust approach, and more.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 18 Jan 2026 08:00:27 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c46ff534/848eb8af.mp3" length="4352064" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rTkX-LnLszh0ESola55iPDwJlMOIoM03ynJu-qs0bvQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZmEw/Y2IzYzQ5ZDBlNzM2/YTRlYjVjNzM5MWNj/N2JhNS5wbmc.jpg"/>
      <itunes:duration>545</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies">https://hackernoon.com/third-party-risks-in-2026-outlook-and-security-strategies</a>.
            <br> Third-party risk is everywhere in 2026. Here's an overview of current risks and security best practices as we start the new year. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/third-party-risk-management">#third-party-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-risk-management">#vendor-risk-management</a>, <a href="https://hackernoon.com/tagged/vendor-security">#vendor-security</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/security-culture">#security-culture</a>, <a href="https://hackernoon.com/tagged/incident-response-plan">#incident-response-plan</a>, <a href="https://hackernoon.com/tagged/third-party-risks">#third-party-risks</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most companies rely on external services to keep their operations running smoothly, leaving lots of openings for third-party breaches. To create a resilient TPRM program in 2026, companies should embrace automation and AI, foster a culture of security, adopt a zero-trust approach, and more.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>third-party-risk-management,vendor-risk-management,vendor-security,cyber-resilience,zero-trust,security-culture,incident-response-plan,third-party-risks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity for Startups: The Assumptions That Quietly Break You</title>
      <itunes:title>Cybersecurity for Startups: The Assumptions That Quietly Break You</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">57115624-67cb-47a6-a9fd-291825d388ef</guid>
      <link>https://share.transistor.fm/s/222917af</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you">https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you</a>.
            <br> Most startups don’t get hacked due to missing tools, but dangerous assumptions. A founder’s view on how security quietly breaks early-stage startups.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/startups">#startups</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/apis">#apis</a>, <a href="https://hackernoon.com/tagged/leadership">#leadership</a>, <a href="https://hackernoon.com/tagged/cybersecurity-for-startups">#cybersecurity-for-startups</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>, <a href="https://hackernoon.com/tagged/cybersecurity-patterns">#cybersecurity-patterns</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hakemalhumaidi">@hakemalhumaidi</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hakemalhumaidi">@hakemalhumaidi's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Startups rarely get compromised because of advanced attacks. They get exposed because of assumptions that feel reasonable under pressure—being too small to matter, trusting encryption blindly, or postponing security decisions. Cybersecurity isn’t a tool problem; it’s a mindset problem. The earlier founders challenge their assumptions, the cheaper—and more effective—security becomes.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you">https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you</a>.
            <br> Most startups don’t get hacked due to missing tools, but dangerous assumptions. A founder’s view on how security quietly breaks early-stage startups.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/startups">#startups</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/apis">#apis</a>, <a href="https://hackernoon.com/tagged/leadership">#leadership</a>, <a href="https://hackernoon.com/tagged/cybersecurity-for-startups">#cybersecurity-for-startups</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>, <a href="https://hackernoon.com/tagged/cybersecurity-patterns">#cybersecurity-patterns</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hakemalhumaidi">@hakemalhumaidi</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hakemalhumaidi">@hakemalhumaidi's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Startups rarely get compromised because of advanced attacks. They get exposed because of assumptions that feel reasonable under pressure—being too small to matter, trusting encryption blindly, or postponing security decisions. Cybersecurity isn’t a tool problem; it’s a mindset problem. The earlier founders challenge their assumptions, the cheaper—and more effective—security becomes.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 08:00:38 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/222917af/6b55afed.mp3" length="1952448" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CNdlNh3GB-vXyhA6eCnNsU7BeYND3HNWdqU-RDFNSSY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZDk0/ODIyNGQwZGVmMDk2/ZDg4MGIxNGM5OWI1/NWZlNy5wbmc.jpg"/>
      <itunes:duration>245</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you">https://hackernoon.com/cybersecurity-for-startups-the-assumptions-that-quietly-break-you</a>.
            <br> Most startups don’t get hacked due to missing tools, but dangerous assumptions. A founder’s view on how security quietly breaks early-stage startups.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/startups">#startups</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/apis">#apis</a>, <a href="https://hackernoon.com/tagged/leadership">#leadership</a>, <a href="https://hackernoon.com/tagged/cybersecurity-for-startups">#cybersecurity-for-startups</a>, <a href="https://hackernoon.com/tagged/startup">#startup</a>, <a href="https://hackernoon.com/tagged/cybersecurity-patterns">#cybersecurity-patterns</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hakemalhumaidi">@hakemalhumaidi</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hakemalhumaidi">@hakemalhumaidi's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Startups rarely get compromised because of advanced attacks. They get exposed because of assumptions that feel reasonable under pressure—being too small to matter, trusting encryption blindly, or postponing security decisions. Cybersecurity isn’t a tool problem; it’s a mindset problem. The earlier founders challenge their assumptions, the cheaper—and more effective—security becomes.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,startups,software-development,apis,leadership,cybersecurity-for-startups,startup,cybersecurity-patterns</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Protect Your Crypto: The Wallet Backup Options You Never Considered</title>
      <itunes:title>Protect Your Crypto: The Wallet Backup Options You Never Considered</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d21d7c9c-fd35-47cd-a26b-2080adfd9e83</guid>
      <link>https://share.transistor.fm/s/393e48e0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered">https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered</a>.
            <br> Ever wondered if your wallet backup is enough? Here’s a friendly rundown of simple tricks and tools that make recovery easier and your crypto far safer.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/private-keys">#private-keys</a>, <a href="https://hackernoon.com/tagged/blockchain-backups">#blockchain-backups</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>, <a href="https://hackernoon.com/tagged/hardware-wallet-security">#hardware-wallet-security</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-backup">#crypto-wallet-backup</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With crypto, you’re the only person who has control of your private keys. Because of this, it's helpful to know which backup options are available before losing access to your digital wallet. Hardware wallets can provide an additional level of security.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered">https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered</a>.
            <br> Ever wondered if your wallet backup is enough? Here’s a friendly rundown of simple tricks and tools that make recovery easier and your crypto far safer.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/private-keys">#private-keys</a>, <a href="https://hackernoon.com/tagged/blockchain-backups">#blockchain-backups</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>, <a href="https://hackernoon.com/tagged/hardware-wallet-security">#hardware-wallet-security</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-backup">#crypto-wallet-backup</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With crypto, you’re the only person who has control of your private keys. Because of this, it's helpful to know which backup options are available before losing access to your digital wallet. Hardware wallets can provide an additional level of security.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 08:00:36 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/393e48e0/04ef4cd6.mp3" length="3641856" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Jq6bWws11NTVqfPmxLShJtVG0DHrNhvB4e-m2aCo8eQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYWQ1/NzZlYjQ0NjVkMzc0/NTEzZDRkMGExMTgz/M2EwNi5wbmc.jpg"/>
      <itunes:duration>456</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered">https://hackernoon.com/protect-your-crypto-the-wallet-backup-options-you-never-considered</a>.
            <br> Ever wondered if your wallet backup is enough? Here’s a friendly rundown of simple tricks and tools that make recovery easier and your crypto far safer.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/private-keys">#private-keys</a>, <a href="https://hackernoon.com/tagged/blockchain-backups">#blockchain-backups</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>, <a href="https://hackernoon.com/tagged/hardware-wallet-security">#hardware-wallet-security</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-backup">#crypto-wallet-backup</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With crypto, you’re the only person who has control of your private keys. Because of this, it's helpful to know which backup options are available before losing access to your digital wallet. Hardware wallets can provide an additional level of security.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>crypto-wallet-security,private-keys,blockchain-backups,data-backup,hardware-wallet-security,crypto-wallet-backup,good-company,obyte</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Shadow AI: The Invisible Threat Lurking in Your Enterprise</title>
      <itunes:title>Shadow AI: The Invisible Threat Lurking in Your Enterprise</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0bcc5b4f-e749-4a1f-9e34-417abbffe036</guid>
      <link>https://share.transistor.fm/s/1d8bba10</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise">https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise</a>.
            <br> Shadow AI costs enterprises $670,000 per breach.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/enterprise-security">#enterprise-security</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shadow AI is the unauthorized use of AI tools by employees without IT oversight. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise">https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise</a>.
            <br> Shadow AI costs enterprises $670,000 per breach.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/enterprise-security">#enterprise-security</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shadow AI is the unauthorized use of AI tools by employees without IT oversight. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 16 Jan 2026 08:00:41 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/1d8bba10/67462962.mp3" length="5832768" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3Idcd61rSCG7BYPypa-XoCQPNPAa_K0OVwaJI6gCyMU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83YTRj/ZTZhNTMwYjY2ZGIx/ZmYxMzJmNTEzYTkw/NWE5Ni53ZWJw.jpg"/>
      <itunes:duration>730</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise">https://hackernoon.com/shadow-ai-the-invisible-threat-lurking-in-your-enterprise</a>.
            <br> Shadow AI costs enterprises $670,000 per breach.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/enterprise-security">#enterprise-security</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/zero-trust">#zero-trust</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/anjali002">@anjali002</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/anjali002">@anjali002's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shadow AI is the unauthorized use of AI tools by employees without IT oversight. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>enterprise-security,shadow-ai,ai-governance,cybersecurity,data-privacy,zero-trust,generative-ai,ai-cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Implementing Zero Trust Cybersecurity Architecture in the Age of AI</title>
      <itunes:title>Implementing Zero Trust Cybersecurity Architecture in the Age of AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d9b2a5b0-6036-4353-a340-08c90426b932</guid>
      <link>https://share.transistor.fm/s/222749ad</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai">https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai</a>.
            <br> Explore how Zero Trust secures agentic AI, treating autonomous agents as human actors to prevent misconfigurations, data leaks, and AI-driven breaches.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/workflow-automation">#workflow-automation</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/ai-innovation">#ai-innovation</a>, <a href="https://hackernoon.com/tagged/zero-trust-cybersecurity">#zero-trust-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-architecture">#cybersecurity-architecture</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Agentic AI systems act autonomously across enterprise environments, making traditional perimeter-based security ineffective. Zero Trust treats AI agents as independent actors with identities, enforcing continuous verification, least-privilege access, and contextual controls across APIs, systems, and data. While powerful, Zero Trust must be implemented thoughtfully to avoid policy sprawl, blind spots, and legacy gaps. When done right, it enables organizations to scale autonomous AI safely—without sacrificing speed, innovation, or trust.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai">https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai</a>.
            <br> Explore how Zero Trust secures agentic AI, treating autonomous agents as human actors to prevent misconfigurations, data leaks, and AI-driven breaches.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/workflow-automation">#workflow-automation</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/ai-innovation">#ai-innovation</a>, <a href="https://hackernoon.com/tagged/zero-trust-cybersecurity">#zero-trust-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-architecture">#cybersecurity-architecture</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Agentic AI systems act autonomously across enterprise environments, making traditional perimeter-based security ineffective. Zero Trust treats AI agents as independent actors with identities, enforcing continuous verification, least-privilege access, and contextual controls across APIs, systems, and data. While powerful, Zero Trust must be implemented thoughtfully to avoid policy sprawl, blind spots, and legacy gaps. When done right, it enables organizations to scale autonomous AI safely—without sacrificing speed, innovation, or trust.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 16 Jan 2026 08:00:39 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/222749ad/a0410dc3.mp3" length="2962176" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ouV8LpTGpPvryIdorcv8-Pj-px0q4uvTt2iUgYjMa6E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kODMz/NmQyNDNmYjFmMzMw/OTYzNjQ2OWNkYmNi/MDA2NS5qcGVn.jpg"/>
      <itunes:duration>371</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai">https://hackernoon.com/implementing-zero-trust-cybersecurity-architecture-in-the-age-of-ai</a>.
            <br> Explore how Zero Trust secures agentic AI, treating autonomous agents as human actors to prevent misconfigurations, data leaks, and AI-driven breaches.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/workflow-automation">#workflow-automation</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/ai-innovation">#ai-innovation</a>, <a href="https://hackernoon.com/tagged/zero-trust-cybersecurity">#zero-trust-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-architecture">#cybersecurity-architecture</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Agentic AI systems act autonomously across enterprise environments, making traditional perimeter-based security ineffective. Zero Trust treats AI agents as independent actors with identities, enforcing continuous verification, least-privilege access, and contextual controls across APIs, systems, and data. While powerful, Zero Trust must be implemented thoughtfully to avoid policy sprawl, blind spots, and legacy gaps. When done right, it enables organizations to scale autonomous AI safely—without sacrificing speed, innovation, or trust.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-agents,workflow-automation,zero-trust-security,ai-innovation,zero-trust-cybersecurity,cybersecurity-architecture,agentic-ai</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Code That Built a City: Solving the 33-Year Mystery Behind Google’s Málaga Hub</title>
      <itunes:title>The Code That Built a City: Solving the 33-Year Mystery Behind Google’s Málaga Hub</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce27c168-976d-4478-b508-15789cc958b4</guid>
      <link>https://share.transistor.fm/s/b2e77a8b</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub">https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub</a>.
            <br> It took Bernardo Quintero more than three decades to track down the ghost in the machine. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/malaga">#malaga</a>, <a href="https://hackernoon.com/tagged/cybersecurity-capital">#cybersecurity-capital</a>, <a href="https://hackernoon.com/tagged/quintero">#quintero</a>, <a href="https://hackernoon.com/tagged/butterfly-effect">#butterfly-effect</a>, <a href="https://hackernoon.com/tagged/butterfly-effect-virus">#butterfly-effect-virus</a>, <a href="https://hackernoon.com/tagged/butterfly-virus">#butterfly-virus</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nxuanchinh">@nxuanchinh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nxuanchinh">@nxuanchinh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Bernardo Quintero is the founder of VirusTotal, a startup that was acquired by Google in 2012. He spent more than three decades trying to find the author of a computer virus that transformed the Spanish city of Málaga into a cybersecurity capital.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub">https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub</a>.
            <br> It took Bernardo Quintero more than three decades to track down the ghost in the machine. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/malaga">#malaga</a>, <a href="https://hackernoon.com/tagged/cybersecurity-capital">#cybersecurity-capital</a>, <a href="https://hackernoon.com/tagged/quintero">#quintero</a>, <a href="https://hackernoon.com/tagged/butterfly-effect">#butterfly-effect</a>, <a href="https://hackernoon.com/tagged/butterfly-effect-virus">#butterfly-effect-virus</a>, <a href="https://hackernoon.com/tagged/butterfly-virus">#butterfly-virus</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nxuanchinh">@nxuanchinh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nxuanchinh">@nxuanchinh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Bernardo Quintero is the founder of VirusTotal, a startup that was acquired by Google in 2012. He spent more than three decades trying to find the author of a computer virus that transformed the Spanish city of Málaga into a cybersecurity capital.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 15 Jan 2026 08:00:29 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/b2e77a8b/140d5481.mp3" length="1652928" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AMf8ZsgR-Bzi4NkdP-3iNYyHst5XSzHisHx-ToeYD2I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZWVm/ZTc0ZWNhZWNjZjNj/ZjE4YWE4Y2FmNzE3/ZTRiOC5qcGVn.jpg"/>
      <itunes:duration>207</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub">https://hackernoon.com/the-code-that-built-a-city-solving-the-33-year-mystery-behind-googles-malaga-hub</a>.
            <br> It took Bernardo Quintero more than three decades to track down the ghost in the machine. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/malaga">#malaga</a>, <a href="https://hackernoon.com/tagged/cybersecurity-capital">#cybersecurity-capital</a>, <a href="https://hackernoon.com/tagged/quintero">#quintero</a>, <a href="https://hackernoon.com/tagged/butterfly-effect">#butterfly-effect</a>, <a href="https://hackernoon.com/tagged/butterfly-effect-virus">#butterfly-effect-virus</a>, <a href="https://hackernoon.com/tagged/butterfly-virus">#butterfly-virus</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nxuanchinh">@nxuanchinh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nxuanchinh">@nxuanchinh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Bernardo Quintero is the founder of VirusTotal, a startup that was acquired by Google in 2012. He spent more than three decades trying to find the author of a computer virus that transformed the Spanish city of Málaga into a cybersecurity capital.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,virus-total,malaga,cybersecurity-capital,quintero,butterfly-effect,butterfly-effect-virus,butterfly-virus</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Network Access(ZTNA) Enforcement Using Real Time Risk Scoring &amp; Dynamic Path Segmentation</title>
      <itunes:title>Zero Trust Network Access(ZTNA) Enforcement Using Real Time Risk Scoring &amp; Dynamic Path Segmentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa00a73d-1b38-4058-8091-abdff9a52f13</guid>
      <link>https://share.transistor.fm/s/03bca3bd</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation">https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation</a>.
            <br> Adaptive ZTNA powered by real-time risk scoring and dynamic path segmentation to stop threats and lateral movement fast. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/new-technology">#new-technology</a>, <a href="https://hackernoon.com/tagged/top-new-technology-trends">#top-new-technology-trends</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/cyber-security-trends">#cyber-security-trends</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/cyber-attack-prevention">#cyber-attack-prevention</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dipeshkashiv">@dipeshkashiv</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dipeshkashiv">@dipeshkashiv's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Traditional perimeter-based security has become obsolete. By 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. IBM’s *Cost of a Data Breach Report* shows that organizations with Zero Trust deployed saved an average of $1.76 million per breach.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation">https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation</a>.
            <br> Adaptive ZTNA powered by real-time risk scoring and dynamic path segmentation to stop threats and lateral movement fast. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/new-technology">#new-technology</a>, <a href="https://hackernoon.com/tagged/top-new-technology-trends">#top-new-technology-trends</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/cyber-security-trends">#cyber-security-trends</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/cyber-attack-prevention">#cyber-attack-prevention</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dipeshkashiv">@dipeshkashiv</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dipeshkashiv">@dipeshkashiv's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Traditional perimeter-based security has become obsolete. By 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. IBM’s *Cost of a Data Breach Report* shows that organizations with Zero Trust deployed saved an average of $1.76 million per breach.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 15 Jan 2026 08:00:26 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/03bca3bd/620b4e4b.mp3" length="4290240" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/olWQbUk5qCgGx1XpI_SivIkhxkT1DyAhPSjXF6X-rzk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZjM5/ODQ3YWYzMzQ0YTRi/OTg0ZjAxMWYyOWM5/MmVhNC5wbmc.jpg"/>
      <itunes:duration>537</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation">https://hackernoon.com/zero-trust-network-accessztna-enforcement-using-real-time-risk-scoring-and-dynamic-path-segmentation</a>.
            <br> Adaptive ZTNA powered by real-time risk scoring and dynamic path segmentation to stop threats and lateral movement fast. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/new-technology">#new-technology</a>, <a href="https://hackernoon.com/tagged/top-new-technology-trends">#top-new-technology-trends</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/cyber-security-trends">#cyber-security-trends</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/cyber-attack-prevention">#cyber-attack-prevention</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dipeshkashiv">@dipeshkashiv</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dipeshkashiv">@dipeshkashiv's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Traditional perimeter-based security has become obsolete. By 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. IBM’s *Cost of a Data Breach Report* shows that organizations with Zero Trust deployed saved an average of $1.76 million per breach.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>zero-trust-network-accesss,new-technology,top-new-technology-trends,cyber-security,cyber-security-trends,cyber-attacks,cyber-attack-prevention,network-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Wrapping up Trends in MacOS Malware of 2025</title>
      <itunes:title>Wrapping up Trends in MacOS Malware of 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">49ee5fb1-f281-4531-b888-d7660182d606</guid>
      <link>https://share.transistor.fm/s/d0b4addd</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025">https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025</a>.
            <br> The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/malware-threat">#malware-threat</a>, <a href="https://hackernoon.com/tagged/malware-detection">#malware-detection</a>, <a href="https://hackernoon.com/tagged/malware-protection">#malware-protection</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/moonlock">@moonlock</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/moonlock">@moonlock's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                macOS is no longer a low-risk target. In 2025, attackers combined stealers, backdoors, and AI-driven phishing into long-running attacks — making user awareness and third-party protection more important than ever. The Mac threat landscape now closely resembles what Windows users have faced for years.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025">https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025</a>.
            <br> The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/malware-threat">#malware-threat</a>, <a href="https://hackernoon.com/tagged/malware-detection">#malware-detection</a>, <a href="https://hackernoon.com/tagged/malware-protection">#malware-protection</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/moonlock">@moonlock</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/moonlock">@moonlock's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                macOS is no longer a low-risk target. In 2025, attackers combined stealers, backdoors, and AI-driven phishing into long-running attacks — making user awareness and third-party protection more important than ever. The Mac threat landscape now closely resembles what Windows users have faced for years.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 08 Jan 2026 08:00:30 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d0b4addd/28f78142.mp3" length="2965056" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ruq7MGuzRgkS_1tNtKU7-LXSe-sRKVAxBKUyXiSYQ2A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MGM2/YmYyMGEwNzE5MjM2/OTZlMzIzY2FiOWE2/OTVhOC5wbmc.jpg"/>
      <itunes:duration>371</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025">https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025</a>.
            <br> The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/malware-threat">#malware-threat</a>, <a href="https://hackernoon.com/tagged/malware-detection">#malware-detection</a>, <a href="https://hackernoon.com/tagged/malware-protection">#malware-protection</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/moonlock">@moonlock</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/moonlock">@moonlock's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                macOS is no longer a low-risk target. In 2025, attackers combined stealers, backdoors, and AI-driven phishing into long-running attacks — making user awareness and third-party protection more important than ever. The Mac threat landscape now closely resembles what Windows users have faced for years.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,malware,cyber-threats,malware-threat,malware-detection,malware-protection,ai-security,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>I Saw a Phishing Site That Traps Security Bots</title>
      <itunes:title>I Saw a Phishing Site That Traps Security Bots</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9eff94e0-d2ce-4f89-8368-98eadbdfb38f</guid>
      <link>https://share.transistor.fm/s/d408eb74</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots">https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots</a>.
            <br> How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/phishing">#phishing</a>, <a href="https://hackernoon.com/tagged/cyber-threat-intelligence">#cyber-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/proactive-threat-hunting">#proactive-threat-hunting</a>, <a href="https://hackernoon.com/tagged/blue-team">#blue-team</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/threat-detection">#threat-detection</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/behindthesurface">@behindthesurface</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/behindthesurface">@behindthesurface's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A phishing kit had a hidden form field with no visible counterpart. It wasn't part of the UI. The victim would never see it. So why was it there? Because it wasn't designed to catch victims. It was designed to catch us.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots">https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots</a>.
            <br> How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/phishing">#phishing</a>, <a href="https://hackernoon.com/tagged/cyber-threat-intelligence">#cyber-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/proactive-threat-hunting">#proactive-threat-hunting</a>, <a href="https://hackernoon.com/tagged/blue-team">#blue-team</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/threat-detection">#threat-detection</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/behindthesurface">@behindthesurface</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/behindthesurface">@behindthesurface's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A phishing kit had a hidden form field with no visible counterpart. It wasn't part of the UI. The victim would never see it. So why was it there? Because it wasn't designed to catch victims. It was designed to catch us.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 08 Jan 2026 08:00:28 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d408eb74/aa628f4e.mp3" length="3563520" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BGZWkL1zhvd_kpUQh_gT2wNPBgF94A7hLYF_pJf8YDU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZjE2/ODA4Y2MxODgwOWJj/N2FkNGYzMTdkNzM5/OTFjOS5wbmc.jpg"/>
      <itunes:duration>446</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots">https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots</a>.
            <br> How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/phishing">#phishing</a>, <a href="https://hackernoon.com/tagged/cyber-threat-intelligence">#cyber-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/proactive-threat-hunting">#proactive-threat-hunting</a>, <a href="https://hackernoon.com/tagged/blue-team">#blue-team</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/threat-detection">#threat-detection</a>, <a href="https://hackernoon.com/tagged/cyber-attacks">#cyber-attacks</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/behindthesurface">@behindthesurface</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/behindthesurface">@behindthesurface's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A phishing kit had a hidden form field with no visible counterpart. It wasn't part of the UI. The victim would never see it. So why was it there? Because it wasn't designed to catch victims. It was designed to catch us.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>phishing,cyber-threat-intelligence,proactive-threat-hunting,blue-team,infosec,threat-detection,cyber-attacks,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Authorization Gap No One Wants to Talk About: Why Your API Is Probably Leaking Right Now</title>
      <itunes:title>The Authorization Gap No One Wants to Talk About: Why Your API Is Probably Leaking Right Now</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30b8c623-5f1e-48a6-91f4-e16e15ac8641</guid>
      <link>https://share.transistor.fm/s/2640847c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now">https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now</a>.
            <br> Broken Object Level Authorization (BOLA) is eating the API economy from the inside out.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bola">#bola</a>, <a href="https://hackernoon.com/tagged/broken-object">#broken-object</a>, <a href="https://hackernoon.com/tagged/object-level-authorization">#object-level-authorization</a>, <a href="https://hackernoon.com/tagged/sql">#sql</a>, <a href="https://hackernoon.com/tagged/malicious-payloads">#malicious-payloads</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/ai-detection-system">#ai-detection-system</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. BOLA happens after you've done everything right and your login works. Attackers are not injecting SQL or crafting malicious payloads. They're just asking for things.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now">https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now</a>.
            <br> Broken Object Level Authorization (BOLA) is eating the API economy from the inside out.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bola">#bola</a>, <a href="https://hackernoon.com/tagged/broken-object">#broken-object</a>, <a href="https://hackernoon.com/tagged/object-level-authorization">#object-level-authorization</a>, <a href="https://hackernoon.com/tagged/sql">#sql</a>, <a href="https://hackernoon.com/tagged/malicious-payloads">#malicious-payloads</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/ai-detection-system">#ai-detection-system</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. BOLA happens after you've done everything right and your login works. Attackers are not injecting SQL or crafting malicious payloads. They're just asking for things.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 07 Jan 2026 08:00:39 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/2640847c/762031a7.mp3" length="5600256" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t9Z_F7wfWzdPj7CLsprAsSZK94U839nYZn4P7CTqoiw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MjMw/ZGEzNmJiYmMwMjI3/YWNhZTU4YjcwMTMz/OThkYy5qcGVn.jpg"/>
      <itunes:duration>701</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now">https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now</a>.
            <br> Broken Object Level Authorization (BOLA) is eating the API economy from the inside out.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/bola">#bola</a>, <a href="https://hackernoon.com/tagged/broken-object">#broken-object</a>, <a href="https://hackernoon.com/tagged/object-level-authorization">#object-level-authorization</a>, <a href="https://hackernoon.com/tagged/sql">#sql</a>, <a href="https://hackernoon.com/tagged/malicious-payloads">#malicious-payloads</a>, <a href="https://hackernoon.com/tagged/authentication">#authentication</a>, <a href="https://hackernoon.com/tagged/ai-detection-system">#ai-detection-system</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. BOLA happens after you've done everything right and your login works. Attackers are not injecting SQL or crafting malicious payloads. They're just asking for things.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,bola,broken-object,object-level-authorization,sql,malicious-payloads,authentication,ai-detection-system</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel</title>
      <itunes:title>IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">262f16f2-a29d-4289-9303-d2b19f9f3e08</guid>
      <link>https://share.transistor.fm/s/6d49ff0b</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel">https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel</a>.
            <br> IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/networking">#networking</a>, <a href="https://hackernoon.com/tagged/ipv6-advertising-measurement">#ipv6-advertising-measurement</a>, <a href="https://hackernoon.com/tagged/ipv6-geolocation-challenges">#ipv6-geolocation-challenges</a>, <a href="https://hackernoon.com/tagged/ctv-frequency-capping-issues">#ctv-frequency-capping-issues</a>, <a href="https://hackernoon.com/tagged/ipv6-data-intelligence">#ipv6-data-intelligence</a>, <a href="https://hackernoon.com/tagged/ipv6-active-measurement">#ipv6-active-measurement</a>, <a href="https://hackernoon.com/tagged/ctv-attribution-accuracy">#ctv-attribution-accuracy</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPv6’s privacy features—rapid address rotation, prefix reassignment, and massive address space—are breaking traditional digital advertising measurement, with CTV feeling the impact first. IPinfo solves this with a research-grade, measurement-based IPv6 model built from active probing, topology validation, and global-scale datasets that provide accurate geolocation, network type, attribution signals, and fraud detection across all channels.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel">https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel</a>.
            <br> IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/networking">#networking</a>, <a href="https://hackernoon.com/tagged/ipv6-advertising-measurement">#ipv6-advertising-measurement</a>, <a href="https://hackernoon.com/tagged/ipv6-geolocation-challenges">#ipv6-geolocation-challenges</a>, <a href="https://hackernoon.com/tagged/ctv-frequency-capping-issues">#ctv-frequency-capping-issues</a>, <a href="https://hackernoon.com/tagged/ipv6-data-intelligence">#ipv6-data-intelligence</a>, <a href="https://hackernoon.com/tagged/ipv6-active-measurement">#ipv6-active-measurement</a>, <a href="https://hackernoon.com/tagged/ctv-attribution-accuracy">#ctv-attribution-accuracy</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPv6’s privacy features—rapid address rotation, prefix reassignment, and massive address space—are breaking traditional digital advertising measurement, with CTV feeling the impact first. IPinfo solves this with a research-grade, measurement-based IPv6 model built from active probing, topology validation, and global-scale datasets that provide accurate geolocation, network type, attribution signals, and fraud detection across all channels.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 07 Jan 2026 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6d49ff0b/d406e4b7.mp3" length="6508992" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_jNl9K2Q6LUx6yzUg0yzXZTlSI10laUn31yw6bhfn7I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNjdh/ODEwMjNkNWUyYTYz/MDU1NDU1NjI3YTUx/ZDk0NC5qcGVn.jpg"/>
      <itunes:duration>814</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel">https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel</a>.
            <br> IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/networking">#networking</a>, <a href="https://hackernoon.com/tagged/ipv6-advertising-measurement">#ipv6-advertising-measurement</a>, <a href="https://hackernoon.com/tagged/ipv6-geolocation-challenges">#ipv6-geolocation-challenges</a>, <a href="https://hackernoon.com/tagged/ctv-frequency-capping-issues">#ctv-frequency-capping-issues</a>, <a href="https://hackernoon.com/tagged/ipv6-data-intelligence">#ipv6-data-intelligence</a>, <a href="https://hackernoon.com/tagged/ipv6-active-measurement">#ipv6-active-measurement</a>, <a href="https://hackernoon.com/tagged/ctv-attribution-accuracy">#ctv-attribution-accuracy</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPv6’s privacy features—rapid address rotation, prefix reassignment, and massive address space—are breaking traditional digital advertising measurement, with CTV feeling the impact first. IPinfo solves this with a research-grade, measurement-based IPv6 model built from active probing, topology validation, and global-scale datasets that provide accurate geolocation, network type, attribution signals, and fraud detection across all channels.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>networking,ipv6-advertising-measurement,ipv6-geolocation-challenges,ctv-frequency-capping-issues,ipv6-data-intelligence,ipv6-active-measurement,ctv-attribution-accuracy,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Illusion of Security: How IAM Anti-Patterns Sneak into Every System</title>
      <itunes:title>The Illusion of Security: How IAM Anti-Patterns Sneak into Every System</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5c89b06-47a3-4f47-a30c-4bee9d630bd6</guid>
      <link>https://share.transistor.fm/s/96a3decf</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system">https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system</a>.
            <br> IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/identity-and-access-management">#identity-and-access-management</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/identity-management">#identity-management</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/iam-anti-patterns">#iam-anti-patterns</a>, <a href="https://hackernoon.com/tagged/the-illusion-of-security">#the-illusion-of-security</a>, <a href="https://hackernoon.com/tagged/excessive-privilege">#excessive-privilege</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IAM often creates a false sense of security. Hidden anti-patterns like excessive privileges, shared identities, and stale credentials silently grow, increasing breach risk unless continuously monitored and governed.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system">https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system</a>.
            <br> IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/identity-and-access-management">#identity-and-access-management</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/identity-management">#identity-management</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/iam-anti-patterns">#iam-anti-patterns</a>, <a href="https://hackernoon.com/tagged/the-illusion-of-security">#the-illusion-of-security</a>, <a href="https://hackernoon.com/tagged/excessive-privilege">#excessive-privilege</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IAM often creates a false sense of security. Hidden anti-patterns like excessive privileges, shared identities, and stale credentials silently grow, increasing breach risk unless continuously monitored and governed.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 02 Jan 2026 08:00:29 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/96a3decf/b27dd60f.mp3" length="3211008" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bkD7FD1kAcGLpEwU4TsxV8H5DLBkXblFl1sPMBgsd3U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYzVj/NTlmOGM0MjFhOGEx/ZDBhOWY2Zjc5Njkz/Y2NlNy5qcGVn.jpg"/>
      <itunes:duration>402</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system">https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system</a>.
            <br> IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/identity-and-access-management">#identity-and-access-management</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/identity-management">#identity-management</a>, <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/iam-anti-patterns">#iam-anti-patterns</a>, <a href="https://hackernoon.com/tagged/the-illusion-of-security">#the-illusion-of-security</a>, <a href="https://hackernoon.com/tagged/excessive-privilege">#excessive-privilege</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/atishkdash">@atishkdash</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/atishkdash">@atishkdash's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IAM often creates a false sense of security. Hidden anti-patterns like excessive privileges, shared identities, and stale credentials silently grow, increasing breach risk unless continuously monitored and governed.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>identity-and-access-management,technology,cybersecurity,identity-management,zero-trust-security,iam-anti-patterns,the-illusion-of-security,excessive-privilege</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The $50,000 PDF No One Reads: Why Your Security Audits Are Failing</title>
      <itunes:title>The $50,000 PDF No One Reads: Why Your Security Audits Are Failing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da7585eb-e5e1-48b5-8379-397e3b677ebc</guid>
      <link>https://share.transistor.fm/s/ee662460</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing">https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing</a>.
            <br> Security isn't about generating paperwork; it's about finding the cracks before the water gets in.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/audit">#audit</a>, <a href="https://hackernoon.com/tagged/automation">#automation</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-audits">#ai-audits</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/huizhudev">@huizhudev</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/huizhudev">@huizhudev's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn't about generating paperwork; it's about finding the cracks before the water gets in. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing">https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing</a>.
            <br> Security isn't about generating paperwork; it's about finding the cracks before the water gets in.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/audit">#audit</a>, <a href="https://hackernoon.com/tagged/automation">#automation</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-audits">#ai-audits</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/huizhudev">@huizhudev</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/huizhudev">@huizhudev's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn't about generating paperwork; it's about finding the cracks before the water gets in. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 31 Dec 2025 08:00:32 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/ee662460/e21f484e.mp3" length="2312256" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8uEeBpOsNBznLdBSOEZxuh_Hr35_bTcXJpUB2LnF_1Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMzhk/YjVjNjNiZjA1NGQz/NjEzMzMzNDI1MGEx/OTc4MS5wbmc.jpg"/>
      <itunes:duration>290</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing">https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing</a>.
            <br> Security isn't about generating paperwork; it's about finding the cracks before the water gets in.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/audit">#audit</a>, <a href="https://hackernoon.com/tagged/automation">#automation</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-audits">#ai-audits</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/huizhudev">@huizhudev</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/huizhudev">@huizhudev's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn't about generating paperwork; it's about finding the cracks before the water gets in. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-security,devsecops,audit,automation,ai-in-cybersecurity,ai-audits,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life</title>
      <itunes:title>Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23f6d560-9d0d-4463-8013-d6d2d45ec950</guid>
      <link>https://share.transistor.fm/s/ce648bed</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life">https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life</a>.
            <br> RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/aes-256">#aes-256</a>, <a href="https://hackernoon.com/tagged/rsa">#rsa</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dineshelumalai">@dineshelumalai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dineshelumalai">@dineshelumalai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The clock is ticking on RSA-2048. Here's why every HTTPS certificate, encrypted database, and VPN connection needs a quantum-resistant makeover before 2030.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life">https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life</a>.
            <br> RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/aes-256">#aes-256</a>, <a href="https://hackernoon.com/tagged/rsa">#rsa</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dineshelumalai">@dineshelumalai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dineshelumalai">@dineshelumalai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The clock is ticking on RSA-2048. Here's why every HTTPS certificate, encrypted database, and VPN connection needs a quantum-resistant makeover before 2030.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 26 Dec 2025 08:00:35 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/ce648bed/5c5137e2.mp3" length="4155648" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cbJonAdCDk9Ev43uQObifrPoDqiwiTv-NFVkUlnS0s4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOWRm/N2QyNGQ1NTU3ZjY3/OTNkNTVkMzA3MmFl/NzU0Ny5wbmc.jpg"/>
      <itunes:duration>520</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life">https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life</a>.
            <br> RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/technology">#technology</a>, <a href="https://hackernoon.com/tagged/software-development">#software-development</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/aes-256">#aes-256</a>, <a href="https://hackernoon.com/tagged/rsa">#rsa</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dineshelumalai">@dineshelumalai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dineshelumalai">@dineshelumalai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The clock is ticking on RSA-2048. Here's why every HTTPS certificate, encrypted database, and VPN connection needs a quantum-resistant makeover before 2030.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,encryption,technology,software-development,post-quantum-cryptography,quantum-computing,aes-256,rsa</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches</title>
      <itunes:title>Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aae84f96-29c6-4a1f-9c04-8a837d350e4f</guid>
      <link>https://share.transistor.fm/s/690c6441</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches">https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches</a>.
            <br> Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iam-risk-management">#iam-risk-management</a>, <a href="https://hackernoon.com/tagged/cloud-breach-prevention">#cloud-breach-prevention</a>, <a href="https://hackernoon.com/tagged/offensive-security-engine">#offensive-security-engine</a>, <a href="https://hackernoon.com/tagged/cloud-misconfiguration">#cloud-misconfiguration</a>, <a href="https://hackernoon.com/tagged/astra-cloud-vulnerability">#astra-cloud-vulnerability</a>, <a href="https://hackernoon.com/tagged/devops-security-integration">#devops-security-integration</a>, <a href="https://hackernoon.com/tagged/cloud-configuration-drift">#cloud-configuration-drift</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Astra’s Cloud Vulnerability Scanner targets the “oops factor” behind 73% of cloud breaches. With agentless visibility, continuous change-triggered scanning, and exploitability validation, it detects misconfigurations in IAM, storage, firewalls, APIs, and encryption in real time, helping organizations proactively prevent breaches.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches">https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches</a>.
            <br> Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iam-risk-management">#iam-risk-management</a>, <a href="https://hackernoon.com/tagged/cloud-breach-prevention">#cloud-breach-prevention</a>, <a href="https://hackernoon.com/tagged/offensive-security-engine">#offensive-security-engine</a>, <a href="https://hackernoon.com/tagged/cloud-misconfiguration">#cloud-misconfiguration</a>, <a href="https://hackernoon.com/tagged/astra-cloud-vulnerability">#astra-cloud-vulnerability</a>, <a href="https://hackernoon.com/tagged/devops-security-integration">#devops-security-integration</a>, <a href="https://hackernoon.com/tagged/cloud-configuration-drift">#cloud-configuration-drift</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Astra’s Cloud Vulnerability Scanner targets the “oops factor” behind 73% of cloud breaches. With agentless visibility, continuous change-triggered scanning, and exploitability validation, it detects misconfigurations in IAM, storage, firewalls, APIs, and encryption in real time, helping organizations proactively prevent breaches.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 25 Dec 2025 08:00:28 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/690c6441/56c95a6d.mp3" length="3960000" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/S8oG2UwtzxjallXER-KK-5GbZLf4jyq117Lz-cfqPSk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kN2I3/OTY3YmU2N2U0NTNl/NzVhYmMxNDNjMjU1/MGI5MS5qcGVn.jpg"/>
      <itunes:duration>495</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches">https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches</a>.
            <br> Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/iam-risk-management">#iam-risk-management</a>, <a href="https://hackernoon.com/tagged/cloud-breach-prevention">#cloud-breach-prevention</a>, <a href="https://hackernoon.com/tagged/offensive-security-engine">#offensive-security-engine</a>, <a href="https://hackernoon.com/tagged/cloud-misconfiguration">#cloud-misconfiguration</a>, <a href="https://hackernoon.com/tagged/astra-cloud-vulnerability">#astra-cloud-vulnerability</a>, <a href="https://hackernoon.com/tagged/devops-security-integration">#devops-security-integration</a>, <a href="https://hackernoon.com/tagged/cloud-configuration-drift">#cloud-configuration-drift</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jonstojanjournalist">@jonstojanjournalist</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jonstojanjournalist">@jonstojanjournalist's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Astra’s Cloud Vulnerability Scanner targets the “oops factor” behind 73% of cloud breaches. With agentless visibility, continuous change-triggered scanning, and exploitability validation, it detects misconfigurations in IAM, storage, firewalls, APIs, and encryption in real time, helping organizations proactively prevent breaches.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>iam-risk-management,cloud-breach-prevention,offensive-security-engine,cloud-misconfiguration,astra-cloud-vulnerability,devops-security-integration,cloud-configuration-drift,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Compliance Requirements Shape Modern Software Architecture</title>
      <itunes:title>How Compliance Requirements Shape Modern Software Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">591ac39b-85fa-4bd3-8847-d50c3e094800</guid>
      <link>https://share.transistor.fm/s/7cb772b3</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture">https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture</a>.
            <br> GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/compliance">#compliance</a>, <a href="https://hackernoon.com/tagged/software-architecture">#software-architecture</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/system-design">#system-design</a>, <a href="https://hackernoon.com/tagged/hipaa">#hipaa</a>, <a href="https://hackernoon.com/tagged/gdpr">#gdpr</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/pci-dss-infrastructure">#pci-dss-infrastructure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/eugene7773">@eugene7773</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/eugene7773">@eugene7773's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Compliance isn’t something you add later. Regulations like GDPR, HIPAA, and PCI DSS directly shape system architecture, data models, and security boundaries from day one.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture">https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture</a>.
            <br> GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/compliance">#compliance</a>, <a href="https://hackernoon.com/tagged/software-architecture">#software-architecture</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/system-design">#system-design</a>, <a href="https://hackernoon.com/tagged/hipaa">#hipaa</a>, <a href="https://hackernoon.com/tagged/gdpr">#gdpr</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/pci-dss-infrastructure">#pci-dss-infrastructure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/eugene7773">@eugene7773</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/eugene7773">@eugene7773's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Compliance isn’t something you add later. Regulations like GDPR, HIPAA, and PCI DSS directly shape system architecture, data models, and security boundaries from day one.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 25 Dec 2025 08:00:25 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/7cb772b3/f35b6c87.mp3" length="2070912" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_R57yv4b5WhlijIqq2OPK6_K0xBElsPHct7v8Rg4yU4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NDNm/YWY5ODE2ODg4NzBj/MjI2ZWFlMjVkMWMx/MWE3Mi5wbmc.jpg"/>
      <itunes:duration>259</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture">https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture</a>.
            <br> GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/compliance">#compliance</a>, <a href="https://hackernoon.com/tagged/software-architecture">#software-architecture</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/system-design">#system-design</a>, <a href="https://hackernoon.com/tagged/hipaa">#hipaa</a>, <a href="https://hackernoon.com/tagged/gdpr">#gdpr</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/pci-dss-infrastructure">#pci-dss-infrastructure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/eugene7773">@eugene7773</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/eugene7773">@eugene7773's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Compliance isn’t something you add later. Regulations like GDPR, HIPAA, and PCI DSS directly shape system architecture, data models, and security boundaries from day one.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>compliance,software-architecture,data-privacy,system-design,hipaa,gdpr,data-protection,pci-dss-infrastructure</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Markup's Blacklight Tool Now Has New Tracking Info and Caching Options</title>
      <itunes:title>The Markup's Blacklight Tool Now Has New Tracking Info and Caching Options</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a0789e0-7638-4e16-8731-f6fff3a108b1</guid>
      <link>https://share.transistor.fm/s/f07a9529</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options">https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options</a>.
            <br> Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/privacy-tools">#privacy-tools</a>, <a href="https://hackernoon.com/tagged/blacklight">#blacklight</a>, <a href="https://hackernoon.com/tagged/cache-override">#cache-override</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/privacy-detector">#privacy-detector</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tool">#cybersecurity-tool</a>, <a href="https://hackernoon.com/tagged/online-tracking">#online-tracking</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We’ve added the option to ‘force’ a request, overriding Blacklight’s cache and triggering a brand-new scan of the page. This option is off by default, and can be set from the ‘options’ dropdown.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options">https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options</a>.
            <br> Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/privacy-tools">#privacy-tools</a>, <a href="https://hackernoon.com/tagged/blacklight">#blacklight</a>, <a href="https://hackernoon.com/tagged/cache-override">#cache-override</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/privacy-detector">#privacy-detector</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tool">#cybersecurity-tool</a>, <a href="https://hackernoon.com/tagged/online-tracking">#online-tracking</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We’ve added the option to ‘force’ a request, overriding Blacklight’s cache and triggering a brand-new scan of the page. This option is off by default, and can be set from the ‘options’ dropdown.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 22 Dec 2025 08:00:36 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/f07a9529/952fc601.mp3" length="1007424" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3sA8NJnHp37WPppWpsVa6XGK-zYUivM6p8jGYiYtGXg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZDhl/NjhjNjdmY2FmNjQ4/NThlZDU4MWE0M2M3/ZjI0ZS5qcGVn.jpg"/>
      <itunes:duration>126</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options">https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options</a>.
            <br> Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/privacy-tools">#privacy-tools</a>, <a href="https://hackernoon.com/tagged/blacklight">#blacklight</a>, <a href="https://hackernoon.com/tagged/cache-override">#cache-override</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/privacy-detector">#privacy-detector</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tool">#cybersecurity-tool</a>, <a href="https://hackernoon.com/tagged/online-tracking">#online-tracking</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We’ve added the option to ‘force’ a request, overriding Blacklight’s cache and triggering a brand-new scan of the page. This option is off by default, and can be set from the ‘options’ dropdown.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>privacy,privacy-tools,blacklight,cache-override,the-markup,privacy-detector,cybersecurity-tool,online-tracking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Should You Trust Your VPN Location?</title>
      <itunes:title>Should You Trust Your VPN Location?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">513da75c-c892-4a43-a5ed-43a977e582a3</guid>
      <link>https://share.transistor.fm/s/94d89e6c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/should-you-trust-your-vpn-location">https://hackernoon.com/should-you-trust-your-vpn-location</a>.
            <br> IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/virtual-vpn-locations">#virtual-vpn-locations</a>, <a href="https://hackernoon.com/tagged/vpn-location-accuracy">#vpn-location-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-data">#ip-geolocation-data</a>, <a href="https://hackernoon.com/tagged/probenet-measurement">#probenet-measurement</a>, <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/vpn-country-mismatch">#vpn-country-mismatch</a>, <a href="https://hackernoon.com/tagged/ipinfo-geolocation-api">#ipinfo-geolocation-api</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPinfo analyzed 20 major VPN providers and found most don’t route traffic through the countries they claim. Using ProbeNet’s real-time internet measurements, IPinfo uncovered widespread use of virtual locations, country mismatches spanning thousands of kilometers, and major inaccuracies in legacy IP datasets—showing why evidence-based IP geolocation matters for trust, security, and compliance.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/should-you-trust-your-vpn-location">https://hackernoon.com/should-you-trust-your-vpn-location</a>.
            <br> IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/virtual-vpn-locations">#virtual-vpn-locations</a>, <a href="https://hackernoon.com/tagged/vpn-location-accuracy">#vpn-location-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-data">#ip-geolocation-data</a>, <a href="https://hackernoon.com/tagged/probenet-measurement">#probenet-measurement</a>, <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/vpn-country-mismatch">#vpn-country-mismatch</a>, <a href="https://hackernoon.com/tagged/ipinfo-geolocation-api">#ipinfo-geolocation-api</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPinfo analyzed 20 major VPN providers and found most don’t route traffic through the countries they claim. Using ProbeNet’s real-time internet measurements, IPinfo uncovered widespread use of virtual locations, country mismatches spanning thousands of kilometers, and major inaccuracies in legacy IP datasets—showing why evidence-based IP geolocation matters for trust, security, and compliance.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 21 Dec 2025 08:00:20 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/94d89e6c/4e6939ba.mp3" length="7407552" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/scX-jVaqvr1UnhhwdLBgfbJpb82MSk4KX6Fvp-X-ahY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTU4/YjhkZTViZGM3MmNk/MDk3ZTRjZWQ3ZTFm/ZDNkYy5qcGVn.jpg"/>
      <itunes:duration>926</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/should-you-trust-your-vpn-location">https://hackernoon.com/should-you-trust-your-vpn-location</a>.
            <br> IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/virtual-vpn-locations">#virtual-vpn-locations</a>, <a href="https://hackernoon.com/tagged/vpn-location-accuracy">#vpn-location-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-data">#ip-geolocation-data</a>, <a href="https://hackernoon.com/tagged/probenet-measurement">#probenet-measurement</a>, <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/vpn-country-mismatch">#vpn-country-mismatch</a>, <a href="https://hackernoon.com/tagged/ipinfo-geolocation-api">#ipinfo-geolocation-api</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                IPinfo analyzed 20 major VPN providers and found most don’t route traffic through the countries they claim. Using ProbeNet’s real-time internet measurements, IPinfo uncovered widespread use of virtual locations, country mismatches spanning thousands of kilometers, and major inaccuracies in legacy IP datasets—showing why evidence-based IP geolocation matters for trust, security, and compliance.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>virtual-vpn-locations,vpn-location-accuracy,ip-geolocation-data,probenet-measurement,ip-data-accuracy,vpn-country-mismatch,ipinfo-geolocation-api,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SAIS-GRC Framework: Establishing Trust and Enhancing Resilience in AI-Driven Supply Chains</title>
      <itunes:title>SAIS-GRC Framework: Establishing Trust and Enhancing Resilience in AI-Driven Supply Chains</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f1b2bcf6-212b-4dbd-b9cd-7262eb57d2d9</guid>
      <link>https://share.transistor.fm/s/d4fc2726</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains">https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains</a>.
            <br> The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-supply-chain">#ai-supply-chain</a>, <a href="https://hackernoon.com/tagged/grc">#grc</a>, <a href="https://hackernoon.com/tagged/supply-chain-management">#supply-chain-management</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/sais-grc-framework">#sais-grc-framework</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains">https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains</a>.
            <br> The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-supply-chain">#ai-supply-chain</a>, <a href="https://hackernoon.com/tagged/grc">#grc</a>, <a href="https://hackernoon.com/tagged/supply-chain-management">#supply-chain-management</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/sais-grc-framework">#sais-grc-framework</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 20 Dec 2025 08:00:34 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/d4fc2726/c05f0fde.mp3" length="9026688" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Q9S4OKHsTmpFUcw22fHYoItTn1Npu6PJRFsXjmSrxRM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xODBh/ZDUyYzA2MGFlZTBm/ZGY3ODM4NTUzNGM2/MjZhMy5qcGVn.jpg"/>
      <itunes:duration>1129</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains">https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains</a>.
            <br> The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-supply-chain">#ai-supply-chain</a>, <a href="https://hackernoon.com/tagged/grc">#grc</a>, <a href="https://hackernoon.com/tagged/supply-chain-management">#supply-chain-management</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/sais-grc-framework">#sais-grc-framework</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,generative-ai,ai,ai-supply-chain,grc,supply-chain-management,information-security,sais-grc-framework</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Quantum Security Governance: Building a Framework for the Post-Quantum World</title>
      <itunes:title>Quantum Security Governance: Building a Framework for the Post-Quantum World</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91a8b243-6e36-4ae8-8335-0acae8e124df</guid>
      <link>https://share.transistor.fm/s/5c90628c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world">https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world</a>.
            <br> The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-cryptography">#quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum">#quantum</a>, <a href="https://hackernoon.com/tagged/quantum-security">#quantum-security</a>, <a href="https://hackernoon.com/tagged/quantum-security-governance">#quantum-security-governance</a>, <a href="https://hackernoon.com/tagged/security-frameworks">#security-frameworks</a>, <a href="https://hackernoon.com/tagged/cybersecurity-impact">#cybersecurity-impact</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/vidyasagarmsc">@vidyasagarmsc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/vidyasagarmsc">@vidyasagarmsc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum security is about creating a structured approach to managing cryptographic risk in an environment where the threat landscape is evolving faster than our ability to respond. Unlike post-quantum cryptography, which focuses on algorithm-level resistance to quantum attacks, quantum security encompasses the broader governance, compliance, and strategic governance.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world">https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world</a>.
            <br> The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-cryptography">#quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum">#quantum</a>, <a href="https://hackernoon.com/tagged/quantum-security">#quantum-security</a>, <a href="https://hackernoon.com/tagged/quantum-security-governance">#quantum-security-governance</a>, <a href="https://hackernoon.com/tagged/security-frameworks">#security-frameworks</a>, <a href="https://hackernoon.com/tagged/cybersecurity-impact">#cybersecurity-impact</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/vidyasagarmsc">@vidyasagarmsc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/vidyasagarmsc">@vidyasagarmsc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum security is about creating a structured approach to managing cryptographic risk in an environment where the threat landscape is evolving faster than our ability to respond. Unlike post-quantum cryptography, which focuses on algorithm-level resistance to quantum attacks, quantum security encompasses the broader governance, compliance, and strategic governance.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 20 Dec 2025 08:00:32 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/5c90628c/5583c655.mp3" length="7419840" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hpyC_8HGVuyFVPEvY65Gv6thLP8a0VoHaA0TbXVz6bs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ODY4/MDM5ZDQ3ZDk2NGM4/NTdiNjA2MDc0Nzc2/MTYxNC5qcGVn.jpg"/>
      <itunes:duration>928</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world">https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world</a>.
            <br> The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-cryptography">#quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum">#quantum</a>, <a href="https://hackernoon.com/tagged/quantum-security">#quantum-security</a>, <a href="https://hackernoon.com/tagged/quantum-security-governance">#quantum-security-governance</a>, <a href="https://hackernoon.com/tagged/security-frameworks">#security-frameworks</a>, <a href="https://hackernoon.com/tagged/cybersecurity-impact">#cybersecurity-impact</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/vidyasagarmsc">@vidyasagarmsc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/vidyasagarmsc">@vidyasagarmsc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum security is about creating a structured approach to managing cryptographic risk in an environment where the threat landscape is evolving faster than our ability to respond. Unlike post-quantum cryptography, which focuses on algorithm-level resistance to quantum attacks, quantum security encompasses the broader governance, compliance, and strategic governance.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,post-quantum-cryptography,quantum-cryptography,quantum,quantum-security,quantum-security-governance,security-frameworks,cybersecurity-impact</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why One Lock Isn’t Enough: How Buburuza Designs Multi-Layer Security for AI Banking</title>
      <itunes:title>Why One Lock Isn’t Enough: How Buburuza Designs Multi-Layer Security for AI Banking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0eb4fde5-94e1-498a-99f8-174a09c4b4c2</guid>
      <link>https://share.transistor.fm/s/5db9bb88</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking">https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking</a>.
            <br> Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-banking-security">#ai-banking-security</a>, <a href="https://hackernoon.com/tagged/deepfake-fraud">#deepfake-fraud</a>, <a href="https://hackernoon.com/tagged/ai-enabled-cyber-threats">#ai-enabled-cyber-threats</a>, <a href="https://hackernoon.com/tagged/banking-risk-management">#banking-risk-management</a>, <a href="https://hackernoon.com/tagged/buburuza-ai-bank">#buburuza-ai-bank</a>, <a href="https://hackernoon.com/tagged/multi-agentic-security">#multi-agentic-security</a>, <a href="https://hackernoon.com/tagged/financial-fraud-prevention">#financial-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Buburuza COO Grygoriy Bakalor explains why AI banking security must go beyond single-layer encryption. With deepfake fraud surging and breaches eroding trust, banks need multi-layer, multi-agentic defenses that isolate threats, prevent insider risk, and protect users even from mistakes—delivering security that works invisibly but decisively when needed.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking">https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking</a>.
            <br> Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-banking-security">#ai-banking-security</a>, <a href="https://hackernoon.com/tagged/deepfake-fraud">#deepfake-fraud</a>, <a href="https://hackernoon.com/tagged/ai-enabled-cyber-threats">#ai-enabled-cyber-threats</a>, <a href="https://hackernoon.com/tagged/banking-risk-management">#banking-risk-management</a>, <a href="https://hackernoon.com/tagged/buburuza-ai-bank">#buburuza-ai-bank</a>, <a href="https://hackernoon.com/tagged/multi-agentic-security">#multi-agentic-security</a>, <a href="https://hackernoon.com/tagged/financial-fraud-prevention">#financial-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Buburuza COO Grygoriy Bakalor explains why AI banking security must go beyond single-layer encryption. With deepfake fraud surging and breaches eroding trust, banks need multi-layer, multi-agentic defenses that isolate threats, prevent insider risk, and protect users even from mistakes—delivering security that works invisibly but decisively when needed.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 19 Dec 2025 08:00:43 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/5db9bb88/46e2afa7.mp3" length="2761920" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GLwK_bh-S8zplV_Xt6GMq1AtDCdxkKUAsJyzirOsq9c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMTE3/MzdjNWVlMjc1Mjk1/ODg0Yzc3ZDdkYWM2/MzNiNC5wbmc.jpg"/>
      <itunes:duration>346</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking">https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking</a>.
            <br> Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-banking-security">#ai-banking-security</a>, <a href="https://hackernoon.com/tagged/deepfake-fraud">#deepfake-fraud</a>, <a href="https://hackernoon.com/tagged/ai-enabled-cyber-threats">#ai-enabled-cyber-threats</a>, <a href="https://hackernoon.com/tagged/banking-risk-management">#banking-risk-management</a>, <a href="https://hackernoon.com/tagged/buburuza-ai-bank">#buburuza-ai-bank</a>, <a href="https://hackernoon.com/tagged/multi-agentic-security">#multi-agentic-security</a>, <a href="https://hackernoon.com/tagged/financial-fraud-prevention">#financial-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Buburuza COO Grygoriy Bakalor explains why AI banking security must go beyond single-layer encryption. With deepfake fraud surging and breaches eroding trust, banks need multi-layer, multi-agentic defenses that isolate threats, prevent insider risk, and protect users even from mistakes—delivering security that works invisibly but decisively when needed.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ai-banking-security,deepfake-fraud,ai-enabled-cyber-threats,banking-risk-management,buburuza-ai-bank,multi-agentic-security,financial-fraud-prevention,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Hidden Cost of Invalid Traffic: Why IP Data Is the Missing Link</title>
      <itunes:title>The Hidden Cost of Invalid Traffic: Why IP Data Is the Missing Link</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d4f75db-4f45-4af6-8eec-4a15533c8195</guid>
      <link>https://share.transistor.fm/s/1f0218f1</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link">https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link</a>.
            <br> IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-address-intelligence">#ip-address-intelligence</a>, <a href="https://hackernoon.com/tagged/ip-data-for-adtech">#ip-data-for-adtech</a>, <a href="https://hackernoon.com/tagged/invalid-traffic-detection">#invalid-traffic-detection</a>, <a href="https://hackernoon.com/tagged/residential-proxy-detection">#residential-proxy-detection</a>, <a href="https://hackernoon.com/tagged/digital-advertising-accuracy">#digital-advertising-accuracy</a>, <a href="https://hackernoon.com/tagged/bot-traffic-mitigation">#bot-traffic-mitigation</a>, <a href="https://hackernoon.com/tagged/advertising-fraud-prevention">#advertising-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Invalid traffic (IVT) is draining billions from advertising budgets as bots, VPNs, and residential proxies distort CPMs, attribution, and ROI. IPinfo prevents these losses by identifying non-human traffic at the IP level using continuously validated, measurement-based IP intelligence. With real-time proxy/VPN detection, active IPv6/IPv4 validation, and high-accuracy enrichment, platforms can block IVT before it enters auctions—leading to cleaner supply, better performance, and stronger ROI.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link">https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link</a>.
            <br> IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-address-intelligence">#ip-address-intelligence</a>, <a href="https://hackernoon.com/tagged/ip-data-for-adtech">#ip-data-for-adtech</a>, <a href="https://hackernoon.com/tagged/invalid-traffic-detection">#invalid-traffic-detection</a>, <a href="https://hackernoon.com/tagged/residential-proxy-detection">#residential-proxy-detection</a>, <a href="https://hackernoon.com/tagged/digital-advertising-accuracy">#digital-advertising-accuracy</a>, <a href="https://hackernoon.com/tagged/bot-traffic-mitigation">#bot-traffic-mitigation</a>, <a href="https://hackernoon.com/tagged/advertising-fraud-prevention">#advertising-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Invalid traffic (IVT) is draining billions from advertising budgets as bots, VPNs, and residential proxies distort CPMs, attribution, and ROI. IPinfo prevents these losses by identifying non-human traffic at the IP level using continuously validated, measurement-based IP intelligence. With real-time proxy/VPN detection, active IPv6/IPv4 validation, and high-accuracy enrichment, platforms can block IVT before it enters auctions—leading to cleaner supply, better performance, and stronger ROI.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 19 Dec 2025 08:00:41 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/1f0218f1/06a004d1.mp3" length="2263488" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3THYkPuUH1_NDlwCv9DLhUvsvQKMEw-dcLLoyYemFE0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iM2Jl/ODNlMWI1YTZjMTc5/YTc2YzA1MDlkMGJk/Mjc5Ny5qcGVn.jpg"/>
      <itunes:duration>283</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link">https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link</a>.
            <br> IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-address-intelligence">#ip-address-intelligence</a>, <a href="https://hackernoon.com/tagged/ip-data-for-adtech">#ip-data-for-adtech</a>, <a href="https://hackernoon.com/tagged/invalid-traffic-detection">#invalid-traffic-detection</a>, <a href="https://hackernoon.com/tagged/residential-proxy-detection">#residential-proxy-detection</a>, <a href="https://hackernoon.com/tagged/digital-advertising-accuracy">#digital-advertising-accuracy</a>, <a href="https://hackernoon.com/tagged/bot-traffic-mitigation">#bot-traffic-mitigation</a>, <a href="https://hackernoon.com/tagged/advertising-fraud-prevention">#advertising-fraud-prevention</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Invalid traffic (IVT) is draining billions from advertising budgets as bots, VPNs, and residential proxies distort CPMs, attribution, and ROI. IPinfo prevents these losses by identifying non-human traffic at the IP level using continuously validated, measurement-based IP intelligence. With real-time proxy/VPN detection, active IPv6/IPv4 validation, and high-accuracy enrichment, platforms can block IVT before it enters auctions—leading to cleaner supply, better performance, and stronger ROI.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ip-address-intelligence,ip-data-for-adtech,invalid-traffic-detection,residential-proxy-detection,digital-advertising-accuracy,bot-traffic-mitigation,advertising-fraud-prevention,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Battle for the Borders: How AI and Cyber Intelligence Are Reshaping Statecraft</title>
      <itunes:title>The Battle for the Borders: How AI and Cyber Intelligence Are Reshaping Statecraft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c35755f-031c-4982-abd8-7d5d055ea982</guid>
      <link>https://share.transistor.fm/s/7b675a56</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft">https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft</a>.
            <br> From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/cyber-intelligence">#cyber-intelligence</a>, <a href="https://hackernoon.com/tagged/state-cybersecurity">#state-cybersecurity</a>, <a href="https://hackernoon.com/tagged/palantir">#palantir</a>, <a href="https://hackernoon.com/tagged/babel">#babel</a>, <a href="https://hackernoon.com/tagged/fivecast">#fivecast</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nicafurs">@nicafurs</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nicafurs">@nicafurs's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft">https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft</a>.
            <br> From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/cyber-intelligence">#cyber-intelligence</a>, <a href="https://hackernoon.com/tagged/state-cybersecurity">#state-cybersecurity</a>, <a href="https://hackernoon.com/tagged/palantir">#palantir</a>, <a href="https://hackernoon.com/tagged/babel">#babel</a>, <a href="https://hackernoon.com/tagged/fivecast">#fivecast</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nicafurs">@nicafurs</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nicafurs">@nicafurs's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 18 Dec 2025 08:00:41 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/7b675a56/1419c935.mp3" length="4499712" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/35CIe1KHlmON7fH60rkJK36H2eXRDeXoGc-knRdjhMY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MTZl/YmYxZDM4YzQ1ODRh/NmRlY2FiM2U1MWY5/OGE4Zi5qcGVn.jpg"/>
      <itunes:duration>563</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft">https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft</a>.
            <br> From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/cyber-intelligence">#cyber-intelligence</a>, <a href="https://hackernoon.com/tagged/state-cybersecurity">#state-cybersecurity</a>, <a href="https://hackernoon.com/tagged/palantir">#palantir</a>, <a href="https://hackernoon.com/tagged/babel">#babel</a>, <a href="https://hackernoon.com/tagged/fivecast">#fivecast</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/nicafurs">@nicafurs</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/nicafurs">@nicafurs's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai,cyber-intelligence,state-cybersecurity,palantir,babel,fivecast,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies In 2026</title>
      <itunes:title>Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies In 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b1c65970-b3e0-4498-aceb-1dd476e59927</guid>
      <link>https://share.transistor.fm/s/948e006e</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026">https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026</a>.
            <br> DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/link11">#link11</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/link11-announcement">#link11-announcement</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/crypto-exchange">#crypto-exchange</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Link11 has identified five developments expected to define the cybersecurity environment for European organizations in the year ahead. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026">https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026</a>.
            <br> DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/link11">#link11</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/link11-announcement">#link11-announcement</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/crypto-exchange">#crypto-exchange</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Link11 has identified five developments expected to define the cybersecurity environment for European organizations in the year ahead. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 17 Dec 2025 08:00:47 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/948e006e/eddb7e1f.mp3" length="3253440" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RdsZiFaBrYkrJWJ9jC8Z8KEWIb8iWakiLBRhddmO2Fw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTM5/YWVkY2U4YmUwYzU4/M2M4ZmFiYzY4MDNk/Mjg0My5qcGVn.jpg"/>
      <itunes:duration>407</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026">https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026</a>.
            <br> DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/link11">#link11</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/link11-announcement">#link11-announcement</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/crypto-exchange">#crypto-exchange</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Link11 has identified five developments expected to define the cybersecurity environment for European organizations in the year ahead. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,link11,cybernewswire,press-release,link11-announcement,blockchain-development,crypto-exchange,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Debunking the "99.8% Accurate IP Data" Claim</title>
      <itunes:title>Debunking the "99.8% Accurate IP Data" Claim</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">046d8027-4a0a-4b34-ba75-7c068effb96a</guid>
      <link>https://share.transistor.fm/s/9317ab17</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim">https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim</a>.
            <br> IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/ipinfo-probenet">#ipinfo-probenet</a>, <a href="https://hackernoon.com/tagged/ip-intelligence-reliability">#ip-intelligence-reliability</a>, <a href="https://hackernoon.com/tagged/ip-address-verification">#ip-address-verification</a>, <a href="https://hackernoon.com/tagged/ip-data-measurement">#ip-data-measurement</a>, <a href="https://hackernoon.com/tagged/ipv4-ipv6-data-validation">#ipv4-ipv6-data-validation</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most “99%+ accurate” IP geolocation claims are misleading because there’s no shared dataset, no standard methodology, and no way to validate global accuracy across billions of constantly changing IPs. IPinfo rejects the industry’s accuracy theater and instead uses continuous measurement, transparency, and real-world validation to deliver trustworthy, evidence-backed IP data accuracy.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim">https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim</a>.
            <br> IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/ipinfo-probenet">#ipinfo-probenet</a>, <a href="https://hackernoon.com/tagged/ip-intelligence-reliability">#ip-intelligence-reliability</a>, <a href="https://hackernoon.com/tagged/ip-address-verification">#ip-address-verification</a>, <a href="https://hackernoon.com/tagged/ip-data-measurement">#ip-data-measurement</a>, <a href="https://hackernoon.com/tagged/ipv4-ipv6-data-validation">#ipv4-ipv6-data-validation</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most “99%+ accurate” IP geolocation claims are misleading because there’s no shared dataset, no standard methodology, and no way to validate global accuracy across billions of constantly changing IPs. IPinfo rejects the industry’s accuracy theater and instead uses continuous measurement, transparency, and real-world validation to deliver trustworthy, evidence-backed IP data accuracy.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 17 Dec 2025 08:00:45 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/9317ab17/59fe4ba9.mp3" length="3826368" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/uYS6MFvLEfeX_xm2jhp85R8UxNFluBbx5ZmM5GTqY_A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZTI5/OWUzMDU4MDRkN2Vj/ZjdkMmMzNmU5MDVh/NTdlMi5qcGVn.jpg"/>
      <itunes:duration>479</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim">https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim</a>.
            <br> IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-data-accuracy">#ip-data-accuracy</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/ipinfo-probenet">#ipinfo-probenet</a>, <a href="https://hackernoon.com/tagged/ip-intelligence-reliability">#ip-intelligence-reliability</a>, <a href="https://hackernoon.com/tagged/ip-address-verification">#ip-address-verification</a>, <a href="https://hackernoon.com/tagged/ip-data-measurement">#ip-data-measurement</a>, <a href="https://hackernoon.com/tagged/ipv4-ipv6-data-validation">#ipv4-ipv6-data-validation</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Most “99%+ accurate” IP geolocation claims are misleading because there’s no shared dataset, no standard methodology, and no way to validate global accuracy across billions of constantly changing IPs. IPinfo rejects the industry’s accuracy theater and instead uses continuous measurement, transparency, and real-world validation to deliver trustworthy, evidence-backed IP data accuracy.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ip-data-accuracy,ip-geolocation-accuracy,ipinfo-probenet,ip-intelligence-reliability,ip-address-verification,ip-data-measurement,ipv4-ipv6-data-validation,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)</title>
      <itunes:title>What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d7637db-1caa-436a-b544-f8ff3b899686</guid>
      <link>https://share.transistor.fm/s/2eec6af2</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming">https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming</a>.
            <br> What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/govtech-user-experience">#govtech-user-experience</a>, <a href="https://hackernoon.com/tagged/govtech">#govtech</a>, <a href="https://hackernoon.com/tagged/opensource">#opensource</a>, <a href="https://hackernoon.com/tagged/webdev">#webdev</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/legacy-cms">#legacy-cms</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/civicmeshflow">@civicmeshflow</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/civicmeshflow">@civicmeshflow's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming">https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming</a>.
            <br> What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/govtech-user-experience">#govtech-user-experience</a>, <a href="https://hackernoon.com/tagged/govtech">#govtech</a>, <a href="https://hackernoon.com/tagged/opensource">#opensource</a>, <a href="https://hackernoon.com/tagged/webdev">#webdev</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/legacy-cms">#legacy-cms</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/civicmeshflow">@civicmeshflow</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/civicmeshflow">@civicmeshflow's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 08:01:11 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/2eec6af2/e079ba68.mp3" length="4528896" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rEx_sCdYubCkVQ0RiPnqXLX5QvxtTy3KLNj9SywtPyM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMjRh/MjAzODZkNWNhNTJi/NDFmZjc3ZmJlYmQx/YjM2NC5qcGVn.jpg"/>
      <itunes:duration>567</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming">https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming</a>.
            <br> What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/govtech-user-experience">#govtech-user-experience</a>, <a href="https://hackernoon.com/tagged/govtech">#govtech</a>, <a href="https://hackernoon.com/tagged/opensource">#opensource</a>, <a href="https://hackernoon.com/tagged/webdev">#webdev</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/legacy-cms">#legacy-cms</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/civicmeshflow">@civicmeshflow</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/civicmeshflow">@civicmeshflow's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>web-security,cybersecurity,govtech-user-experience,govtech,opensource,webdev,devops,legacy-cms</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SASE Meets Edge AI: Why Security Will Be Decided in the First Millisecond</title>
      <itunes:title>SASE Meets Edge AI: Why Security Will Be Decided in the First Millisecond</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b7598278-8fb7-4113-b644-274e59cc6785</guid>
      <link>https://share.transistor.fm/s/ab941961</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond">https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond</a>.
            <br> In security, milliseconds decide trust. Why Edge AI must judge every packet instantly to prevent threats without killing performance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/edge-ai">#edge-ai</a>, <a href="https://hackernoon.com/tagged/sase">#sase</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>, <a href="https://hackernoon.com/tagged/enterprise-ai-infrastructure">#enterprise-ai-infrastructure</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/latency-optimization">#latency-optimization</a>, <a href="https://hackernoon.com/tagged/cloud-native-security">#cloud-native-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dhavalpowar">@dhavalpowar</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dhavalpowar">@dhavalpowar's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Enterprise security is shifting to the edge, where the first millisecond of every connection determines trust, performance, and risk. Traditional SASE cannot keep pace with encrypted traffic, global latency, and attacker speed. Edge AI changes the model by making sub-millisecond, context-aware decisions directly at ingress, turning security into an instantaneous, distributed judgment system.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond">https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond</a>.
            <br> In security, milliseconds decide trust. Why Edge AI must judge every packet instantly to prevent threats without killing performance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/edge-ai">#edge-ai</a>, <a href="https://hackernoon.com/tagged/sase">#sase</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>, <a href="https://hackernoon.com/tagged/enterprise-ai-infrastructure">#enterprise-ai-infrastructure</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/latency-optimization">#latency-optimization</a>, <a href="https://hackernoon.com/tagged/cloud-native-security">#cloud-native-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dhavalpowar">@dhavalpowar</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dhavalpowar">@dhavalpowar's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Enterprise security is shifting to the edge, where the first millisecond of every connection determines trust, performance, and risk. Traditional SASE cannot keep pace with encrypted traffic, global latency, and attacker speed. Edge AI changes the model by making sub-millisecond, context-aware decisions directly at ingress, turning security into an instantaneous, distributed judgment system.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 08:01:08 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/ab941961/1dd29275.mp3" length="6397632" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xkaz2HvR3w4vm_y0nat5ykmChWyeA1i9Kugc9BDW-Ys/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzMx/Yjc1OTNiYjAzMTlh/ODEyMGJhZWY0ZWJl/ZWIyYS5wbmc.jpg"/>
      <itunes:duration>800</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond">https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond</a>.
            <br> In security, milliseconds decide trust. Why Edge AI must judge every packet instantly to prevent threats without killing performance. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-network-accesss">#zero-trust-network-accesss</a>, <a href="https://hackernoon.com/tagged/edge-ai">#edge-ai</a>, <a href="https://hackernoon.com/tagged/sase">#sase</a>, <a href="https://hackernoon.com/tagged/network-security">#network-security</a>, <a href="https://hackernoon.com/tagged/enterprise-ai-infrastructure">#enterprise-ai-infrastructure</a>, <a href="https://hackernoon.com/tagged/cyber-resilience">#cyber-resilience</a>, <a href="https://hackernoon.com/tagged/latency-optimization">#latency-optimization</a>, <a href="https://hackernoon.com/tagged/cloud-native-security">#cloud-native-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dhavalpowar">@dhavalpowar</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dhavalpowar">@dhavalpowar's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Enterprise security is shifting to the edge, where the first millisecond of every connection determines trust, performance, and risk. Traditional SASE cannot keep pace with encrypted traffic, global latency, and attacker speed. Edge AI changes the model by making sub-millisecond, context-aware decisions directly at ingress, turning security into an instantaneous, distributed judgment system.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>zero-trust-network-accesss,edge-ai,sase,network-security,enterprise-ai-infrastructure,cyber-resilience,latency-optimization,cloud-native-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Hidden Cost of “Free” Apps and the Battle for Your Attention </title>
      <itunes:title>The Hidden Cost of “Free” Apps and the Battle for Your Attention </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b466c26d-6840-48a3-bb30-98bd015a3841</guid>
      <link>https://share.transistor.fm/s/1d8d5ebb</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention">https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention</a>.
            <br> The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/apps">#apps</a>, <a href="https://hackernoon.com/tagged/free-apps">#free-apps</a>, <a href="https://hackernoon.com/tagged/targeted-ads">#targeted-ads</a>, <a href="https://hackernoon.com/tagged/affiliate-marketing">#affiliate-marketing</a>, <a href="https://hackernoon.com/tagged/data-resale">#data-resale</a>, <a href="https://hackernoon.com/tagged/hidden-cost-of-ads">#hidden-cost-of-ads</a>, <a href="https://hackernoon.com/tagged/psychology-in-app-development">#psychology-in-app-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mark-smith">@mark-smith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mark-smith">@mark-smith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. Features like infinite scroll, autoplay, and push notifications aren't about convenience; they’re designed to override your natural stopping cues. Regaining control over attention requires conscious digital habits, platform accountability, and greater public awareness of manipulative design.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention">https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention</a>.
            <br> The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/apps">#apps</a>, <a href="https://hackernoon.com/tagged/free-apps">#free-apps</a>, <a href="https://hackernoon.com/tagged/targeted-ads">#targeted-ads</a>, <a href="https://hackernoon.com/tagged/affiliate-marketing">#affiliate-marketing</a>, <a href="https://hackernoon.com/tagged/data-resale">#data-resale</a>, <a href="https://hackernoon.com/tagged/hidden-cost-of-ads">#hidden-cost-of-ads</a>, <a href="https://hackernoon.com/tagged/psychology-in-app-development">#psychology-in-app-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mark-smith">@mark-smith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mark-smith">@mark-smith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. Features like infinite scroll, autoplay, and push notifications aren't about convenience; they’re designed to override your natural stopping cues. Regaining control over attention requires conscious digital habits, platform accountability, and greater public awareness of manipulative design.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 14 Dec 2025 08:00:23 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/1d8d5ebb/2388e5ef.mp3" length="3453888" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sYIhc6fmUm-_AVD3u0Ex1p5zFrf76SY8oF6nXRVz_4c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjBk/NjdiYzJhMTU2OTgw/NTRjNGUwYTAyNWU1/MDlkMi5wbmc.jpg"/>
      <itunes:duration>432</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention">https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention</a>.
            <br> The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity-awareness">#cybersecurity-awareness</a>, <a href="https://hackernoon.com/tagged/apps">#apps</a>, <a href="https://hackernoon.com/tagged/free-apps">#free-apps</a>, <a href="https://hackernoon.com/tagged/targeted-ads">#targeted-ads</a>, <a href="https://hackernoon.com/tagged/affiliate-marketing">#affiliate-marketing</a>, <a href="https://hackernoon.com/tagged/data-resale">#data-resale</a>, <a href="https://hackernoon.com/tagged/hidden-cost-of-ads">#hidden-cost-of-ads</a>, <a href="https://hackernoon.com/tagged/psychology-in-app-development">#psychology-in-app-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mark-smith">@mark-smith</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mark-smith">@mark-smith's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. Features like infinite scroll, autoplay, and push notifications aren't about convenience; they’re designed to override your natural stopping cues. Regaining control over attention requires conscious digital habits, platform accountability, and greater public awareness of manipulative design.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity-awareness,apps,free-apps,targeted-ads,affiliate-marketing,data-resale,hidden-cost-of-ads,psychology-in-app-development</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Is Shadow AI Worse Than Shadow IT?</title>
      <itunes:title>Is Shadow AI Worse Than Shadow IT?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8bf3618-877b-4a48-94b1-830d315df2d8</guid>
      <link>https://share.transistor.fm/s/7e5da6bb</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/is-shadow-ai-worse-than-shadow-it">https://hackernoon.com/is-shadow-ai-worse-than-shadow-it</a>.
            <br> Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/shadow-it">#shadow-it</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/shadow-ai-risks">#shadow-ai-risks</a>, <a href="https://hackernoon.com/tagged/shadow-it-detection">#shadow-it-detection</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/ai-in-business">#ai-in-business</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                An extension of shadow IT, shadow AI involves employees using non-approved AI technology. Security teams can reduce shadow AI exposure by building a clear AI governance framework, provide approved AI tools, and more.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/is-shadow-ai-worse-than-shadow-it">https://hackernoon.com/is-shadow-ai-worse-than-shadow-it</a>.
            <br> Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/shadow-it">#shadow-it</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/shadow-ai-risks">#shadow-ai-risks</a>, <a href="https://hackernoon.com/tagged/shadow-it-detection">#shadow-it-detection</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/ai-in-business">#ai-in-business</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                An extension of shadow IT, shadow AI involves employees using non-approved AI technology. Security teams can reduce shadow AI exposure by building a clear AI governance framework, provide approved AI tools, and more.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 12 Dec 2025 08:00:39 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/7e5da6bb/a8fd6acf.mp3" length="4035264" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_go-P3h0k-dcwwMoJyFgP2yjpjbfNRyQGJVrTtgOo_I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYzU1/ZTRmOTE5MmFlZTUx/MjY4MjFlNjM4MDVm/ODUyYS5qcGVn.jpg"/>
      <itunes:duration>505</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/is-shadow-ai-worse-than-shadow-it">https://hackernoon.com/is-shadow-ai-worse-than-shadow-it</a>.
            <br> Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/shadow-it">#shadow-it</a>, <a href="https://hackernoon.com/tagged/shadow-ai">#shadow-ai</a>, <a href="https://hackernoon.com/tagged/shadow-ai-risks">#shadow-ai-risks</a>, <a href="https://hackernoon.com/tagged/shadow-it-detection">#shadow-it-detection</a>, <a href="https://hackernoon.com/tagged/ai-governance">#ai-governance</a>, <a href="https://hackernoon.com/tagged/ai-in-business">#ai-in-business</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/zacamos">@zacamos</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/zacamos">@zacamos's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                An extension of shadow IT, shadow AI involves employees using non-approved AI technology. Security teams can reduce shadow AI exposure by building a clear AI governance framework, provide approved AI tools, and more.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ai-security,shadow-it,shadow-ai,shadow-ai-risks,shadow-it-detection,ai-governance,ai-in-business,cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control</title>
      <itunes:title>Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c9db433-5db5-4e64-bf50-315b9f801788</guid>
      <link>https://share.transistor.fm/s/34e9ef64</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control">https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control</a>.
            <br> Authorization is the process of determining *what* you’re allowed to do.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/ai-agents-authorization">#ai-agents-authorization</a>, <a href="https://hackernoon.com/tagged/ai-authorization">#ai-authorization</a>, <a href="https://hackernoon.com/tagged/role-based-access-control">#role-based-access-control</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Authorization is the process of determining *what* you’re allowed to do. It’s the invisible security perimeter around every digital interaction you have. If authorization fails, everything fails.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control">https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control</a>.
            <br> Authorization is the process of determining *what* you’re allowed to do.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/ai-agents-authorization">#ai-agents-authorization</a>, <a href="https://hackernoon.com/tagged/ai-authorization">#ai-authorization</a>, <a href="https://hackernoon.com/tagged/role-based-access-control">#role-based-access-control</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Authorization is the process of determining *what* you’re allowed to do. It’s the invisible security perimeter around every digital interaction you have. If authorization fails, everything fails.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 12 Dec 2025 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/34e9ef64/6fffe477.mp3" length="12154560" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SLX_AYAw1Sa2R6xHbHgWiJpPM24woxPSLE9m1w2UAns/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YzM5/MDMyNGE1NWNiZWQ3/MjkyYTE3YTE2MGM2/ZGVmYS5qcGVn.jpg"/>
      <itunes:duration>1520</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control">https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control</a>.
            <br> Authorization is the process of determining *what* you’re allowed to do.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/ai-agents-authorization">#ai-agents-authorization</a>, <a href="https://hackernoon.com/tagged/ai-authorization">#ai-authorization</a>, <a href="https://hackernoon.com/tagged/role-based-access-control">#role-based-access-control</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Authorization is the process of determining *what* you’re allowed to do. It’s the invisible security perimeter around every digital interaction you have. If authorization fails, everything fails.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-security,artificial-intelligence,ai-agents,machine-learning,ai-agents-authorization,ai-authorization,role-based-access-control</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal</title>
      <itunes:title>Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">392a8503-ad60-43b1-b181-db3f3220ae2b</guid>
      <link>https://share.transistor.fm/s/7bcfff8d</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal">https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal</a>.
            <br> Build a pipeline that aggressively removes "Safe" files using three layers. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-forensics">#digital-forensics</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/incident-response">#incident-response</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/cybersecurity-funnel">#cybersecurity-funnel</a>, <a href="https://hackernoon.com/tagged/cysec-funnel-architecture">#cysec-funnel-architecture</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dippusingh">@dippusingh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dippusingh">@dippusingh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The average time to resolve a cyber incident is 43 days. Manually analyzing 5,000 files takes 80 hours. We will build a pipeline that aggressively removes "Safe" files using three layers.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal">https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal</a>.
            <br> Build a pipeline that aggressively removes "Safe" files using three layers. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-forensics">#digital-forensics</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/incident-response">#incident-response</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/cybersecurity-funnel">#cybersecurity-funnel</a>, <a href="https://hackernoon.com/tagged/cysec-funnel-architecture">#cysec-funnel-architecture</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dippusingh">@dippusingh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dippusingh">@dippusingh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The average time to resolve a cyber incident is 43 days. Manually analyzing 5,000 files takes 80 hours. We will build a pipeline that aggressively removes "Safe" files using three layers.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 11 Dec 2025 08:00:44 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/7bcfff8d/42277f75.mp3" length="2421120" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sL-52yl4pPVXsTzrJIXbcV0vfU8FysNJyABXzCEJiFw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYTk5/NGNkZjU4N2ZjY2Ni/MDAyZjNlMTM2YmNl/YzE3Yi5qcGVn.jpg"/>
      <itunes:duration>303</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal">https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal</a>.
            <br> Build a pipeline that aggressively removes "Safe" files using three layers. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-forensics">#digital-forensics</a>, <a href="https://hackernoon.com/tagged/malware">#malware</a>, <a href="https://hackernoon.com/tagged/incident-response">#incident-response</a>, <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/virus-total">#virus-total</a>, <a href="https://hackernoon.com/tagged/cybersecurity-funnel">#cybersecurity-funnel</a>, <a href="https://hackernoon.com/tagged/cysec-funnel-architecture">#cysec-funnel-architecture</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/dippusingh">@dippusingh</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/dippusingh">@dippusingh's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The average time to resolve a cyber incident is 43 days. Manually analyzing 5,000 files takes 80 hours. We will build a pipeline that aggressively removes "Safe" files using three layers.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>digital-forensics,malware,incident-response,security,nist,virus-total,cybersecurity-funnel,cysec-funnel-architecture</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web</title>
      <itunes:title>The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">47aacf5a-f48b-448b-be90-2abc0a1235a8</guid>
      <link>https://share.transistor.fm/s/a1342bbe</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web">https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web</a>.
            <br> Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/google">#google</a>, <a href="https://hackernoon.com/tagged/ai-web">#ai-web</a>, <a href="https://hackernoon.com/tagged/indirect-prompt-injection">#indirect-prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-alignment-critic">#user-alignment-critic</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aiguru">@aiguru</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aiguru">@aiguru's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web">https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web</a>.
            <br> Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/google">#google</a>, <a href="https://hackernoon.com/tagged/ai-web">#ai-web</a>, <a href="https://hackernoon.com/tagged/indirect-prompt-injection">#indirect-prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-alignment-critic">#user-alignment-critic</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aiguru">@aiguru</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aiguru">@aiguru's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 11 Dec 2025 08:00:42 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/a1342bbe/9a199eb9.mp3" length="3335424" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/g6Ykibv1eaquBYhUKY7rAlivnL2A7yzeB5bTzpvsGUE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMTBk/NmNhMmI3YzJjY2E4/NmQyZmEwYmIzYzk2/MjAyYy5wbmc.jpg"/>
      <itunes:duration>417</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web">https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web</a>.
            <br> Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-agents">#ai-agents</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/google">#google</a>, <a href="https://hackernoon.com/tagged/ai-web">#ai-web</a>, <a href="https://hackernoon.com/tagged/indirect-prompt-injection">#indirect-prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-alignment-critic">#user-alignment-critic</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aiguru">@aiguru</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aiguru">@aiguru's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-agents,artificial-intelligence,web-security,google,ai-web,indirect-prompt-injection,user-alignment-critic</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>INE Earns G2 Winter 2026 Badges Across Global Markets</title>
      <itunes:title>INE Earns G2 Winter 2026 Badges Across Global Markets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d39f9166-7b58-40ee-b632-b2217ae25a1e</guid>
      <link>https://share.transistor.fm/s/c38fad8b</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets">https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets</a>.
            <br> Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE has been recognized with seven G2 Winter 2026 badges. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets">https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets</a>.
            <br> Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE has been recognized with seven G2 Winter 2026 badges. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 10 Dec 2025 08:00:28 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c38fad8b/cb2e9f0b.mp3" length="2192640" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PO01m361bKduaviS0Hvl-EQWd13JC4TKqgs78mKDz1c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xOTEz/NzI1Mjk2OWQyNGUz/NTNkNmQwNGI5YWNl/MTI5Mi5qcGVn.jpg"/>
      <itunes:duration>275</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets">https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets</a>.
            <br> Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE has been recognized with seven G2 Winter 2026 badges. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ine-security,cybernewswire,press-release,ine-security-announcement,cyber-threats,cyber-security-awareness,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline</title>
      <itunes:title>The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8398c7ec-cb96-43e9-810f-092122aef3b8</guid>
      <link>https://share.transistor.fm/s/0a5d2d40</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline">https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline</a>.
            <br> Louvre heist and how the simple password is not the story. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/louvre-heist">#louvre-heist</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-protection">#password-protection</a>, <a href="https://hackernoon.com/tagged/louvre-password">#louvre-password</a>, <a href="https://hackernoon.com/tagged/louvre-theft">#louvre-theft</a>, <a href="https://hackernoon.com/tagged/museum-robbery">#museum-robbery</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Louvre Museum is the world's largest art museum by exhibition space. The museum holds over 550,000 objects in total, with the majority kept in climate-controlled storage facilities for preservation. The public display area is vast, covering roughly 73,000 m², where about 35,000 works of art are on display.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline">https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline</a>.
            <br> Louvre heist and how the simple password is not the story. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/louvre-heist">#louvre-heist</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-protection">#password-protection</a>, <a href="https://hackernoon.com/tagged/louvre-password">#louvre-password</a>, <a href="https://hackernoon.com/tagged/louvre-theft">#louvre-theft</a>, <a href="https://hackernoon.com/tagged/museum-robbery">#museum-robbery</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Louvre Museum is the world's largest art museum by exhibition space. The museum holds over 550,000 objects in total, with the majority kept in climate-controlled storage facilities for preservation. The public display area is vast, covering roughly 73,000 m², where about 35,000 works of art are on display.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 10 Dec 2025 08:00:26 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/0a5d2d40/111b835f.mp3" length="4195584" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/T9el2cSpuGEE-JuGhVylVdybIe8m5QwJZY0hbQounPc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yY2Nk/NDFmNjc4N2IzNDUy/ZmM4OWIzYWRiODY1/ZGNhYy5qcGVn.jpg"/>
      <itunes:duration>525</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline">https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline</a>.
            <br> Louvre heist and how the simple password is not the story. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/louvre-heist">#louvre-heist</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-protection">#password-protection</a>, <a href="https://hackernoon.com/tagged/louvre-password">#louvre-password</a>, <a href="https://hackernoon.com/tagged/louvre-theft">#louvre-theft</a>, <a href="https://hackernoon.com/tagged/museum-robbery">#museum-robbery</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Louvre Museum is the world's largest art museum by exhibition space. The museum holds over 550,000 objects in total, with the majority kept in climate-controlled storage facilities for preservation. The public display area is vast, covering roughly 73,000 m², where about 35,000 works of art are on display.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,cyber-threats,louvre-heist,password-security,password-protection,louvre-password,louvre-theft,museum-robbery</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend</title>
      <itunes:title>I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4d7efed-78aa-44bc-9fbc-246616fae17b</guid>
      <link>https://share.transistor.fm/s/2ada5624</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend">https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend</a>.
            <br> A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/client-side-encryption">#client-side-encryption</a>, <a href="https://hackernoon.com/tagged/web-crypto-api">#web-crypto-api</a>, <a href="https://hackernoon.com/tagged/aes-gcm-encryption">#aes-gcm-encryption</a>, <a href="https://hackernoon.com/tagged/static-site-security">#static-site-security</a>, <a href="https://hackernoon.com/tagged/password-based-encryption">#password-based-encryption</a>, <a href="https://hackernoon.com/tagged/data-privacy-tools">#data-privacy-tools</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/raulsingapore">@raulsingapore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/raulsingapore">@raulsingapore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built Encrypter, a static browser-only text encryption tool that turns secrets into shareable ciphertext (links/QR), keeps crypto in the Web Crypto API, and never sends your plaintext to a server.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend">https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend</a>.
            <br> A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/client-side-encryption">#client-side-encryption</a>, <a href="https://hackernoon.com/tagged/web-crypto-api">#web-crypto-api</a>, <a href="https://hackernoon.com/tagged/aes-gcm-encryption">#aes-gcm-encryption</a>, <a href="https://hackernoon.com/tagged/static-site-security">#static-site-security</a>, <a href="https://hackernoon.com/tagged/password-based-encryption">#password-based-encryption</a>, <a href="https://hackernoon.com/tagged/data-privacy-tools">#data-privacy-tools</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/raulsingapore">@raulsingapore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/raulsingapore">@raulsingapore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built Encrypter, a static browser-only text encryption tool that turns secrets into shareable ciphertext (links/QR), keeps crypto in the Web Crypto API, and never sends your plaintext to a server.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 09 Dec 2025 08:00:38 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/2ada5624/d6b02739.mp3" length="4997184" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/30g7QnVmIlepQONrijR7C6NZCspEqA7K61Sxpr9NsKI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjA1/NjYwZDM2ZmQ1ZTg3/MmVjMTkwMjAzNjJi/NTg3Yi5wbmc.jpg"/>
      <itunes:duration>625</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend">https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend</a>.
            <br> A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/web-security">#web-security</a>, <a href="https://hackernoon.com/tagged/client-side-encryption">#client-side-encryption</a>, <a href="https://hackernoon.com/tagged/web-crypto-api">#web-crypto-api</a>, <a href="https://hackernoon.com/tagged/aes-gcm-encryption">#aes-gcm-encryption</a>, <a href="https://hackernoon.com/tagged/static-site-security">#static-site-security</a>, <a href="https://hackernoon.com/tagged/password-based-encryption">#password-based-encryption</a>, <a href="https://hackernoon.com/tagged/data-privacy-tools">#data-privacy-tools</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/raulsingapore">@raulsingapore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/raulsingapore">@raulsingapore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I built Encrypter, a static browser-only text encryption tool that turns secrets into shareable ciphertext (links/QR), keeps crypto in the Web Crypto API, and never sends your plaintext to a server.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>encryption,web-security,client-side-encryption,web-crypto-api,aes-gcm-encryption,static-site-security,password-based-encryption,data-privacy-tools</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines</title>
      <itunes:title>Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">610adc0f-9549-4800-8b9c-a3f0ba977ef6</guid>
      <link>https://share.transistor.fm/s/c7b0afc5</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines">https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines</a>.
            <br> comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/data-security">#data-security</a>, <a href="https://hackernoon.com/tagged/secure-data-pipelines">#secure-data-pipelines</a>, <a href="https://hackernoon.com/tagged/kafka-security">#kafka-security</a>, <a href="https://hackernoon.com/tagged/pci-dss-compliance">#pci-dss-compliance</a>, <a href="https://hackernoon.com/tagged/data-encryption-kafka">#data-encryption-kafka</a>, <a href="https://hackernoon.com/tagged/kafka-authentication">#kafka-authentication</a>, <a href="https://hackernoon.com/tagged/financial-data-protection">#financial-data-protection</a>, <a href="https://hackernoon.com/tagged/secure-data-streaming">#secure-data-streaming</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/iamanant">@iamanant</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/iamanant">@iamanant's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Kafka is a powerful streaming platform capable of handling billions of events. It has a distributed architecture, high throughput, and fault tolerance. Kafka is used to broadcast real-time market data from various sources such as forex markets, and stock exchange.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines">https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines</a>.
            <br> comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/data-security">#data-security</a>, <a href="https://hackernoon.com/tagged/secure-data-pipelines">#secure-data-pipelines</a>, <a href="https://hackernoon.com/tagged/kafka-security">#kafka-security</a>, <a href="https://hackernoon.com/tagged/pci-dss-compliance">#pci-dss-compliance</a>, <a href="https://hackernoon.com/tagged/data-encryption-kafka">#data-encryption-kafka</a>, <a href="https://hackernoon.com/tagged/kafka-authentication">#kafka-authentication</a>, <a href="https://hackernoon.com/tagged/financial-data-protection">#financial-data-protection</a>, <a href="https://hackernoon.com/tagged/secure-data-streaming">#secure-data-streaming</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/iamanant">@iamanant</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/iamanant">@iamanant's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Kafka is a powerful streaming platform capable of handling billions of events. It has a distributed architecture, high throughput, and fault tolerance. Kafka is used to broadcast real-time market data from various sources such as forex markets, and stock exchange.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 09 Dec 2025 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c7b0afc5/014c2d85.mp3" length="5041728" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qhVxJ9g09t_spi69PBJk-uO5zSMmnGtK9gXNaKdcgNA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MjVl/YjYzMmVhZTNiYWU2/MzY5M2JlOTc4MmIz/ZDVkNy5qcGVn.jpg"/>
      <itunes:duration>631</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines">https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines</a>.
            <br> comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/data-security">#data-security</a>, <a href="https://hackernoon.com/tagged/secure-data-pipelines">#secure-data-pipelines</a>, <a href="https://hackernoon.com/tagged/kafka-security">#kafka-security</a>, <a href="https://hackernoon.com/tagged/pci-dss-compliance">#pci-dss-compliance</a>, <a href="https://hackernoon.com/tagged/data-encryption-kafka">#data-encryption-kafka</a>, <a href="https://hackernoon.com/tagged/kafka-authentication">#kafka-authentication</a>, <a href="https://hackernoon.com/tagged/financial-data-protection">#financial-data-protection</a>, <a href="https://hackernoon.com/tagged/secure-data-streaming">#secure-data-streaming</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/iamanant">@iamanant</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/iamanant">@iamanant's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Kafka is a powerful streaming platform capable of handling billions of events. It has a distributed architecture, high throughput, and fault tolerance. Kafka is used to broadcast real-time market data from various sources such as forex markets, and stock exchange.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>data-security,secure-data-pipelines,kafka-security,pci-dss-compliance,data-encryption-kafka,kafka-authentication,financial-data-protection,secure-data-streaming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained</title>
      <itunes:title>How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42705634-b764-4bf0-85a9-5d00e6163055</guid>
      <link>https://share.transistor.fm/s/72a4bac0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained">https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained</a>.
            <br> Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/shor's-algorithm">#shor's-algorithm</a>, <a href="https://hackernoon.com/tagged/store-now-decrypt-later">#store-now-decrypt-later</a>, <a href="https://hackernoon.com/tagged/quantum-timeline">#quantum-timeline</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/rsa-ecc-pqc">#rsa-ecc-pqc</a>, <a href="https://hackernoon.com/tagged/sndl">#sndl</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/thomascherickal">@thomascherickal</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/thomascherickal">@thomascherickal's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum cryptography is a ticking time bomb placed at the foundations of our digital world. The world is in a race to build a new generation of cryptography before the clock strikes zero. Read the full story explained in extremely simple terms for everyone.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained">https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained</a>.
            <br> Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/shor's-algorithm">#shor's-algorithm</a>, <a href="https://hackernoon.com/tagged/store-now-decrypt-later">#store-now-decrypt-later</a>, <a href="https://hackernoon.com/tagged/quantum-timeline">#quantum-timeline</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/rsa-ecc-pqc">#rsa-ecc-pqc</a>, <a href="https://hackernoon.com/tagged/sndl">#sndl</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/thomascherickal">@thomascherickal</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/thomascherickal">@thomascherickal's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum cryptography is a ticking time bomb placed at the foundations of our digital world. The world is in a race to build a new generation of cryptography before the clock strikes zero. Read the full story explained in extremely simple terms for everyone.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 08 Dec 2025 08:00:38 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/72a4bac0/8a9e6685.mp3" length="8499840" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tB5ukLqe4m2oO8q3GdEXGqojJssvsaMNvKaj4OlM9S8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZTAy/OGQ2YmMyNDU3MTBi/ZDc1OGI3N2UzMTYy/YTAzNi53ZWJw.jpg"/>
      <itunes:duration>1063</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained">https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained</a>.
            <br> Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/shor's-algorithm">#shor's-algorithm</a>, <a href="https://hackernoon.com/tagged/store-now-decrypt-later">#store-now-decrypt-later</a>, <a href="https://hackernoon.com/tagged/quantum-timeline">#quantum-timeline</a>, <a href="https://hackernoon.com/tagged/nist">#nist</a>, <a href="https://hackernoon.com/tagged/rsa-ecc-pqc">#rsa-ecc-pqc</a>, <a href="https://hackernoon.com/tagged/sndl">#sndl</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/thomascherickal">@thomascherickal</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/thomascherickal">@thomascherickal's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quantum cryptography is a ticking time bomb placed at the foundations of our digital world. The world is in a race to build a new generation of cryptography before the clock strikes zero. Read the full story explained in extremely simple terms for everyone.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>post-quantum-cryptography,quantum-computing,shor's-algorithm,store-now-decrypt-later,quantum-timeline,nist,rsa-ecc-pqc,sndl</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality</title>
      <itunes:title>$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea63cd7c-8804-4d6f-86d9-fe3ba01d5e9e</guid>
      <link>https://share.transistor.fm/s/8af39f5e</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality">https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality</a>.
            <br> RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/blockchain-security">#blockchain-security</a>, <a href="https://hackernoon.com/tagged/rwa-tokenization">#rwa-tokenization</a>, <a href="https://hackernoon.com/tagged/real-world-assets">#real-world-assets</a>, <a href="https://hackernoon.com/tagged/defi-exploits">#defi-exploits</a>, <a href="https://hackernoon.com/tagged/cryptocurrency-regulation">#cryptocurrency-regulation</a>, <a href="https://hackernoon.com/tagged/genius-act">#genius-act</a>, <a href="https://hackernoon.com/tagged/web3-hacks">#web3-hacks</a>, <a href="https://hackernoon.com/tagged/web3-breaches">#web3-breaches</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnwrites">@johnwrites</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnwrites">@johnwrites's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Real-world asset (RWA) tokenization reached $35.68 billion in 2025, with projections to hit $2 trillion by 2028. But the rapid growth exposed critical vulnerabilities: $14.6 million was lost to hacks—more than double the previous year—with most exploits occurring in DeFi wrappers rather than the tokenized assets themselves.

The GENIUS Act provided regulatory clarity for stablecoins but left gaps across the full asset lifecycle. Meanwhile, institutional giants like BlackRock, JPMorgan, and State Street are building on private blockchains, validating the market but creating interoperability challenges.

Platforms like Mavryk (tokenizing $10B in luxury real estate), Ondo Finance (Treasury-backed tokens), and Securitize (infrastructure provider) are attempting to bridge institutional compliance with public blockchain efficiency.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality">https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality</a>.
            <br> RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/blockchain-security">#blockchain-security</a>, <a href="https://hackernoon.com/tagged/rwa-tokenization">#rwa-tokenization</a>, <a href="https://hackernoon.com/tagged/real-world-assets">#real-world-assets</a>, <a href="https://hackernoon.com/tagged/defi-exploits">#defi-exploits</a>, <a href="https://hackernoon.com/tagged/cryptocurrency-regulation">#cryptocurrency-regulation</a>, <a href="https://hackernoon.com/tagged/genius-act">#genius-act</a>, <a href="https://hackernoon.com/tagged/web3-hacks">#web3-hacks</a>, <a href="https://hackernoon.com/tagged/web3-breaches">#web3-breaches</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnwrites">@johnwrites</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnwrites">@johnwrites's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Real-world asset (RWA) tokenization reached $35.68 billion in 2025, with projections to hit $2 trillion by 2028. But the rapid growth exposed critical vulnerabilities: $14.6 million was lost to hacks—more than double the previous year—with most exploits occurring in DeFi wrappers rather than the tokenized assets themselves.

The GENIUS Act provided regulatory clarity for stablecoins but left gaps across the full asset lifecycle. Meanwhile, institutional giants like BlackRock, JPMorgan, and State Street are building on private blockchains, validating the market but creating interoperability challenges.

Platforms like Mavryk (tokenizing $10B in luxury real estate), Ondo Finance (Treasury-backed tokens), and Securitize (infrastructure provider) are attempting to bridge institutional compliance with public blockchain efficiency.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 06 Dec 2025 08:00:55 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/8af39f5e/c0242bb9.mp3" length="4944000" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7xMSQsDvY7WcVE59ftKhYDDNJNSm64vUaQaLbsSFDxw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTA4/NmRiNDNlMDVlNzQ3/OTY5MDNkMTA2NjM5/ZTVjMi53ZWJw.jpg"/>
      <itunes:duration>618</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality">https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality</a>.
            <br> RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/blockchain-security">#blockchain-security</a>, <a href="https://hackernoon.com/tagged/rwa-tokenization">#rwa-tokenization</a>, <a href="https://hackernoon.com/tagged/real-world-assets">#real-world-assets</a>, <a href="https://hackernoon.com/tagged/defi-exploits">#defi-exploits</a>, <a href="https://hackernoon.com/tagged/cryptocurrency-regulation">#cryptocurrency-regulation</a>, <a href="https://hackernoon.com/tagged/genius-act">#genius-act</a>, <a href="https://hackernoon.com/tagged/web3-hacks">#web3-hacks</a>, <a href="https://hackernoon.com/tagged/web3-breaches">#web3-breaches</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnwrites">@johnwrites</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnwrites">@johnwrites's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Real-world asset (RWA) tokenization reached $35.68 billion in 2025, with projections to hit $2 trillion by 2028. But the rapid growth exposed critical vulnerabilities: $14.6 million was lost to hacks—more than double the previous year—with most exploits occurring in DeFi wrappers rather than the tokenized assets themselves.

The GENIUS Act provided regulatory clarity for stablecoins but left gaps across the full asset lifecycle. Meanwhile, institutional giants like BlackRock, JPMorgan, and State Street are building on private blockchains, validating the market but creating interoperability challenges.

Platforms like Mavryk (tokenizing $10B in luxury real estate), Ondo Finance (Treasury-backed tokens), and Securitize (infrastructure provider) are attempting to bridge institutional compliance with public blockchain efficiency.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>blockchain-security,rwa-tokenization,real-world-assets,defi-exploits,cryptocurrency-regulation,genius-act,web3-hacks,web3-breaches</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech</title>
      <itunes:title>The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">566e8bc8-045b-4bed-b3e2-953637d20528</guid>
      <link>https://share.transistor.fm/s/696de6b0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech">https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech</a>.
            <br> We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security-lapse">#ai-security-lapse</a>, <a href="https://hackernoon.com/tagged/ai-security-lapses">#ai-security-lapses</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-driven-security">#ai-driven-security</a>, <a href="https://hackernoon.com/tagged/security-orchestration">#security-orchestration</a>, <a href="https://hackernoon.com/tagged/security-orchestration-tool">#security-orchestration-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover those same systems are creating entirely new categories of vulnerability.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech">https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech</a>.
            <br> We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security-lapse">#ai-security-lapse</a>, <a href="https://hackernoon.com/tagged/ai-security-lapses">#ai-security-lapses</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-driven-security">#ai-driven-security</a>, <a href="https://hackernoon.com/tagged/security-orchestration">#security-orchestration</a>, <a href="https://hackernoon.com/tagged/security-orchestration-tool">#security-orchestration-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover those same systems are creating entirely new categories of vulnerability.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 06 Dec 2025 08:00:52 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/696de6b0/bf1c17fd.mp3" length="5160384" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CfWwKv5deBy-Z3DNioFAjBfKmLMl1o9r-Jj_lgf39l0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDdj/Njk1M2UyODdhMjE2/YjQzM2YzNGZiNTVl/ODNmMS5qcGVn.jpg"/>
      <itunes:duration>646</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech">https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech</a>.
            <br> We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-security-lapse">#ai-security-lapse</a>, <a href="https://hackernoon.com/tagged/ai-security-lapses">#ai-security-lapses</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-driven-security">#ai-driven-security</a>, <a href="https://hackernoon.com/tagged/security-orchestration">#security-orchestration</a>, <a href="https://hackernoon.com/tagged/security-orchestration-tool">#security-orchestration-tool</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover those same systems are creating entirely new categories of vulnerability.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ai-cybersecurity,ai-security-lapse,ai-security-lapses,ai-in-cybersecurity,ai-driven-security,security-orchestration,security-orchestration-tool</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Request–Response Really Works</title>
      <itunes:title>How Request–Response Really Works</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32d18beb-b32e-4e3e-acaf-8c8da3ca3a84</guid>
      <link>https://share.transistor.fm/s/45b78b72</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-request-response-really-works">https://hackernoon.com/how-request-response-really-works</a>.
            <br> Learn how the request–response model really works under the hood. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/network">#network</a>, <a href="https://hackernoon.com/tagged/request-response-model">#request-response-model</a>, <a href="https://hackernoon.com/tagged/request-response-pattern">#request-response-pattern</a>, <a href="https://hackernoon.com/tagged/client-server">#client-server</a>, <a href="https://hackernoon.com/tagged/http-request-response">#http-request-response</a>, <a href="https://hackernoon.com/tagged/web-request-response">#web-request-response</a>, <a href="https://hackernoon.com/tagged/web-development-fundamentals">#web-development-fundamentals</a>, <a href="https://hackernoon.com/tagged/backend-basics">#backend-basics</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/majjikishore">@majjikishore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/majjikishore">@majjikishore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Learn how the request–response model really works under the hood.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-request-response-really-works">https://hackernoon.com/how-request-response-really-works</a>.
            <br> Learn how the request–response model really works under the hood. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/network">#network</a>, <a href="https://hackernoon.com/tagged/request-response-model">#request-response-model</a>, <a href="https://hackernoon.com/tagged/request-response-pattern">#request-response-pattern</a>, <a href="https://hackernoon.com/tagged/client-server">#client-server</a>, <a href="https://hackernoon.com/tagged/http-request-response">#http-request-response</a>, <a href="https://hackernoon.com/tagged/web-request-response">#web-request-response</a>, <a href="https://hackernoon.com/tagged/web-development-fundamentals">#web-development-fundamentals</a>, <a href="https://hackernoon.com/tagged/backend-basics">#backend-basics</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/majjikishore">@majjikishore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/majjikishore">@majjikishore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Learn how the request–response model really works under the hood.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 05 Dec 2025 08:00:33 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/45b78b72/98c21c5e.mp3" length="1935936" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Qpoj5WVmUMzv-HTWLhXM8XHqJthKkOoZmRHy3ZvMmds/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Nzk3/YmZhNjZjNDY5Njg2/YzljZmEyMDllYTRi/YjIxMy5qcGVn.jpg"/>
      <itunes:duration>242</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-request-response-really-works">https://hackernoon.com/how-request-response-really-works</a>.
            <br> Learn how the request–response model really works under the hood. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/network">#network</a>, <a href="https://hackernoon.com/tagged/request-response-model">#request-response-model</a>, <a href="https://hackernoon.com/tagged/request-response-pattern">#request-response-pattern</a>, <a href="https://hackernoon.com/tagged/client-server">#client-server</a>, <a href="https://hackernoon.com/tagged/http-request-response">#http-request-response</a>, <a href="https://hackernoon.com/tagged/web-request-response">#web-request-response</a>, <a href="https://hackernoon.com/tagged/web-development-fundamentals">#web-development-fundamentals</a>, <a href="https://hackernoon.com/tagged/backend-basics">#backend-basics</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/majjikishore">@majjikishore</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/majjikishore">@majjikishore's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Learn how the request–response model really works under the hood.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>network,request-response-model,request-response-pattern,client-server,http-request-response,web-request-response,web-development-fundamentals,backend-basics</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Taking Control Of Software Supply Chains in the Open Source Era</title>
      <itunes:title>Taking Control Of Software Supply Chains in the Open Source Era</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17add907-352f-4da2-a7ba-b956127ef1fa</guid>
      <link>https://share.transistor.fm/s/a83aa621</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era">https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era</a>.
            <br> Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/npm-package">#npm-package</a>, <a href="https://hackernoon.com/tagged/software-supply-chain-attacks">#software-supply-chain-attacks</a>, <a href="https://hackernoon.com/tagged/open-source-security">#open-source-security</a>, <a href="https://hackernoon.com/tagged/software-supply-chains">#software-supply-chains</a>, <a href="https://hackernoon.com/tagged/recent-npm-attacks">#recent-npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attacks">#npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attack">#npm-attack</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/henrikplate1">@henrikplate1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/henrikplate1">@henrikplate1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era">https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era</a>.
            <br> Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/npm-package">#npm-package</a>, <a href="https://hackernoon.com/tagged/software-supply-chain-attacks">#software-supply-chain-attacks</a>, <a href="https://hackernoon.com/tagged/open-source-security">#open-source-security</a>, <a href="https://hackernoon.com/tagged/software-supply-chains">#software-supply-chains</a>, <a href="https://hackernoon.com/tagged/recent-npm-attacks">#recent-npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attacks">#npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attack">#npm-attack</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/henrikplate1">@henrikplate1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/henrikplate1">@henrikplate1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 05 Dec 2025 08:00:31 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/a83aa621/d8210222.mp3" length="3374016" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0_ugrRa8VwofFQrf1ZSt_Xw9mdQH-y4XRceH8U6K52g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNWY5/M2Y1MGRhZmU1MGQ5/ZTY2MGE3NWZiYWU1/MTBjMy5qcGVn.jpg"/>
      <itunes:duration>422</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era">https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era</a>.
            <br> Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/npm-package">#npm-package</a>, <a href="https://hackernoon.com/tagged/software-supply-chain-attacks">#software-supply-chain-attacks</a>, <a href="https://hackernoon.com/tagged/open-source-security">#open-source-security</a>, <a href="https://hackernoon.com/tagged/software-supply-chains">#software-supply-chains</a>, <a href="https://hackernoon.com/tagged/recent-npm-attacks">#recent-npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attacks">#npm-attacks</a>, <a href="https://hackernoon.com/tagged/npm-attack">#npm-attack</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/henrikplate1">@henrikplate1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/henrikplate1">@henrikplate1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Understanding how these recent npm attacks  unfolded will help signal a way forward for a more secure software supply chain.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,npm-package,software-supply-chain-attacks,open-source-security,software-supply-chains,recent-npm-attacks,npm-attacks,npm-attack</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.</title>
      <itunes:title>You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad15ae2d-1ecc-49ba-afdc-226a99d5610b</guid>
      <link>https://share.transistor.fm/s/e390c2d3</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down">https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down</a>.
            <br> A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/wifi-security">#wifi-security</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/raspberry-pi">#raspberry-pi</a>, <a href="https://hackernoon.com/tagged/cracking-wifi-networks">#cracking-wifi-networks</a>, <a href="https://hackernoon.com/tagged/passwords">#passwords</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/operational-security">#operational-security</a>, <a href="https://hackernoon.com/tagged/wi-fi-hardening">#wi-fi-hardening</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/girishatindra">@girishatindra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/girishatindra">@girishatindra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This blog wraps up your journey from Wi-Fi hacking to hardening. It guides you through the key steps to lock down your network — upgrade to WPA3 when possible, use strong and unique passwords, disable risky features like WPS, keep firmware updated, and adopt sound digital hygiene. The result: a Wi-Fi network and password hygiene strategy that greatly reduces the risk of compromise.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down">https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down</a>.
            <br> A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/wifi-security">#wifi-security</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/raspberry-pi">#raspberry-pi</a>, <a href="https://hackernoon.com/tagged/cracking-wifi-networks">#cracking-wifi-networks</a>, <a href="https://hackernoon.com/tagged/passwords">#passwords</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/operational-security">#operational-security</a>, <a href="https://hackernoon.com/tagged/wi-fi-hardening">#wi-fi-hardening</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/girishatindra">@girishatindra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/girishatindra">@girishatindra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This blog wraps up your journey from Wi-Fi hacking to hardening. It guides you through the key steps to lock down your network — upgrade to WPA3 when possible, use strong and unique passwords, disable risky features like WPS, keep firmware updated, and adopt sound digital hygiene. The result: a Wi-Fi network and password hygiene strategy that greatly reduces the risk of compromise.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 04 Dec 2025 08:00:47 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/e390c2d3/858a0703.mp3" length="15606336" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/e_0kOvDbpBOguu82Tx6lztSEXC_8v-q-UCAsnywx3fk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NGZj/NjA3ZjA0YjhjNGE1/MjRjZjdjZDY1YTg2/NmM2ZS5wbmc.jpg"/>
      <itunes:duration>1951</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down">https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down</a>.
            <br> A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/wifi-security">#wifi-security</a>, <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/raspberry-pi">#raspberry-pi</a>, <a href="https://hackernoon.com/tagged/cracking-wifi-networks">#cracking-wifi-networks</a>, <a href="https://hackernoon.com/tagged/passwords">#passwords</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>, <a href="https://hackernoon.com/tagged/operational-security">#operational-security</a>, <a href="https://hackernoon.com/tagged/wi-fi-hardening">#wi-fi-hardening</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/girishatindra">@girishatindra</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/girishatindra">@girishatindra's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This blog wraps up your journey from Wi-Fi hacking to hardening. It guides you through the key steps to lock down your network — upgrade to WPA3 when possible, use strong and unique passwords, disable risky features like WPS, keep firmware updated, and adopt sound digital hygiene. The result: a Wi-Fi network and password hygiene strategy that greatly reduces the risk of compromise.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>wifi-security,password-security,raspberry-pi,cracking-wifi-networks,passwords,information-security,operational-security,wi-fi-hardening</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier</title>
      <itunes:title>AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2cab1b12-0610-47f1-90ed-cc10e4ee661c</guid>
      <link>https://share.transistor.fm/s/a194c17c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier">https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier</a>.
            <br> Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/latest-tech-stories">#latest-tech-stories</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/cyber-warfare">#cyber-warfare</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/harshg2810">@harshg2810</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/harshg2810">@harshg2810's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The age of human hacking is over. Microsoft's 2025 report confirms LLMs are automating attacks faster than defenders can react. Welcome to the algorithmic battlefield.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier">https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier</a>.
            <br> Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/latest-tech-stories">#latest-tech-stories</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/cyber-warfare">#cyber-warfare</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/harshg2810">@harshg2810</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/harshg2810">@harshg2810's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The age of human hacking is over. Microsoft's 2025 report confirms LLMs are automating attacks faster than defenders can react. Welcome to the algorithmic battlefield.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 03 Dec 2025 08:00:51 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/a194c17c/8fff1cc2.mp3" length="4408128" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Xnc8sT8MR3r07CRy0D6FC9y0tV8vTjgQlGTHJnu82rw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lOTFh/NGJmYjZmMmVkMDhj/NDFkODRjZmIwNTQw/OGI5Ni5wbmc.jpg"/>
      <itunes:duration>552</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier">https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier</a>.
            <br> Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/latest-tech-stories">#latest-tech-stories</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/generative-ai">#generative-ai</a>, <a href="https://hackernoon.com/tagged/cyber-warfare">#cyber-warfare</a>, <a href="https://hackernoon.com/tagged/infosec">#infosec</a>, <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/harshg2810">@harshg2810</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/harshg2810">@harshg2810's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The age of human hacking is over. Microsoft's 2025 report confirms LLMs are automating attacks faster than defenders can react. Welcome to the algorithmic battlefield.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cyber-threats,artificial-intelligence,latest-tech-stories,machine-learning,generative-ai,cyber-warfare,infosec,ai-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Will We Distinguish Truth From Fiction?</title>
      <itunes:title>How Will We Distinguish Truth From Fiction?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16750536-46bf-499c-9aea-0d3589db69a2</guid>
      <link>https://share.transistor.fm/s/acaf6016</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-will-we-distinguish-truth-from-fiction">https://hackernoon.com/how-will-we-distinguish-truth-from-fiction</a>.
            <br> Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-identity">#digital-identity</a>, <a href="https://hackernoon.com/tagged/deepfakes">#deepfakes</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/digital-trust">#digital-trust</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/identity-security">#identity-security</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sibelakay">@sibelakay</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sibelakay">@sibelakay's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not so much the deepfake itself, but the fatigue of trying to verify it.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-will-we-distinguish-truth-from-fiction">https://hackernoon.com/how-will-we-distinguish-truth-from-fiction</a>.
            <br> Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-identity">#digital-identity</a>, <a href="https://hackernoon.com/tagged/deepfakes">#deepfakes</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/digital-trust">#digital-trust</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/identity-security">#identity-security</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sibelakay">@sibelakay</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sibelakay">@sibelakay's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not so much the deepfake itself, but the fatigue of trying to verify it.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 03 Dec 2025 08:00:49 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/acaf6016/8b5d2a2e.mp3" length="3482304" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Za2Pb8snOQX5zhKDHm6uCxI0T1Klr2W-VZuDrDq4GZ0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMzUy/ZTk1NmJkNDAzOTQy/ZmY0ZmNjMmUyNmY0/NDI0Zi5wbmc.jpg"/>
      <itunes:duration>436</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-will-we-distinguish-truth-from-fiction">https://hackernoon.com/how-will-we-distinguish-truth-from-fiction</a>.
            <br> Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/digital-identity">#digital-identity</a>, <a href="https://hackernoon.com/tagged/deepfakes">#deepfakes</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/digital-trust">#digital-trust</a>, <a href="https://hackernoon.com/tagged/quantum-computing">#quantum-computing</a>, <a href="https://hackernoon.com/tagged/identity-security">#identity-security</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sibelakay">@sibelakay</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sibelakay">@sibelakay's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Deepfake technology has its greatest impact on people through identity theft. It is no longer just fake videos on social media; even a few seconds of voice recording can create a convincing scam. The real challenge for consumers is not so much the deepfake itself, but the fatigue of trying to verify it.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>digital-identity,deepfakes,artificial-intelligence,digital-trust,quantum-computing,identity-security,post-quantum-cryptography,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Developer’s Guide to Choosing the Right DAST Tool in 2026</title>
      <itunes:title>A Developer’s Guide to Choosing the Right DAST Tool in 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14153548-1f14-4486-85a9-c952a8336d83</guid>
      <link>https://share.transistor.fm/s/9a54fb96</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026">https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026</a>.
            <br> A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/dast">#dast</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/webapplicationtesting">#webapplicationtesting</a>, <a href="https://hackernoon.com/tagged/api-testing">#api-testing</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/software-testing">#software-testing</a>, <a href="https://hackernoon.com/tagged/vulnerability-scanning">#vulnerability-scanning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DAST tools help developers find security flaws in running applications before attackers do.

The guide breaks down what to look for in a DAST tool: accuracy, ease of integration, performance, cost, and reporting.

You’ll also find a practical rundown of the top DAST tools for 2026, with key features of each.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026">https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026</a>.
            <br> A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/dast">#dast</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/webapplicationtesting">#webapplicationtesting</a>, <a href="https://hackernoon.com/tagged/api-testing">#api-testing</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/software-testing">#software-testing</a>, <a href="https://hackernoon.com/tagged/vulnerability-scanning">#vulnerability-scanning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DAST tools help developers find security flaws in running applications before attackers do.

The guide breaks down what to look for in a DAST tool: accuracy, ease of integration, performance, cost, and reporting.

You’ll also find a practical rundown of the top DAST tools for 2026, with key features of each.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 02 Dec 2025 08:00:33 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/9a54fb96/61592474.mp3" length="6234048" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_wHtvVKK3IIViOfS9xwFgh1yRVOof3MBFzcvaY-KjgQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMmNm/MmQ3YmFkY2MwMjY2/Nzg5NTA1YjUzNTc2/YmNlOS5wbmc.jpg"/>
      <itunes:duration>780</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026">https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026</a>.
            <br> A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/devsecops">#devsecops</a>, <a href="https://hackernoon.com/tagged/dast">#dast</a>, <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/webapplicationtesting">#webapplicationtesting</a>, <a href="https://hackernoon.com/tagged/api-testing">#api-testing</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/software-testing">#software-testing</a>, <a href="https://hackernoon.com/tagged/vulnerability-scanning">#vulnerability-scanning</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DAST tools help developers find security flaws in running applications before attackers do.

The guide breaks down what to look for in a DAST tool: accuracy, ease of integration, performance, cost, and reporting.

You’ll also find a practical rundown of the top DAST tools for 2026, with key features of each.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>devsecops,dast,cybersecurity,webapplicationtesting,api-testing,api-security,software-testing,vulnerability-scanning</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Adversarial Attacks on Large Language Models and Defense Mechanisms</title>
      <itunes:title>Adversarial Attacks on Large Language Models and Defense Mechanisms</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab1d7a3f-d1d0-4e08-a678-916c43a31ee8</guid>
      <link>https://share.transistor.fm/s/b7b7ba41</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms">https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms</a>.
            <br> Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/adversarial-attacks">#adversarial-attacks</a>, <a href="https://hackernoon.com/tagged/llm-security">#llm-security</a>, <a href="https://hackernoon.com/tagged/defense-mechanisms">#defense-mechanisms</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-preference-manipulation">#user-preference-manipulation</a>, <a href="https://hackernoon.com/tagged/ai-and-data-breaches">#ai-and-data-breaches</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker87248088">@hacker87248088</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker87248088">@hacker87248088's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Large Language Models face growing security threats from adversarial attacks including prompt injection, jailbreaks, and data poisoning. Studies show 77% of businesses experienced AI breaches, with OWASP naming prompt injection the #1 LLM threat. Attackers manipulate models to leak sensitive data, bypass safety controls, or degrade performance. Defense requires a multi-layered approach: adversarial training, input filtering, output monitoring, and system-level guards. Organizations must treat LLMs as untrusted code and implement continuous testing to minimize risks.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms">https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms</a>.
            <br> Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/adversarial-attacks">#adversarial-attacks</a>, <a href="https://hackernoon.com/tagged/llm-security">#llm-security</a>, <a href="https://hackernoon.com/tagged/defense-mechanisms">#defense-mechanisms</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-preference-manipulation">#user-preference-manipulation</a>, <a href="https://hackernoon.com/tagged/ai-and-data-breaches">#ai-and-data-breaches</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker87248088">@hacker87248088</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker87248088">@hacker87248088's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Large Language Models face growing security threats from adversarial attacks including prompt injection, jailbreaks, and data poisoning. Studies show 77% of businesses experienced AI breaches, with OWASP naming prompt injection the #1 LLM threat. Attackers manipulate models to leak sensitive data, bypass safety controls, or degrade performance. Defense requires a multi-layered approach: adversarial training, input filtering, output monitoring, and system-level guards. Organizations must treat LLMs as untrusted code and implement continuous testing to minimize risks.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 02 Dec 2025 08:00:30 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/b7b7ba41/1110ff65.mp3" length="4508352" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/x4_2iCaQ-WWkzXS603En6TytFvMA05pvirWQU3tAEu4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZGQ1/ZmY1ZjE4ZjYxOTMz/MmMxNzZiNmEzODk3/MGE0MC53ZWJw.jpg"/>
      <itunes:duration>564</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms">https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms</a>.
            <br> Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/adversarial-attacks">#adversarial-attacks</a>, <a href="https://hackernoon.com/tagged/llm-security">#llm-security</a>, <a href="https://hackernoon.com/tagged/defense-mechanisms">#defense-mechanisms</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/user-preference-manipulation">#user-preference-manipulation</a>, <a href="https://hackernoon.com/tagged/ai-and-data-breaches">#ai-and-data-breaches</a>, <a href="https://hackernoon.com/tagged/owasp">#owasp</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker87248088">@hacker87248088</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker87248088">@hacker87248088's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Large Language Models face growing security threats from adversarial attacks including prompt injection, jailbreaks, and data poisoning. Studies show 77% of businesses experienced AI breaches, with OWASP naming prompt injection the #1 LLM threat. Attackers manipulate models to leak sensitive data, bypass safety controls, or degrade performance. Defense requires a multi-layered approach: adversarial training, input filtering, output monitoring, and system-level guards. Organizations must treat LLMs as untrusted code and implement continuous testing to minimize risks.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>adversarial-attacks,llm-security,defense-mechanisms,prompt-injection,user-preference-manipulation,ai-and-data-breaches,owasp,adversarial-ai</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025</title>
      <itunes:title>Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9fab4792-5fd8-4917-a66e-418d95954a6b</guid>
      <link>https://share.transistor.fm/s/7a9a818e</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025">https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025</a>.
            <br> Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, &amp; 300 global
speakers from December 2–4 at Riyadh Exhibition and Convention Center <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/blackhat-mea">#blackhat-mea</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-driven-threat-intelligence">#ai-driven-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/blackhat-mea-2025">#blackhat-mea-2025</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/blackhatmea">#blackhatmea</a>, <a href="https://hackernoon.com/tagged/hackernoon-events">#hackernoon-events</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hackernoonevents">@hackernoonevents</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hackernoonevents">@hackernoonevents's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025">https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025</a>.
            <br> Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, &amp; 300 global
speakers from December 2–4 at Riyadh Exhibition and Convention Center <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/blackhat-mea">#blackhat-mea</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-driven-threat-intelligence">#ai-driven-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/blackhat-mea-2025">#blackhat-mea-2025</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/blackhatmea">#blackhatmea</a>, <a href="https://hackernoon.com/tagged/hackernoon-events">#hackernoon-events</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hackernoonevents">@hackernoonevents</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hackernoonevents">@hackernoonevents's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 01 Dec 2025 08:00:34 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/7a9a818e/37d19cfe.mp3" length="3026112" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HySImJyTe4OQBZ3QEYj7NIGPGAQfB38LJIjRLYGv4qk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYmYx/ZjM4MmI0MDE5N2Y3/ZWZkODQxMTU3YmU2/ODE3Ny5qcGVn.jpg"/>
      <itunes:duration>379</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025">https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025</a>.
            <br> Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, &amp; 300 global
speakers from December 2–4 at Riyadh Exhibition and Convention Center <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/blackhat-mea">#blackhat-mea</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-driven-threat-intelligence">#ai-driven-threat-intelligence</a>, <a href="https://hackernoon.com/tagged/blackhat-mea-2025">#blackhat-mea-2025</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/blackhatmea">#blackhatmea</a>, <a href="https://hackernoon.com/tagged/hackernoon-events">#hackernoon-events</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hackernoonevents">@hackernoonevents</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hackernoonevents">@hackernoonevents's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,blackhat-mea,threat-intelligence,ai-driven-threat-intelligence,blackhat-mea-2025,cyber-threats,blackhatmea,hackernoon-events</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM</title>
      <itunes:title>One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0100b6df-f70c-489a-a3b2-78a8f95b69b0</guid>
      <link>https://share.transistor.fm/s/89101d0c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam">https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam</a>.
            <br> Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/gartner-hype-cycle">#gartner-hype-cycle</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gartner has recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasis on simplified security.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam">https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam</a>.
            <br> Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/gartner-hype-cycle">#gartner-hype-cycle</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gartner has recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasis on simplified security.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 29 Nov 2025 08:00:31 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/89101d0c/fbb9a137.mp3" length="2753856" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3RlnH595ZJLwi-1PIzpp6kmBAK6bNeTwHy6z1bSoeec/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84N2Fi/M2M2ZjM5OWFhMzNi/MDVjNmIzNTBhYmVj/M2YzNi5qcGVn.jpg"/>
      <itunes:duration>345</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam">https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam</a>.
            <br> Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/gartner-hype-cycle">#gartner-hype-cycle</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Gartner has recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasis on simplified security.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,gartner-hype-cycle,cybernewswire,press-release,cyber-threats,cyber-security-awareness,cybercrime,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0</title>
      <itunes:title>Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33e5ddcd-e569-40e3-adcf-bb9918eb7561</guid>
      <link>https://share.transistor.fm/s/496aa4a9</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40">https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40</a>.
            <br> API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ai-use-detection">#ai-use-detection</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quttera announces new API capabilities and AI-powered Threat Encyclopedia. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40">https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40</a>.
            <br> API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ai-use-detection">#ai-use-detection</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quttera announces new API capabilities and AI-powered Threat Encyclopedia. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 28 Nov 2025 08:00:31 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/496aa4a9/8c82ab90.mp3" length="2802432" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mGlBYhdpyiSfC_GmD-Pim0K_3wPeIrzqgpOx_yzqsbQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjU5/YmQzZDhmZDk0Mjcz/ZDc0M2VjMjJjMmUz/ODEzMy5qcGVn.jpg"/>
      <itunes:duration>351</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40">https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40</a>.
            <br> API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ai-use-detection">#ai-use-detection</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Quttera announces new API capabilities and AI-powered Threat Encyclopedia. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,cybernewswire,press-release,ai-use-detection,cyber-threats,cyber-security-awareness,cybersecurity-tips,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>When "Just Following Guidelines" Isn't Enough</title>
      <itunes:title>When "Just Following Guidelines" Isn't Enough</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ee42e41-8e4c-4c1a-9d7b-b5f8499c3394</guid>
      <link>https://share.transistor.fm/s/6568e194</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-just-following-guidelines-isnt-enough">https://hackernoon.com/when-just-following-guidelines-isnt-enough</a>.
            <br> A Reddit post highlights the failure modes of internal AI agents.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/internal-ai-agents">#internal-ai-agents</a>, <a href="https://hackernoon.com/tagged/ai-boundaries">#ai-boundaries</a>, <a href="https://hackernoon.com/tagged/ai-core-failure">#ai-core-failure</a>, <a href="https://hackernoon.com/tagged/ai-logic-failure">#ai-logic-failure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A Reddit post highlights the failure modes of internal AI agents. The problem wasn't the AI's logic; it was the boundaries, or lack of boundaries, we put around it. The core failure here was all about governance.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-just-following-guidelines-isnt-enough">https://hackernoon.com/when-just-following-guidelines-isnt-enough</a>.
            <br> A Reddit post highlights the failure modes of internal AI agents.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/internal-ai-agents">#internal-ai-agents</a>, <a href="https://hackernoon.com/tagged/ai-boundaries">#ai-boundaries</a>, <a href="https://hackernoon.com/tagged/ai-core-failure">#ai-core-failure</a>, <a href="https://hackernoon.com/tagged/ai-logic-failure">#ai-logic-failure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A Reddit post highlights the failure modes of internal AI agents. The problem wasn't the AI's logic; it was the boundaries, or lack of boundaries, we put around it. The core failure here was all about governance.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 27 Nov 2025 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6568e194/36b03c3a.mp3" length="5837376" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zp3cdAjQavcULVdKwYS7OYYHJj5Tjead_NrujEP2tdE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYjJh/ZjJmYmFkMjY4ODIx/OGQ5MDU1YzNmYWJl/ZjNhOS5qcGVn.jpg"/>
      <itunes:duration>730</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-just-following-guidelines-isnt-enough">https://hackernoon.com/when-just-following-guidelines-isnt-enough</a>.
            <br> A Reddit post highlights the failure modes of internal AI agents.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/machine-learning">#machine-learning</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai-agent">#ai-agent</a>, <a href="https://hackernoon.com/tagged/internal-ai-agents">#internal-ai-agents</a>, <a href="https://hackernoon.com/tagged/ai-boundaries">#ai-boundaries</a>, <a href="https://hackernoon.com/tagged/ai-core-failure">#ai-core-failure</a>, <a href="https://hackernoon.com/tagged/ai-logic-failure">#ai-logic-failure</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/lab42ai">@lab42ai</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/lab42ai">@lab42ai's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A Reddit post highlights the failure modes of internal AI agents. The problem wasn't the AI's logic; it was the boundaries, or lack of boundaries, we put around it. The core failure here was all about governance.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ai-security,machine-learning,artificial-intelligence,ai-agent,internal-ai-agents,ai-boundaries,ai-core-failure,ai-logic-failure</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>When APIs Talk Too Much – A Lesson About Hidden Paths</title>
      <itunes:title>When APIs Talk Too Much – A Lesson About Hidden Paths</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5cea8ff0-1fd1-46ad-83f3-7e3b837728ce</guid>
      <link>https://share.transistor.fm/s/24e1c041</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths">https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths</a>.
            <br> Why API security requires more than just endpoint protection and what developers can take away. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/api-misconfigurations">#api-misconfigurations</a>, <a href="https://hackernoon.com/tagged/api-logic-flaws">#api-logic-flaws</a>, <a href="https://hackernoon.com/tagged/spoutible">#spoutible</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ErSilh0x">@ErSilh0x</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ErSilh0x">@ErSilh0x's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is the story of how curiosity led to the discovery of a privacy risk, a responsible disclosure, and essential takeaways for building safer APIs.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths">https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths</a>.
            <br> Why API security requires more than just endpoint protection and what developers can take away. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/api-misconfigurations">#api-misconfigurations</a>, <a href="https://hackernoon.com/tagged/api-logic-flaws">#api-logic-flaws</a>, <a href="https://hackernoon.com/tagged/spoutible">#spoutible</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ErSilh0x">@ErSilh0x</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ErSilh0x">@ErSilh0x's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is the story of how curiosity led to the discovery of a privacy risk, a responsible disclosure, and essential takeaways for building safer APIs.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 27 Nov 2025 08:00:35 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/24e1c041/95d025fa.mp3" length="1806336" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6p8APRytH8fAv_278bKG9w_F5wZs7lw-saygNzifI38/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zODE0/YWMyOTM3ZjM4NDY4/M2ZhNWY1OGE5OTVk/N2M3NC5qcGVn.jpg"/>
      <itunes:duration>226</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths">https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths</a>.
            <br> Why API security requires more than just endpoint protection and what developers can take away. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/api-security">#api-security</a>, <a href="https://hackernoon.com/tagged/privacy">#privacy</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-protection">#data-protection</a>, <a href="https://hackernoon.com/tagged/api-misconfigurations">#api-misconfigurations</a>, <a href="https://hackernoon.com/tagged/api-logic-flaws">#api-logic-flaws</a>, <a href="https://hackernoon.com/tagged/spoutible">#spoutible</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ErSilh0x">@ErSilh0x</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ErSilh0x">@ErSilh0x's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This is the story of how curiosity led to the discovery of a privacy risk, a responsible disclosure, and essential takeaways for building safer APIs.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,api-security,privacy,data-privacy,data-protection,api-misconfigurations,api-logic-flaws,spoutible</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto</title>
      <itunes:title>Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42f0652c-0e8c-42a5-b40f-54f0dd873a85</guid>
      <link>https://share.transistor.fm/s/f04604fe</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto">https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto</a>.
            <br> Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/fake-captcha">#fake-captcha</a>, <a href="https://hackernoon.com/tagged/crypto-stealing-malware">#crypto-stealing-malware</a>, <a href="https://hackernoon.com/tagged/social-engineering-attacks">#social-engineering-attacks</a>, <a href="https://hackernoon.com/tagged/fake-captcha-malware">#fake-captcha-malware</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Fake CAPTCHAs are being used to trick users into installing malware or giving away private data. A fake CAPTCHA is crafted to look like a normal verification step, but behind the scenes, the attackers are executing a malicious plan. The Amadey Trojan, in particular, acts as a clipper: it detects crypto addresses already copied on the clipboard.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto">https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto</a>.
            <br> Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/fake-captcha">#fake-captcha</a>, <a href="https://hackernoon.com/tagged/crypto-stealing-malware">#crypto-stealing-malware</a>, <a href="https://hackernoon.com/tagged/social-engineering-attacks">#social-engineering-attacks</a>, <a href="https://hackernoon.com/tagged/fake-captcha-malware">#fake-captcha-malware</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Fake CAPTCHAs are being used to trick users into installing malware or giving away private data. A fake CAPTCHA is crafted to look like a normal verification step, but behind the scenes, the attackers are executing a malicious plan. The Amadey Trojan, in particular, acts as a clipper: it detects crypto addresses already copied on the clipboard.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 08:00:48 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/f04604fe/8f23d7cb.mp3" length="2401920" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-PH06f6HJpVxHYWuUZkzDhgom8M5gRYrn9M99FU6aMg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82Y2Ji/YTIwMWJlNjdlN2Vh/ODAwMzE2YzQ1MDI4/OWYwZS5wbmc.jpg"/>
      <itunes:duration>301</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto">https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto</a>.
            <br> Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/fake-captcha">#fake-captcha</a>, <a href="https://hackernoon.com/tagged/crypto-stealing-malware">#crypto-stealing-malware</a>, <a href="https://hackernoon.com/tagged/social-engineering-attacks">#social-engineering-attacks</a>, <a href="https://hackernoon.com/tagged/fake-captcha-malware">#fake-captcha-malware</a>, <a href="https://hackernoon.com/tagged/obyte">#obyte</a>, <a href="https://hackernoon.com/tagged/crypto-wallet-security">#crypto-wallet-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/obyte">@obyte</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/obyte">@obyte's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Fake CAPTCHAs are being used to trick users into installing malware or giving away private data. A fake CAPTCHA is crafted to look like a normal verification step, but behind the scenes, the attackers are executing a malicious plan. The Amadey Trojan, in particular, acts as a clipper: it detects crypto addresses already copied on the clipboard.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>fake-captcha,crypto-stealing-malware,social-engineering-attacks,fake-captcha-malware,obyte,crypto-wallet-security,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs</title>
      <itunes:title>Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4861695c-4312-4271-8eed-aafb0a56500b</guid>
      <link>https://share.transistor.fm/s/256bbcc9</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs">https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs</a>.
            <br> Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/infosecurity">#infosecurity</a>, <a href="https://hackernoon.com/tagged/data-breach-prevention">#data-breach-prevention</a>, <a href="https://hackernoon.com/tagged/zero-trust-framework">#zero-trust-framework</a>, <a href="https://hackernoon.com/tagged/enterprise-security-strategy">#enterprise-security-strategy</a>, <a href="https://hackernoon.com/tagged/network-micro-segmentation">#network-micro-segmentation</a>, <a href="https://hackernoon.com/tagged/cloud-security-strategy">#cloud-security-strategy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust is a new way of managing security in the digital age. It's not a product, it's a mindset shift about how access is granted and risk is managed. In 2025, companies will spend far more recovering from an attack than they ever would have spent building resilience.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs">https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs</a>.
            <br> Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/infosecurity">#infosecurity</a>, <a href="https://hackernoon.com/tagged/data-breach-prevention">#data-breach-prevention</a>, <a href="https://hackernoon.com/tagged/zero-trust-framework">#zero-trust-framework</a>, <a href="https://hackernoon.com/tagged/enterprise-security-strategy">#enterprise-security-strategy</a>, <a href="https://hackernoon.com/tagged/network-micro-segmentation">#network-micro-segmentation</a>, <a href="https://hackernoon.com/tagged/cloud-security-strategy">#cloud-security-strategy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust is a new way of managing security in the digital age. It's not a product, it's a mindset shift about how access is granted and risk is managed. In 2025, companies will spend far more recovering from an attack than they ever would have spent building resilience.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 08:00:46 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/256bbcc9/6520df3f.mp3" length="5181504" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/A2AV7DJeWpYiXf-LB8d2wtFiIkUpuO4RaLN_Dp-kcS0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OTdh/MTRkOTY5NDdhNzI4/OGU1OTMxYjYxMDVh/NzYwZi5wbmc.jpg"/>
      <itunes:duration>648</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs">https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs</a>.
            <br> Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today.
 <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/infosecurity">#infosecurity</a>, <a href="https://hackernoon.com/tagged/data-breach-prevention">#data-breach-prevention</a>, <a href="https://hackernoon.com/tagged/zero-trust-framework">#zero-trust-framework</a>, <a href="https://hackernoon.com/tagged/enterprise-security-strategy">#enterprise-security-strategy</a>, <a href="https://hackernoon.com/tagged/network-micro-segmentation">#network-micro-segmentation</a>, <a href="https://hackernoon.com/tagged/cloud-security-strategy">#cloud-security-strategy</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/oladapo1">@oladapo1</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/oladapo1">@oladapo1's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Zero Trust is a new way of managing security in the digital age. It's not a product, it's a mindset shift about how access is granted and risk is managed. In 2025, companies will spend far more recovering from an attack than they ever would have spent building resilience.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>zero-trust-security,infosecurity,data-breach-prevention,zero-trust-framework,enterprise-security-strategy,network-micro-segmentation,cloud-security-strategy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why the MITRE ATT&amp;CK Framework Actually Works</title>
      <itunes:title>Why the MITRE ATT&amp;CK Framework Actually Works</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41555540-f40e-44f2-a244-2135adef7b47</guid>
      <link>https://share.transistor.fm/s/20905b44</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-the-mitre-attandck-framework-actually-works">https://hackernoon.com/why-the-mitre-attandck-framework-actually-works</a>.
            <br> ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/mitre-attandck">#mitre-attandck</a>, <a href="https://hackernoon.com/tagged/mitre-attack">#mitre-attack</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>, <a href="https://hackernoon.com/tagged/sumo-logic">#sumo-logic</a>, <a href="https://hackernoon.com/tagged/detection">#detection</a>, <a href="https://hackernoon.com/tagged/mitre-attandck-framework">#mitre-attandck-framework</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnjvester">@johnjvester</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnjvester">@johnjvester's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-the-mitre-attandck-framework-actually-works">https://hackernoon.com/why-the-mitre-attandck-framework-actually-works</a>.
            <br> ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/mitre-attandck">#mitre-attandck</a>, <a href="https://hackernoon.com/tagged/mitre-attack">#mitre-attack</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>, <a href="https://hackernoon.com/tagged/sumo-logic">#sumo-logic</a>, <a href="https://hackernoon.com/tagged/detection">#detection</a>, <a href="https://hackernoon.com/tagged/mitre-attandck-framework">#mitre-attandck-framework</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnjvester">@johnjvester</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnjvester">@johnjvester's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 24 Nov 2025 08:00:49 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/20905b44/62c55668.mp3" length="4876416" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rK57WYKQ-9baX8J6q59ZkpHAtVEegxidcGUgCbNr60o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NjRk/ODEzNTUyYTMxMTc4/NTM3YjZlZDQ0MWNm/Y2UzOS5qcGVn.jpg"/>
      <itunes:duration>610</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/why-the-mitre-attandck-framework-actually-works">https://hackernoon.com/why-the-mitre-attandck-framework-actually-works</a>.
            <br> ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/mitre-attandck">#mitre-attandck</a>, <a href="https://hackernoon.com/tagged/mitre-attack">#mitre-attack</a>, <a href="https://hackernoon.com/tagged/threat-intelligence">#threat-intelligence</a>, <a href="https://hackernoon.com/tagged/adversarial-ai">#adversarial-ai</a>, <a href="https://hackernoon.com/tagged/sumo-logic">#sumo-logic</a>, <a href="https://hackernoon.com/tagged/detection">#detection</a>, <a href="https://hackernoon.com/tagged/mitre-attandck-framework">#mitre-attandck-framework</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/johnjvester">@johnjvester</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/johnjvester">@johnjvester's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                ATT&amp;CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>mitre-attandck,mitre-attack,threat-intelligence,adversarial-ai,sumo-logic,detection,mitre-attandck-framework,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Is A Practice, Not A One-Time Project</title>
      <itunes:title>Security Is A Practice, Not A One-Time Project</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9cf80e9f-270a-41f1-ac1f-f8459134ef84</guid>
      <link>https://share.transistor.fm/s/aca6d2af</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-is-a-practice-not-a-one-time-project">https://hackernoon.com/security-is-a-practice-not-a-one-time-project</a>.
            <br> Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/ai-security-tool">#ai-security-tool</a>, <a href="https://hackernoon.com/tagged/security-tips">#security-tips</a>, <a href="https://hackernoon.com/tagged/security-daily-habits">#security-daily-habits</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tools">#cybersecurity-tools</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-compliance">#cybersecurity-compliance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn’t a one-time task; it’s a continuous practice. It’s built through daily habits, consistent testing, and the right tools that strengthen your defenses over time. Treating security as a practice, not a project, is what keeps software products resilient against evolving threats.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-is-a-practice-not-a-one-time-project">https://hackernoon.com/security-is-a-practice-not-a-one-time-project</a>.
            <br> Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/ai-security-tool">#ai-security-tool</a>, <a href="https://hackernoon.com/tagged/security-tips">#security-tips</a>, <a href="https://hackernoon.com/tagged/security-daily-habits">#security-daily-habits</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tools">#cybersecurity-tools</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-compliance">#cybersecurity-compliance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn’t a one-time task; it’s a continuous practice. It’s built through daily habits, consistent testing, and the right tools that strengthen your defenses over time. Treating security as a practice, not a project, is what keeps software products resilient against evolving threats.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 20 Nov 2025 08:00:38 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/aca6d2af/2fe38ebf.mp3" length="3675648" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YZrKnhaEBa6S7nfB2N0c1oK98Qh4RTpniLRSm-gXm54/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZjMz/N2UwMGVjOWEzNjVm/NmY4OThlOWMxOTc3/YTA0NS5wbmc.jpg"/>
      <itunes:duration>460</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-is-a-practice-not-a-one-time-project">https://hackernoon.com/security-is-a-practice-not-a-one-time-project</a>.
            <br> Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/ai-security-tool">#ai-security-tool</a>, <a href="https://hackernoon.com/tagged/security-tips">#security-tips</a>, <a href="https://hackernoon.com/tagged/security-daily-habits">#security-daily-habits</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tools">#cybersecurity-tools</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/ai-in-cybersecurity">#ai-in-cybersecurity</a>, <a href="https://hackernoon.com/tagged/cybersecurity-compliance">#cybersecurity-compliance</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/jamesmiller">@jamesmiller</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/jamesmiller">@jamesmiller's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security isn’t a one-time task; it’s a continuous practice. It’s built through daily habits, consistent testing, and the right tools that strengthen your defenses over time. Treating security as a practice, not a project, is what keeps software products resilient against evolving threats.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>security,ai-security-tool,security-tips,security-daily-habits,cybersecurity-tools,cyber-security-awareness,ai-in-cybersecurity,cybersecurity-compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec</title>
      <itunes:title>CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a85f1ccb-16e7-4b32-8c6a-fd9f1c685dee</guid>
      <link>https://share.transistor.fm/s/e64e74c8</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec">https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec</a>.
            <br>  Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/credshields">#credshields</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/smart-contract-security">#smart-contract-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Checkmarx and CredShields aim to redefine enterprise application security for the decentralized era. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec">https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec</a>.
            <br>  Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/credshields">#credshields</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/smart-contract-security">#smart-contract-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Checkmarx and CredShields aim to redefine enterprise application security for the decentralized era. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 20 Nov 2025 08:00:35 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/e64e74c8/7c8b2fc4.mp3" length="2000256" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/a3A0gZsvIyGcJmNP1tjqXZiPsFF_o6PbXHJs1vNvDys/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYjg2/ODNlNmMzZTY0MWZi/NzliODhmNTc0NDJk/ZGFhOC5qcGVn.jpg"/>
      <itunes:duration>251</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec">https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec</a>.
            <br>  Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/credshields">#credshields</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/blockchain-development">#blockchain-development</a>, <a href="https://hackernoon.com/tagged/smart-contract-security">#smart-contract-security</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Checkmarx and CredShields aim to redefine enterprise application security for the decentralized era. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,credshields,cybernewswire,press-release,blockchain-development,smart-contract-security,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough </title>
      <itunes:title>SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">00951a3c-ea39-4e6a-b38c-aa8469d8d577</guid>
      <link>https://share.transistor.fm/s/b951dfa6</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough">https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough</a>.
            <br> SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/sci">#sci</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SecurityMetrics' Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Year’s award in the 9th annual CyberSecurity Breakthrough Awards program. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough">https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough</a>.
            <br> SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/sci">#sci</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SecurityMetrics' Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Year’s award in the 9th annual CyberSecurity Breakthrough Awards program. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 19 Nov 2025 08:00:50 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/b951dfa6/87399db9.mp3" length="2603904" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/c7uMsNSUwKhX1S6Zgaa5SItEOoRqoFnZiPpSYrujD9Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zODBj/Y2JjMjA4NmVjZWVl/M2UyNDZkMzZmNjZi/ZWFkOS5qcGVn.jpg"/>
      <itunes:duration>326</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough">https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough</a>.
            <br> SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/sci">#sci</a>, <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SecurityMetrics' Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Year’s award in the 9th annual CyberSecurity Breakthrough Awards program. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,sci,cyber-security,press-release,cyber-threats,cybernewswire,cyber-security-awareness,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing  Java Microservices with Zero Trust Architecture</title>
      <itunes:title>Securing  Java Microservices with Zero Trust Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95dbed69-05bc-4699-b150-309070c20f11</guid>
      <link>https://share.transistor.fm/s/bca210f3</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture">https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture</a>.
            <br> Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/microservices-architecture">#microservices-architecture</a>, <a href="https://hackernoon.com/tagged/api-key-leak-risks">#api-key-leak-risks</a>, <a href="https://hackernoon.com/tagged/mtls-authentication">#mtls-authentication</a>, <a href="https://hackernoon.com/tagged/hashicorp-vault-secrets">#hashicorp-vault-secrets</a>, <a href="https://hackernoon.com/tagged/opa-authorization">#opa-authorization</a>, <a href="https://hackernoon.com/tagged/identity-based-security">#identity-based-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/damodharapalavali85">@damodharapalavali85</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/damodharapalavali85">@damodharapalavali85's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Microservices still rely on outdated “implicit trust” models that make leaked API keys catastrophic. This article explains how Zero Trust—built on identity, mTLS, OPA, and dynamic secrets—redefines secure service-to-service communication and shows how to implement it in Java and Spring Boot.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture">https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture</a>.
            <br> Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/microservices-architecture">#microservices-architecture</a>, <a href="https://hackernoon.com/tagged/api-key-leak-risks">#api-key-leak-risks</a>, <a href="https://hackernoon.com/tagged/mtls-authentication">#mtls-authentication</a>, <a href="https://hackernoon.com/tagged/hashicorp-vault-secrets">#hashicorp-vault-secrets</a>, <a href="https://hackernoon.com/tagged/opa-authorization">#opa-authorization</a>, <a href="https://hackernoon.com/tagged/identity-based-security">#identity-based-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/damodharapalavali85">@damodharapalavali85</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/damodharapalavali85">@damodharapalavali85's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Microservices still rely on outdated “implicit trust” models that make leaked API keys catastrophic. This article explains how Zero Trust—built on identity, mTLS, OPA, and dynamic secrets—redefines secure service-to-service communication and shows how to implement it in Java and Spring Boot.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 19 Nov 2025 08:00:47 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/bca210f3/de2c975c.mp3" length="2702592" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QosbfkNuYzbEiWzA9lcx1ooUJWVDNAthcouEYyM5iuI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ODYx/OGZhNjU2NTZjYzA0/ZmU1MmE0YTJhYWM2/MjRjYS5wbmc.jpg"/>
      <itunes:duration>338</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture">https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture</a>.
            <br> Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/zero-trust-security">#zero-trust-security</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/microservices-architecture">#microservices-architecture</a>, <a href="https://hackernoon.com/tagged/api-key-leak-risks">#api-key-leak-risks</a>, <a href="https://hackernoon.com/tagged/mtls-authentication">#mtls-authentication</a>, <a href="https://hackernoon.com/tagged/hashicorp-vault-secrets">#hashicorp-vault-secrets</a>, <a href="https://hackernoon.com/tagged/opa-authorization">#opa-authorization</a>, <a href="https://hackernoon.com/tagged/identity-based-security">#identity-based-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/damodharapalavali85">@damodharapalavali85</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/damodharapalavali85">@damodharapalavali85's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Microservices still rely on outdated “implicit trust” models that make leaked API keys catastrophic. This article explains how Zero Trust—built on identity, mTLS, OPA, and dynamic secrets—redefines secure service-to-service communication and shows how to implement it in Java and Spring Boot.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>zero-trust-security,cloud-security,microservices-architecture,api-key-leak-risks,mtls-authentication,hashicorp-vault-secrets,opa-authorization,identity-based-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Take A Virtual Tour of Surveillance Tech Along the U.S./Mexico Border</title>
      <itunes:title>Take A Virtual Tour of Surveillance Tech Along the U.S./Mexico Border</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23d8b29a-04a2-46c8-9f0b-8c07cd2df7a4</guid>
      <link>https://share.transistor.fm/s/6f485bb0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border">https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border</a>.
            <br> We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/surveillance">#surveillance</a>, <a href="https://hackernoon.com/tagged/surveillance-tech">#surveillance-tech</a>, <a href="https://hackernoon.com/tagged/government-tech">#government-tech</a>, <a href="https://hackernoon.com/tagged/us-mexico-border">#us-mexico-border</a>, <a href="https://hackernoon.com/tagged/vr-tour">#vr-tour</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/us-border-tech">#us-border-tech</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Electronic Frontier Foundation gave virtual reality tours of surveillance technology along the U.S.-Mexico border. The tour included aerial views of autonomous towers, aerostat blimps, sky towers, automated license plate readers, and border checkpoints.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border">https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border</a>.
            <br> We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/surveillance">#surveillance</a>, <a href="https://hackernoon.com/tagged/surveillance-tech">#surveillance-tech</a>, <a href="https://hackernoon.com/tagged/government-tech">#government-tech</a>, <a href="https://hackernoon.com/tagged/us-mexico-border">#us-mexico-border</a>, <a href="https://hackernoon.com/tagged/vr-tour">#vr-tour</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/us-border-tech">#us-border-tech</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Electronic Frontier Foundation gave virtual reality tours of surveillance technology along the U.S.-Mexico border. The tour included aerial views of autonomous towers, aerostat blimps, sky towers, automated license plate readers, and border checkpoints.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 10 Nov 2025 08:00:29 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6f485bb0/7a26be27.mp3" length="5720640" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6f0HV9qvTGPskQL5nSmfQ07YdLhlYwv-dKfDUacSwZU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNGNk/NGQ0NDFiYWY1NWMy/ZjZkODY3OTQyNWVk/MjFmMC5qcGVn.jpg"/>
      <itunes:duration>716</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border">https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border</a>.
            <br> We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/surveillance">#surveillance</a>, <a href="https://hackernoon.com/tagged/surveillance-tech">#surveillance-tech</a>, <a href="https://hackernoon.com/tagged/government-tech">#government-tech</a>, <a href="https://hackernoon.com/tagged/us-mexico-border">#us-mexico-border</a>, <a href="https://hackernoon.com/tagged/vr-tour">#vr-tour</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/us-border-tech">#us-border-tech</a>, <a href="https://hackernoon.com/tagged/hackernoon-top-story">#hackernoon-top-story</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Electronic Frontier Foundation gave virtual reality tours of surveillance technology along the U.S.-Mexico border. The tour included aerial views of autonomous towers, aerostat blimps, sky towers, automated license plate readers, and border checkpoints.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>surveillance,surveillance-tech,government-tech,us-mexico-border,vr-tour,the-markup,us-border-tech,hackernoon-top-story</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>I Built a Password Tool in 2 Weekends (And Got 1,000 Users)</title>
      <itunes:title>I Built a Password Tool in 2 Weekends (And Got 1,000 Users)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c24c2961-de4a-4d17-a7c4-d2e2d3898584</guid>
      <link>https://share.transistor.fm/s/5ee705f8</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users">https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users</a>.
            <br> Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-manager">#password-manager</a>, <a href="https://hackernoon.com/tagged/password-breached">#password-breached</a>, <a href="https://hackernoon.com/tagged/side-project">#side-project</a>, <a href="https://hackernoon.com/tagged/password-tools">#password-tools</a>, <a href="https://hackernoon.com/tagged/entrepreneurship-experiences">#entrepreneurship-experiences</a>, <a href="https://hackernoon.com/tagged/entrepreneur-mindset">#entrepreneur-mindset</a>, <a href="https://hackernoon.com/tagged/mvp-development">#mvp-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker3895064">@hacker3895064</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker3895064">@hacker3895064's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. I decided to build something so this would never happen again. Two weekends later, [PasswordChecker.in] was live.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users">https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users</a>.
            <br> Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-manager">#password-manager</a>, <a href="https://hackernoon.com/tagged/password-breached">#password-breached</a>, <a href="https://hackernoon.com/tagged/side-project">#side-project</a>, <a href="https://hackernoon.com/tagged/password-tools">#password-tools</a>, <a href="https://hackernoon.com/tagged/entrepreneurship-experiences">#entrepreneurship-experiences</a>, <a href="https://hackernoon.com/tagged/entrepreneur-mindset">#entrepreneur-mindset</a>, <a href="https://hackernoon.com/tagged/mvp-development">#mvp-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker3895064">@hacker3895064</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker3895064">@hacker3895064's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. I decided to build something so this would never happen again. Two weekends later, [PasswordChecker.in] was live.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 09 Nov 2025 08:00:28 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/5ee705f8/1492f3e1.mp3" length="5514624" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7uPQGi1R67TQVAP1fs3No9JuWwBy0JI_vWHo3wUPLnM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83YjYy/OTNiYTUyNGNmNGI4/ZGZlMWNlZmJkNmIx/MGQ3My5qcGVn.jpg"/>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users">https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users</a>.
            <br> Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/password-security">#password-security</a>, <a href="https://hackernoon.com/tagged/password-manager">#password-manager</a>, <a href="https://hackernoon.com/tagged/password-breached">#password-breached</a>, <a href="https://hackernoon.com/tagged/side-project">#side-project</a>, <a href="https://hackernoon.com/tagged/password-tools">#password-tools</a>, <a href="https://hackernoon.com/tagged/entrepreneurship-experiences">#entrepreneurship-experiences</a>, <a href="https://hackernoon.com/tagged/entrepreneur-mindset">#entrepreneur-mindset</a>, <a href="https://hackernoon.com/tagged/mvp-development">#mvp-development</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/hacker3895064">@hacker3895064</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/hacker3895064">@hacker3895064's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. I decided to build something so this would never happen again. Two weekends later, [PasswordChecker.in] was live.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>password-security,password-manager,password-breached,side-project,password-tools,entrepreneurship-experiences,entrepreneur-mindset,mvp-development</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity</title>
      <itunes:title>The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af43fb90-35a3-4641-b5d8-436ade057aa2</guid>
      <link>https://share.transistor.fm/s/9df6d0d0</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity">https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity</a>.
            <br> This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-automation">#ai-automation</a>, <a href="https://hackernoon.com/tagged/crowd-strike">#crowd-strike</a>, <a href="https://hackernoon.com/tagged/machine-speed-risk">#machine-speed-risk</a>, <a href="https://hackernoon.com/tagged/ai-hallucinations">#ai-hallucinations</a>, <a href="https://hackernoon.com/tagged/security-operations">#security-operations</a>, <a href="https://hackernoon.com/tagged/ethical-ai">#ethical-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity">https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity</a>.
            <br> This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-automation">#ai-automation</a>, <a href="https://hackernoon.com/tagged/crowd-strike">#crowd-strike</a>, <a href="https://hackernoon.com/tagged/machine-speed-risk">#machine-speed-risk</a>, <a href="https://hackernoon.com/tagged/ai-hallucinations">#ai-hallucinations</a>, <a href="https://hackernoon.com/tagged/security-operations">#security-operations</a>, <a href="https://hackernoon.com/tagged/ethical-ai">#ethical-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 03 Nov 2025 08:00:32 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/9df6d0d0/dcee4d71.mp3" length="6480192" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-JPLXJdmvLFhYiQ73x14MIx7PblQBCzMSQK-__dukOI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MTRj/M2I2M2M4ZTNkM2I3/NDdmNDhiMzczMmQ1/OWY3Ni5qcGVn.jpg"/>
      <itunes:duration>811</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity">https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity</a>.
            <br> This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ai-automation">#ai-automation</a>, <a href="https://hackernoon.com/tagged/crowd-strike">#crowd-strike</a>, <a href="https://hackernoon.com/tagged/machine-speed-risk">#machine-speed-risk</a>, <a href="https://hackernoon.com/tagged/ai-hallucinations">#ai-hallucinations</a>, <a href="https://hackernoon.com/tagged/security-operations">#security-operations</a>, <a href="https://hackernoon.com/tagged/ethical-ai">#ethical-ai</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/drechimyn">@drechimyn</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/drechimyn">@drechimyn's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cyber-security,ai,ai-automation,crowd-strike,machine-speed-risk,ai-hallucinations,security-operations,ethical-ai</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>GodLoader Malware Loader: What You Need to Be Aware of</title>
      <itunes:title>GodLoader Malware Loader: What You Need to Be Aware of</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8ee85c2-db23-470e-887e-c04d3a007cfe</guid>
      <link>https://share.transistor.fm/s/a1914daa</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of">https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of</a>.
            <br> We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/godot">#godot</a>, <a href="https://hackernoon.com/tagged/godot-engine">#godot-engine</a>, <a href="https://hackernoon.com/tagged/godloader">#godloader</a>, <a href="https://hackernoon.com/tagged/godot-security">#godot-security</a>, <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/internet-security">#internet-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/Godot%20Engine">@Godot Engine</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/Godot%20Engine">@Godot Engine's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security researchers at Check Point Research have published a report about God loader. God loader is a malware loader using Godot as its runtime to execute malicious code and infect users with known malware. The Godot Engine is a programming system with a scripting language. It is possible to write malicious programs in any programming language.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of">https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of</a>.
            <br> We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/godot">#godot</a>, <a href="https://hackernoon.com/tagged/godot-engine">#godot-engine</a>, <a href="https://hackernoon.com/tagged/godloader">#godloader</a>, <a href="https://hackernoon.com/tagged/godot-security">#godot-security</a>, <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/internet-security">#internet-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/Godot%20Engine">@Godot Engine</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/Godot%20Engine">@Godot Engine's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security researchers at Check Point Research have published a report about God loader. God loader is a malware loader using Godot as its runtime to execute malicious code and infect users with known malware. The Godot Engine is a programming system with a scripting language. It is possible to write malicious programs in any programming language.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sun, 02 Nov 2025 08:00:37 -0800</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/a1914daa/68a4f56f.mp3" length="1930176" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jOGN0tRl_xVbY5p7bd960egsdR_TedQgyFqPDvRvONY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNDc2/ODEyNjk3MjY1Mjhk/NGE1OTFjOGQ0MTEx/MTY1Mi5qcGVn.jpg"/>
      <itunes:duration>242</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of">https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of</a>.
            <br> We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cyber-security">#cyber-security</a>, <a href="https://hackernoon.com/tagged/godot">#godot</a>, <a href="https://hackernoon.com/tagged/godot-engine">#godot-engine</a>, <a href="https://hackernoon.com/tagged/godloader">#godloader</a>, <a href="https://hackernoon.com/tagged/godot-security">#godot-security</a>, <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/internet-security">#internet-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/Godot%20Engine">@Godot Engine</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/Godot%20Engine">@Godot Engine's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Security researchers at Check Point Research have published a report about God loader. God loader is a malware loader using Godot as its runtime to execute malicious code and infect users with known malware. The Godot Engine is a programming system with a scripting language. It is possible to write malicious programs in any programming language.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cyber-security,godot,godot-engine,godloader,godot-security,online-safety,cyber-security-awareness,internet-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation</title>
      <itunes:title>Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">93f69495-7cac-4ccc-9d6c-1d0cbaa87f6a</guid>
      <link>https://share.transistor.fm/s/9905e839</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation">https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation</a>.
            <br> Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/nist-framework-implementation">#nist-framework-implementation</a>, <a href="https://hackernoon.com/tagged/rashmi-bharathan">#rashmi-bharathan</a>, <a href="https://hackernoon.com/tagged/it-compliance-transformation">#it-compliance-transformation</a>, <a href="https://hackernoon.com/tagged/it-service-management-(itsm)">#it-service-management-(itsm)</a>, <a href="https://hackernoon.com/tagged/servicenow-automation">#servicenow-automation</a>, <a href="https://hackernoon.com/tagged/audit-readiness-and-governance">#audit-readiness-and-governance</a>, <a href="https://hackernoon.com/tagged/diversity-in-tech-compliance">#diversity-in-tech-compliance</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With 13+ years in IT governance, Rashmi Bharathan led a global NIST Framework rollout that boosted audit readiness by 70% and cut manual tracking by 60%. Her ServiceNow-driven automation and cross-regional leadership redefined enterprise compliance standards. Beyond tech, her ISSA and ISACA initiatives empower the next generation of cybersecurity leaders.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation">https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation</a>.
            <br> Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/nist-framework-implementation">#nist-framework-implementation</a>, <a href="https://hackernoon.com/tagged/rashmi-bharathan">#rashmi-bharathan</a>, <a href="https://hackernoon.com/tagged/it-compliance-transformation">#it-compliance-transformation</a>, <a href="https://hackernoon.com/tagged/it-service-management-(itsm)">#it-service-management-(itsm)</a>, <a href="https://hackernoon.com/tagged/servicenow-automation">#servicenow-automation</a>, <a href="https://hackernoon.com/tagged/audit-readiness-and-governance">#audit-readiness-and-governance</a>, <a href="https://hackernoon.com/tagged/diversity-in-tech-compliance">#diversity-in-tech-compliance</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With 13+ years in IT governance, Rashmi Bharathan led a global NIST Framework rollout that boosted audit readiness by 70% and cut manual tracking by 60%. Her ServiceNow-driven automation and cross-regional leadership redefined enterprise compliance standards. Beyond tech, her ISSA and ISACA initiatives empower the next generation of cybersecurity leaders.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 30 Oct 2025 09:00:46 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/9905e839/2bceef94.mp3" length="3803904" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/71WRYPN_MyHTnsYkTyS_ToHWRCPyrxbhPoddW2y-9jU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZTlj/ZjljZWQyMmYwYjRj/NjAwYTFmYzYwMmU4/OTYzNi5qcGVn.jpg"/>
      <itunes:duration>476</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation">https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation</a>.
            <br> Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/nist-framework-implementation">#nist-framework-implementation</a>, <a href="https://hackernoon.com/tagged/rashmi-bharathan">#rashmi-bharathan</a>, <a href="https://hackernoon.com/tagged/it-compliance-transformation">#it-compliance-transformation</a>, <a href="https://hackernoon.com/tagged/it-service-management-(itsm)">#it-service-management-(itsm)</a>, <a href="https://hackernoon.com/tagged/servicenow-automation">#servicenow-automation</a>, <a href="https://hackernoon.com/tagged/audit-readiness-and-governance">#audit-readiness-and-governance</a>, <a href="https://hackernoon.com/tagged/diversity-in-tech-compliance">#diversity-in-tech-compliance</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanya_kapoor">@sanya_kapoor</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanya_kapoor">@sanya_kapoor's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                With 13+ years in IT governance, Rashmi Bharathan led a global NIST Framework rollout that boosted audit readiness by 70% and cut manual tracking by 60%. Her ServiceNow-driven automation and cross-regional leadership redefined enterprise compliance standards. Beyond tech, her ISSA and ISACA initiatives empower the next generation of cybersecurity leaders.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>nist-framework-implementation,rashmi-bharathan,it-compliance-transformation,it-service-management-(itsm),servicenow-automation,audit-readiness-and-governance,diversity-in-tech-compliance,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>To Infinity… and Delete</title>
      <itunes:title>To Infinity… and Delete</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">79cce01d-3467-4da0-89cf-2bf9dcc35d27</guid>
      <link>https://share.transistor.fm/s/509891bc</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/to-infinity-and-delete">https://hackernoon.com/to-infinity-and-delete</a>.
            <br> In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/backup">#backup</a>, <a href="https://hackernoon.com/tagged/disaster-recovery">#disaster-recovery</a>, <a href="https://hackernoon.com/tagged/backup-tips">#backup-tips</a>, <a href="https://hackernoon.com/tagged/toy-story-2-deleted">#toy-story-2-deleted</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A single mistyped command erased Toy Story 2 from existence in 1998. Pixar's backup system had quietly failed weeks earlier. Backup from a mother's laptop allowed the team to recover nearly everything that was lost.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/to-infinity-and-delete">https://hackernoon.com/to-infinity-and-delete</a>.
            <br> In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/backup">#backup</a>, <a href="https://hackernoon.com/tagged/disaster-recovery">#disaster-recovery</a>, <a href="https://hackernoon.com/tagged/backup-tips">#backup-tips</a>, <a href="https://hackernoon.com/tagged/toy-story-2-deleted">#toy-story-2-deleted</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A single mistyped command erased Toy Story 2 from existence in 1998. Pixar's backup system had quietly failed weeks earlier. Backup from a mother's laptop allowed the team to recover nearly everything that was lost.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 30 Oct 2025 09:00:44 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/509891bc/98c3e304.mp3" length="2620224" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-jRHp0DM-FwVML8bHv4TkjQwRH1TXphjB7WwEafqU6Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NTM4/OGQwN2I3OTI3MWNj/MDk3ZjUzZjdkNzhk/YjM2OS5wbmc.jpg"/>
      <itunes:duration>328</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/to-infinity-and-delete">https://hackernoon.com/to-infinity-and-delete</a>.
            <br> In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybersecurity-tips">#cybersecurity-tips</a>, <a href="https://hackernoon.com/tagged/backup">#backup</a>, <a href="https://hackernoon.com/tagged/disaster-recovery">#disaster-recovery</a>, <a href="https://hackernoon.com/tagged/backup-tips">#backup-tips</a>, <a href="https://hackernoon.com/tagged/toy-story-2-deleted">#toy-story-2-deleted</a>, <a href="https://hackernoon.com/tagged/data-backup">#data-backup</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/blackheart">@blackheart</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/blackheart">@blackheart's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                A single mistyped command erased Toy Story 2 from existence in 1998. Pixar's backup system had quietly failed weeks earlier. Backup from a mother's laptop allowed the team to recover nearly everything that was lost.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,cyber-security-awareness,cybersecurity-tips,backup,disaster-recovery,backup-tips,toy-story-2-deleted,data-backup</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>What Every E-Commerce Brand Should Know About Prompt Injection Attacks</title>
      <itunes:title>What Every E-Commerce Brand Should Know About Prompt Injection Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">644a8a15-2028-4815-83a5-040bb17a1224</guid>
      <link>https://share.transistor.fm/s/6e90a461</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks">https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks</a>.
            <br> Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/prompt-injection-security">#prompt-injection-security</a>, <a href="https://hackernoon.com/tagged/llm-vulnerabilities">#llm-vulnerabilities</a>, <a href="https://hackernoon.com/tagged/e-commerce-ai">#e-commerce-ai</a>, <a href="https://hackernoon.com/tagged/ai-agent-attacks">#ai-agent-attacks</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/prompt-engineering-security">#prompt-engineering-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mattleads">@mattleads</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mattleads">@mattleads's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Prompt injection is emerging as one of the most dangerous vulnerabilities in modern AI systems. By embedding hidden directives in user inputs, attackers can manipulate AI agents into leaking data, distorting results, or executing unauthorized actions. Real-world incidents—from Google Bard exploits to browser-based attacks—show how pervasive the threat has become. For e-commerce platforms and developers, defense requires layered strategies: immutable core prompts, role-based API restrictions, output validation, and continuous adversarial testing. In the era of agentic AI, safeguarding against prompt injection is no longer optional—it’s mission-critical.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks">https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks</a>.
            <br> Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/prompt-injection-security">#prompt-injection-security</a>, <a href="https://hackernoon.com/tagged/llm-vulnerabilities">#llm-vulnerabilities</a>, <a href="https://hackernoon.com/tagged/e-commerce-ai">#e-commerce-ai</a>, <a href="https://hackernoon.com/tagged/ai-agent-attacks">#ai-agent-attacks</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/prompt-engineering-security">#prompt-engineering-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mattleads">@mattleads</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mattleads">@mattleads's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Prompt injection is emerging as one of the most dangerous vulnerabilities in modern AI systems. By embedding hidden directives in user inputs, attackers can manipulate AI agents into leaking data, distorting results, or executing unauthorized actions. Real-world incidents—from Google Bard exploits to browser-based attacks—show how pervasive the threat has become. For e-commerce platforms and developers, defense requires layered strategies: immutable core prompts, role-based API restrictions, output validation, and continuous adversarial testing. In the era of agentic AI, safeguarding against prompt injection is no longer optional—it’s mission-critical.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 29 Oct 2025 09:00:46 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6e90a461/ea243e99.mp3" length="5576640" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/U10KUCpbvaNkB2k3riDHeDdcHG5zhXIzskQkXn-Wl2M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTFi/ZTY4ZWRhM2Q1ODJm/N2MxOTkyOWEyY2Mx/YzI5Mi5qcGVn.jpg"/>
      <itunes:duration>698</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks">https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks</a>.
            <br> Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ai-security">#ai-security</a>, <a href="https://hackernoon.com/tagged/prompt-injection">#prompt-injection</a>, <a href="https://hackernoon.com/tagged/prompt-injection-security">#prompt-injection-security</a>, <a href="https://hackernoon.com/tagged/llm-vulnerabilities">#llm-vulnerabilities</a>, <a href="https://hackernoon.com/tagged/e-commerce-ai">#e-commerce-ai</a>, <a href="https://hackernoon.com/tagged/ai-agent-attacks">#ai-agent-attacks</a>, <a href="https://hackernoon.com/tagged/ai-red-teaming">#ai-red-teaming</a>, <a href="https://hackernoon.com/tagged/prompt-engineering-security">#prompt-engineering-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/mattleads">@mattleads</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/mattleads">@mattleads's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Prompt injection is emerging as one of the most dangerous vulnerabilities in modern AI systems. By embedding hidden directives in user inputs, attackers can manipulate AI agents into leaking data, distorting results, or executing unauthorized actions. Real-world incidents—from Google Bard exploits to browser-based attacks—show how pervasive the threat has become. For e-commerce platforms and developers, defense requires layered strategies: immutable core prompts, role-based API restrictions, output validation, and continuous adversarial testing. In the era of agentic AI, safeguarding against prompt injection is no longer optional—it’s mission-critical.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ai-security,prompt-injection,prompt-injection-security,llm-vulnerabilities,e-commerce-ai,ai-agent-attacks,ai-red-teaming,prompt-engineering-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How IPinfo Turns Registry Data into Real Intelligence</title>
      <itunes:title>How IPinfo Turns Registry Data into Real Intelligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a24bc353-647c-438d-8665-5fdbf4b360db</guid>
      <link>https://share.transistor.fm/s/316faf95</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence">https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence</a>.
            <br> Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-addresses-explained">#ip-addresses-explained</a>, <a href="https://hackernoon.com/tagged/what-is-an-asn">#what-is-an-asn</a>, <a href="https://hackernoon.com/tagged/whois-limitations">#whois-limitations</a>, <a href="https://hackernoon.com/tagged/regional-internet-registries">#regional-internet-registries</a>, <a href="https://hackernoon.com/tagged/ipinfo-datasets">#ipinfo-datasets</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/bgp-routing-as-numbers">#bgp-routing-as-numbers</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Internet runs on unique IP addresses and ASNs, allocated by RIRs and tracked in WHOIS records. But registry data is static, inconsistent, and often unreliable for geolocation or ownership. IPinfo enhances these datasets with real-time measurements, privacy detection, and standardized intelligence—helping operators, researchers, and defenders move from assumptions to evidence.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence">https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence</a>.
            <br> Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-addresses-explained">#ip-addresses-explained</a>, <a href="https://hackernoon.com/tagged/what-is-an-asn">#what-is-an-asn</a>, <a href="https://hackernoon.com/tagged/whois-limitations">#whois-limitations</a>, <a href="https://hackernoon.com/tagged/regional-internet-registries">#regional-internet-registries</a>, <a href="https://hackernoon.com/tagged/ipinfo-datasets">#ipinfo-datasets</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/bgp-routing-as-numbers">#bgp-routing-as-numbers</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Internet runs on unique IP addresses and ASNs, allocated by RIRs and tracked in WHOIS records. But registry data is static, inconsistent, and often unreliable for geolocation or ownership. IPinfo enhances these datasets with real-time measurements, privacy detection, and standardized intelligence—helping operators, researchers, and defenders move from assumptions to evidence.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Tue, 28 Oct 2025 09:00:33 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/316faf95/f2f5df81.mp3" length="9101952" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wlsnAn8PQvSlPXsnlEV2z0XA_gdO5LhBjGS_gaWA5C0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZjFh/MDE1MjU4MzNmYWNl/MDc4OTI0N2FmODY2/NmY4MC5qcGVn.jpg"/>
      <itunes:duration>1138</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence">https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence</a>.
            <br> Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/ip-addresses-explained">#ip-addresses-explained</a>, <a href="https://hackernoon.com/tagged/what-is-an-asn">#what-is-an-asn</a>, <a href="https://hackernoon.com/tagged/whois-limitations">#whois-limitations</a>, <a href="https://hackernoon.com/tagged/regional-internet-registries">#regional-internet-registries</a>, <a href="https://hackernoon.com/tagged/ipinfo-datasets">#ipinfo-datasets</a>, <a href="https://hackernoon.com/tagged/ip-geolocation-accuracy">#ip-geolocation-accuracy</a>, <a href="https://hackernoon.com/tagged/bgp-routing-as-numbers">#bgp-routing-as-numbers</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/ipinfo">@ipinfo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/ipinfo">@ipinfo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The Internet runs on unique IP addresses and ASNs, allocated by RIRs and tracked in WHOIS records. But registry data is static, inconsistent, and often unreliable for geolocation or ownership. IPinfo enhances these datasets with real-time measurements, privacy detection, and standardized intelligence—helping operators, researchers, and defenders move from assumptions to evidence.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>ip-addresses-explained,what-is-an-asn,whois-limitations,regional-internet-registries,ipinfo-datasets,ip-geolocation-accuracy,bgp-routing-as-numbers,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Protect Your Kids Online When They're Playing Video Games</title>
      <itunes:title>How to Protect Your Kids Online When They're Playing Video Games</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">caa70799-2ee2-4f58-8af0-80a34568b5e5</guid>
      <link>https://share.transistor.fm/s/af12de8e</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games">https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games</a>.
            <br> Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-for-minors">#online-safety-for-minors</a>, <a href="https://hackernoon.com/tagged/video-game-safety">#video-game-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-tips">#online-safety-tips</a>, <a href="https://hackernoon.com/tagged/child-safety-online">#child-safety-online</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-security">#data-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Once you’ve found some helpful advice, the sections that follow provide more detailed context and background on some of the issues at play.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games">https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games</a>.
            <br> Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-for-minors">#online-safety-for-minors</a>, <a href="https://hackernoon.com/tagged/video-game-safety">#video-game-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-tips">#online-safety-tips</a>, <a href="https://hackernoon.com/tagged/child-safety-online">#child-safety-online</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-security">#data-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Once you’ve found some helpful advice, the sections that follow provide more detailed context and background on some of the issues at play.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 27 Oct 2025 09:01:00 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/af12de8e/647b3815.mp3" length="5183808" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hspXteGSFg_4FXjN5ffL-ZAmke6bxMAJEPBSnGwheog/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOTA1/ZmZhOWI2NTMzN2Mz/ZjNmNGJlNGU0ODc1/YTQzMy5qcGVn.jpg"/>
      <itunes:duration>648</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games">https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games</a>.
            <br> Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts.  <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/online-safety">#online-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-for-minors">#online-safety-for-minors</a>, <a href="https://hackernoon.com/tagged/video-game-safety">#video-game-safety</a>, <a href="https://hackernoon.com/tagged/online-safety-tips">#online-safety-tips</a>, <a href="https://hackernoon.com/tagged/child-safety-online">#child-safety-online</a>, <a href="https://hackernoon.com/tagged/the-markup">#the-markup</a>, <a href="https://hackernoon.com/tagged/data-privacy">#data-privacy</a>, <a href="https://hackernoon.com/tagged/data-security">#data-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/TheMarkup">@TheMarkup</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/TheMarkup">@TheMarkup's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Once you’ve found some helpful advice, the sections that follow provide more detailed context and background on some of the issues at play.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>online-safety,online-safety-for-minors,video-game-safety,online-safety-tips,child-safety-online,the-markup,data-privacy,data-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats</title>
      <itunes:title>Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d9f430c7-68d8-4f28-b217-4318a593e379</guid>
      <link>https://share.transistor.fm/s/c077128c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats">https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats</a>.
            <br> The tool lets companies create and send their own text-message campaigns safely, at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/arsen">#arsen</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/arsen-announcement">#arsen-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. The tool lets companies create and send their own text-message campaigns safely, at scale.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats">https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats</a>.
            <br> The tool lets companies create and send their own text-message campaigns safely, at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/arsen">#arsen</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/arsen-announcement">#arsen-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. The tool lets companies create and send their own text-message campaigns safely, at scale.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Mon, 27 Oct 2025 09:00:57 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/c077128c/f8011d5f.mp3" length="1838976" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/V79IlklxSBeXZb3KhpTvMvbhxfUg6fvncavWow6DElo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZDgw/Nzk3NzQ1MjdmZjYy/NTM1ZmY0ZjMzNTcx/MmZkOS5qcGVn.jpg"/>
      <itunes:duration>230</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats">https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats</a>.
            <br> The tool lets companies create and send their own text-message campaigns safely, at scale. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/arsen">#arsen</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/arsen-announcement">#arsen-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. The tool lets companies create and send their own text-message campaigns safely, at scale.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,arsen,cybernewswire,press-release,arsen-announcement,cyber-threats,cyber-security-awareness,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security That Moves at Dev Speed: Practical Ways to Shift Left</title>
      <itunes:title>Security That Moves at Dev Speed: Practical Ways to Shift Left</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a67acdd9-827e-4edd-aeec-fa91b43f9a85</guid>
      <link>https://share.transistor.fm/s/cfcc550c</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left">https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left</a>.
            <br> Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/shift-left">#shift-left</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/cicd">#cicd</a>, <a href="https://hackernoon.com/tagged/kubernetes">#kubernetes</a>, <a href="https://hackernoon.com/tagged/shift-left-security">#shift-left-security</a>, <a href="https://hackernoon.com/tagged/shift-left-testing">#shift-left-testing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/fatihkoc">@fatihkoc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/fatihkoc">@fatihkoc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left">https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left</a>.
            <br> Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/shift-left">#shift-left</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/cicd">#cicd</a>, <a href="https://hackernoon.com/tagged/kubernetes">#kubernetes</a>, <a href="https://hackernoon.com/tagged/shift-left-security">#shift-left-security</a>, <a href="https://hackernoon.com/tagged/shift-left-testing">#shift-left-testing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/fatihkoc">@fatihkoc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/fatihkoc">@fatihkoc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Sat, 25 Oct 2025 09:00:33 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/cfcc550c/b464e511.mp3" length="4260672" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ybiMW3cJluJ4A8AiFUo3g_cOh6bedEOXoZnkdPtTFWc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YTQ5/Yzc0MzhmYjRhMjM3/YjUxODc5YTM0MzRi/YTQzOS53ZWJw.jpg"/>
      <itunes:duration>533</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left">https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left</a>.
            <br> Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/security">#security</a>, <a href="https://hackernoon.com/tagged/shift-left">#shift-left</a>, <a href="https://hackernoon.com/tagged/devops">#devops</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>, <a href="https://hackernoon.com/tagged/cicd">#cicd</a>, <a href="https://hackernoon.com/tagged/kubernetes">#kubernetes</a>, <a href="https://hackernoon.com/tagged/shift-left-security">#shift-left-security</a>, <a href="https://hackernoon.com/tagged/shift-left-testing">#shift-left-testing</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/fatihkoc">@fatihkoc</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/fatihkoc">@fatihkoc's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>security,shift-left,devops,cloud-security,cicd,kubernetes,shift-left-security,shift-left-testing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar</title>
      <itunes:title>AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0d1dd667-072c-4cd6-97d0-97d1119135f8</guid>
      <link>https://share.transistor.fm/s/f4467409</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar">https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar</a>.
            <br> The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar">https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar</a>.
            <br> The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 09:00:56 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/f4467409/c74ce387.mp3" length="2055360" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cNKeLb7txUdD4nRsMcZNdfz60URw79JXBw59AY5kEas/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDIw/MjU2NGRhZDdhMTc1/YjczMGRmZWNjOGFl/ZTY2My5qcGVn.jpg"/>
      <itunes:duration>257</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar">https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar</a>.
            <br> The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,squarex,cybernewswire,press-release,squarex-announcement,cyber-threats,cyber-security-awareness,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks</title>
      <itunes:title>Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d16f928e-0e80-4c93-946e-b3acdf7c27e3</guid>
      <link>https://share.transistor.fm/s/ead67aca</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks">https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks</a>.
            <br> AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ddos-attack">#ddos-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity-in-the-age-of-ai">#cybersecurity-in-the-age-of-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity-market">#ai-cybersecurity-market</a>, <a href="https://hackernoon.com/tagged/ai-for-cybersecurity">#ai-for-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cyberlani">@cyberlani</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cyberlani">@cyberlani's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DDoS attacks have been around for decades, but they've evolved far beyond the normal “flood the server until it breaks" approach most people imagine. Today's attacks are powered by artificial intelligence that can identify vulnerabilities faster, orchestrate multi- vector campaigns, and adapt tactics in real time.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks">https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks</a>.
            <br> AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ddos-attack">#ddos-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity-in-the-age-of-ai">#cybersecurity-in-the-age-of-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity-market">#ai-cybersecurity-market</a>, <a href="https://hackernoon.com/tagged/ai-for-cybersecurity">#ai-for-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cyberlani">@cyberlani</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cyberlani">@cyberlani's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DDoS attacks have been around for decades, but they've evolved far beyond the normal “flood the server until it breaks" approach most people imagine. Today's attacks are powered by artificial intelligence that can identify vulnerabilities faster, orchestrate multi- vector campaigns, and adapt tactics in real time.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 09:00:53 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/ead67aca/9724a242.mp3" length="4708416" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nmVk7IalbkeSYCJzJSToQ9n5XEgicLaoZwPHoPIetiY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZThk/ZmY3NjU2NzNlZjk5/ZTcxYjQwZDY5MGZk/MTYzZS5wbmc.jpg"/>
      <itunes:duration>589</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks">https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks</a>.
            <br> AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/artificial-intelligence">#artificial-intelligence</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/ddos-attack">#ddos-attack</a>, <a href="https://hackernoon.com/tagged/cybersecurity-in-the-age-of-ai">#cybersecurity-in-the-age-of-ai</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity">#ai-cybersecurity</a>, <a href="https://hackernoon.com/tagged/ai-cybersecurity-market">#ai-cybersecurity-market</a>, <a href="https://hackernoon.com/tagged/ai-for-cybersecurity">#ai-for-cybersecurity</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cyberlani">@cyberlani</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cyberlani">@cyberlani's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                DDoS attacks have been around for decades, but they've evolved far beyond the normal “flood the server until it breaks" approach most people imagine. Today's attacks are powered by artificial intelligence that can identify vulnerabilities faster, orchestrate multi- vector campaigns, and adapt tactics in real time.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,artificial-intelligence,ai,ddos-attack,cybersecurity-in-the-age-of-ai,ai-cybersecurity,ai-cybersecurity-market,ai-for-cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads&amp; Malicious Link Distribution</title>
      <itunes:title>SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads&amp; Malicious Link Distribution</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ce9c160-611e-4e18-8921-63bbd5f513bc</guid>
      <link>https://share.transistor.fm/s/035b18a1</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution">https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution</a>.
            <br> The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SquareX has released critical security research exposing major vulnerabilities in AI Browsers. The research could allow attackers to exploit AI B browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution">https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution</a>.
            <br> The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SquareX has released critical security research exposing major vulnerabilities in AI Browsers. The research could allow attackers to exploit AI B browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 10 Oct 2025 09:00:49 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/035b18a1/388fe877.mp3" length="2355648" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GaxrI_0QFt-7PQKIsx-kqx1Z4kJknLmYr_Fg6uClwyw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNzJm/ZTRlM2UzOTkxNzU1/NGZmMDNjYThlOTRj/M2M1My5qcGVn.jpg"/>
      <itunes:duration>295</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution">https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution</a>.
            <br> The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/squarex">#squarex</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/squarex-announcement">#squarex-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/cybercrime">#cybercrime</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                SquareX has released critical security research exposing major vulnerabilities in AI Browsers. The research could allow attackers to exploit AI B browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,squarex,cybernewswire,press-release,squarex-announcement,cyber-security-awareness,cybercrime,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method</title>
      <itunes:title>Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5e2729eb-6560-4848-8c88-3179e622665e</guid>
      <link>https://share.transistor.fm/s/6e350104</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method">https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method</a>.
            <br> Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/elliptic-curve-cryptography">#elliptic-curve-cryptography</a>, <a href="https://hackernoon.com/tagged/cryptography">#cryptography</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/blockchain-technology">#blockchain-technology</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/isogeny-based-cryptography">#isogeny-based-cryptography</a>, <a href="https://hackernoon.com/tagged/homomorphic-encryption">#homomorphic-encryption</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/deeptiman">@deeptiman</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/deeptiman">@deeptiman's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method">https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method</a>.
            <br> Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/elliptic-curve-cryptography">#elliptic-curve-cryptography</a>, <a href="https://hackernoon.com/tagged/cryptography">#cryptography</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/blockchain-technology">#blockchain-technology</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/isogeny-based-cryptography">#isogeny-based-cryptography</a>, <a href="https://hackernoon.com/tagged/homomorphic-encryption">#homomorphic-encryption</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/deeptiman">@deeptiman</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/deeptiman">@deeptiman's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Fri, 10 Oct 2025 09:00:48 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/6e350104/286ba09b.mp3" length="9266880" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/I9wqawj_Ru-W4pb8plPLd6LSJWVbZuI85d-bGWYWpDs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZWQz/MDA0ZjU3NGUyMDc5/YjI4OTdlMDIxMjU3/OGYxMy5wbmc.jpg"/>
      <itunes:duration>1159</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method">https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method</a>.
            <br> Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/elliptic-curve-cryptography">#elliptic-curve-cryptography</a>, <a href="https://hackernoon.com/tagged/cryptography">#cryptography</a>, <a href="https://hackernoon.com/tagged/encryption">#encryption</a>, <a href="https://hackernoon.com/tagged/blockchain-technology">#blockchain-technology</a>, <a href="https://hackernoon.com/tagged/post-quantum-cryptography">#post-quantum-cryptography</a>, <a href="https://hackernoon.com/tagged/isogeny-based-cryptography">#isogeny-based-cryptography</a>, <a href="https://hackernoon.com/tagged/homomorphic-encryption">#homomorphic-encryption</a>, <a href="https://hackernoon.com/tagged/cloud-security">#cloud-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/deeptiman">@deeptiman</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/deeptiman">@deeptiman's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>elliptic-curve-cryptography,cryptography,encryption,blockchain-technology,post-quantum-cryptography,isogeny-based-cryptography,homomorphic-encryption,cloud-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation</title>
      <itunes:title>The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">50dcd0fb-d938-4caf-ac5b-e518fdae9a6d</guid>
      <link>https://share.transistor.fm/s/8820e7cd</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation">https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation</a>.
            <br> Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/chatgpt">#chatgpt</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/nlp-tools">#nlp-tools</a>, <a href="https://hackernoon.com/tagged/nlp-tools-phishing">#nlp-tools-phishing</a>, <a href="https://hackernoon.com/tagged/ai-scams">#ai-scams</a>, <a href="https://hackernoon.com/tagged/dark-side-of-gpt">#dark-side-of-gpt</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanjaybarot">@sanjaybarot</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanjaybarot">@sanjaybarot's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. 
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation">https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation</a>.
            <br> Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/chatgpt">#chatgpt</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/nlp-tools">#nlp-tools</a>, <a href="https://hackernoon.com/tagged/nlp-tools-phishing">#nlp-tools-phishing</a>, <a href="https://hackernoon.com/tagged/ai-scams">#ai-scams</a>, <a href="https://hackernoon.com/tagged/dark-side-of-gpt">#dark-side-of-gpt</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanjaybarot">@sanjaybarot</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanjaybarot">@sanjaybarot's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. 
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 09 Oct 2025 09:00:33 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/8820e7cd/eda1c26b.mp3" length="14720256" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/znq-6FUD1n4BRREJ2Fsm6fbxeoF4doRQWSuGSfQrlEI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYjhi/MWU2MWQ3MDI3ODQ1/N2FhZTM5NzNiNWEw/YTVhYS5wbmc.jpg"/>
      <itunes:duration>1841</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation">https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation</a>.
            <br> Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/chatgpt">#chatgpt</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/ai">#ai</a>, <a href="https://hackernoon.com/tagged/nlp-tools">#nlp-tools</a>, <a href="https://hackernoon.com/tagged/nlp-tools-phishing">#nlp-tools-phishing</a>, <a href="https://hackernoon.com/tagged/ai-scams">#ai-scams</a>, <a href="https://hackernoon.com/tagged/dark-side-of-gpt">#dark-side-of-gpt</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/sanjaybarot">@sanjaybarot</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/sanjaybarot">@sanjaybarot's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. 
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,chatgpt,phishing-attacks,ai,nlp-tools,nlp-tools-phishing,ai-scams,dark-side-of-gpt</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks</title>
      <itunes:title>Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">93895454-00e0-4ac7-9fcb-09c494ef1dc3</guid>
      <link>https://share.transistor.fm/s/02857450</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks">https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks</a>.
            <br> Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/social-engineering">#social-engineering</a>, <a href="https://hackernoon.com/tagged/next-gen-cyberattacks">#next-gen-cyberattacks</a>, <a href="https://hackernoon.com/tagged/digital-operational-resilience">#digital-operational-resilience</a>, <a href="https://hackernoon.com/tagged/third-party-risk">#third-party-risk</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I explain why relying on phishing training is obsolete. Agentic AI isn't just sending smarter emails: it’s an autonomous, self-correcting threat that weaponises human trust at machine speed. My GRC work shows how these agents systematically bypass third-party controls and achieve military-grade coordination across IT and OT, demanding an urgent and autonomous shift in our defence and governance models.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks">https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks</a>.
            <br> Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/social-engineering">#social-engineering</a>, <a href="https://hackernoon.com/tagged/next-gen-cyberattacks">#next-gen-cyberattacks</a>, <a href="https://hackernoon.com/tagged/digital-operational-resilience">#digital-operational-resilience</a>, <a href="https://hackernoon.com/tagged/third-party-risk">#third-party-risk</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I explain why relying on phishing training is obsolete. Agentic AI isn't just sending smarter emails: it’s an autonomous, self-correcting threat that weaponises human trust at machine speed. My GRC work shows how these agents systematically bypass third-party controls and achieve military-grade coordination across IT and OT, demanding an urgent and autonomous shift in our defence and governance models.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Thu, 09 Oct 2025 09:00:30 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/02857450/6098b41b.mp3" length="5068416" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cnZ-RfX0CqcDj8BcVyQQx6ydCvusZFufkZtUHUBxlSw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjNi/NTgyZjU5MTEzNGQ5/ZmViMTA4Y2U3ZGE0/YTBjNy5wbmc.jpg"/>
      <itunes:duration>634</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks">https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks</a>.
            <br> Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/agentic-ai">#agentic-ai</a>, <a href="https://hackernoon.com/tagged/phishing-attacks">#phishing-attacks</a>, <a href="https://hackernoon.com/tagged/social-engineering">#social-engineering</a>, <a href="https://hackernoon.com/tagged/next-gen-cyberattacks">#next-gen-cyberattacks</a>, <a href="https://hackernoon.com/tagged/digital-operational-resilience">#digital-operational-resilience</a>, <a href="https://hackernoon.com/tagged/third-party-risk">#third-party-risk</a>, <a href="https://hackernoon.com/tagged/information-security">#information-security</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/aadebayo">@aadebayo</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/aadebayo">@aadebayo's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                I explain why relying on phishing training is obsolete. Agentic AI isn't just sending smarter emails: it’s an autonomous, self-correcting threat that weaponises human trust at machine speed. My GRC work shows how these agents systematically bypass third-party controls and achieve military-grade coordination across IT and OT, demanding an urgent and autonomous shift in our defence and governance models.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,agentic-ai,phishing-attacks,social-engineering,next-gen-cyberattacks,digital-operational-resilience,third-party-risk,information-security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"</title>
      <itunes:title>INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f4020e0-ded2-444b-b2fa-d8fb51499eb4</guid>
      <link>https://share.transistor.fm/s/28af0cdf</link>
      <description>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity">https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity</a>.
            <br> The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE Security, a leading provider of cybersecurity training and certifications, today announced the results of a global study examining the convergence of networking and cybersecurity disciplines. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to handle networking-cybersecurity intersection, creating operational vulnerabilities and increased costs.
        </p>
        ]]>
      </description>
      <content:encoded>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity">https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity</a>.
            <br> The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE Security, a leading provider of cybersecurity training and certifications, today announced the results of a global study examining the convergence of networking and cybersecurity disciplines. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to handle networking-cybersecurity intersection, creating operational vulnerabilities and increased costs.
        </p>
        ]]>
      </content:encoded>
      <pubDate>Wed, 08 Oct 2025 09:00:45 -0700</pubDate>
      <author>HackerNoon</author>
      <enclosure url="https://media.transistor.fm/28af0cdf/49e66d7b.mp3" length="2888064" type="audio/mpeg"/>
      <itunes:author>HackerNoon</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yn87IfHrDsmhXuG9_GJfc6nayzGRNABuiQmZ3zoHse4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYTY2/NjRiZGZkY2IxYmI4/NmIxMDM2OGE2MmI4/YmQ3ZS5qcGVn.jpg"/>
      <itunes:duration>362</itunes:duration>
      <itunes:summary>
        <![CDATA[
        <p>This story was originally published on HackerNoon at: <a href="https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity">https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity</a>.
            <br> The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha <br>
            Check more stories related to cybersecurity at: <a href="https://hackernoon.com/c/cybersecurity">https://hackernoon.com/c/cybersecurity</a>.
            You can also check exclusive content about <a href="https://hackernoon.com/tagged/cybersecurity">#cybersecurity</a>, <a href="https://hackernoon.com/tagged/ine-security">#ine-security</a>, <a href="https://hackernoon.com/tagged/cybernewswire">#cybernewswire</a>, <a href="https://hackernoon.com/tagged/press-release">#press-release</a>, <a href="https://hackernoon.com/tagged/ine-security-announcement">#ine-security-announcement</a>, <a href="https://hackernoon.com/tagged/cyber-threats">#cyber-threats</a>, <a href="https://hackernoon.com/tagged/cyber-security-awareness">#cyber-security-awareness</a>, <a href="https://hackernoon.com/tagged/good-company">#good-company</a>,  and more.
            <br>
            <br>
            This story was written by: <a href="https://hackernoon.com/u/cybernewswire">@cybernewswire</a>. Learn more about this writer by checking <a href="https://hackernoon.com/about/cybernewswire">@cybernewswire's</a> about page,
            and for more stories, please visit <a href="https://hackernoon.com">hackernoon.com</a>.
            
                <br>
                <br>
                INE Security, a leading provider of cybersecurity training and certifications, today announced the results of a global study examining the convergence of networking and cybersecurity disciplines. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to handle networking-cybersecurity intersection, creating operational vulnerabilities and increased costs.
        </p>
        ]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity,ine-security,cybernewswire,press-release,ine-security-announcement,cyber-threats,cyber-security-awareness,good-company</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
