<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Case Studies RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/case-studies</link>
        <description><![CDATA[ Cyber Security Hub aims to produce case studies routinely, in which the site&#039;s editorial staff chats with leading security executives about recent initiatives (with ROI and measurable results). ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:55:19 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/case-studies" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Mid-year state of cyber security: APAC]]></title>
                <link>https://www.cshub.com/case-studies/reports/mid-year-state-of-cyber-security-apac?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub provides an in-depth look at trends, challenges and investment opportunities across APAC ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/case-studies/reports/mid-year-state-of-cyber-security-apac?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:41:52 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The benefits of automating enterprise cyber security]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/automating-enterprise-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Insights on perspectives on automation imperatives, inhibitors, talent and budget in the enterprises to prevent threats, vulnerabilities as well as cyber security ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/automating-enterprise-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Have your say: the global state of cyber security]]></title>
                <link>https://www.cshub.com/case-studies/articles/have-your-say-the-global-state-of-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ The global survey offers cyber security professionals the opportunity to share their thoughts and the chance to win $1,000 in Amazon vouchers ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/case-studies/articles/have-your-say-the-global-state-of-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The top XDR investment decisions for CISOs]]></title>
                <link>https://www.cshub.com/threat-defense/articles/the-top-xdr-investment-decisions-for-cisos?utm_medium=RSS</link>
                <description><![CDATA[ This Cyber Security Hub report shows how CISOs' uses managed services and XDR to detect threat and prevention of cyber attacks. ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/the-top-xdr-investment-decisions-for-cisos?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The global state of the cyber security industry 2022]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/cs-hub-2022-mid-year-report?utm_medium=RSS</link>
                <description><![CDATA[ This exclusive report aims to keep cyber security professionals abreast of today’s threats and highlight the areas in which CISOs are allocating security budgets to mitigate the risks facing their org... ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/cs-hub-2022-mid-year-report?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The top 20 cyber security movers and shakers 2022]]></title>
                <link>https://www.cshub.com/case-studies/articles/top-20-cyber-security-movers-and-shakers-2022?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub’s inaugural power list is live, profiling the achievements from cyber security leaders at Microsoft, Visa, Coca-Cola and Aston Martin ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/case-studies/articles/top-20-cyber-security-movers-and-shakers-2022?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Have your say: Cyber Security Hub readership survey]]></title>
                <link>https://www.cshub.com/case-studies/case-studies/have-your-say-cyber-security-hub-readership-survey?utm_medium=RSS</link>
                <description><![CDATA[ CS Hub is constantly looking to improve our content, take our survey to tell us how ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/case-studies/case-studies/have-your-say-cyber-security-hub-readership-survey?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[CS Hub launches 20 cybersecurity leaders to watch]]></title>
                <link>https://www.cshub.com/case-studies/articles/top-20-cyber-security-movers-and-shakers?utm_medium=RSS</link>
                <description><![CDATA[ CS Hub's inaugural power list to highlight cyber security professionals who ahev been making strides in cyber security over the past 12 months ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/case-studies/articles/top-20-cyber-security-movers-and-shakers?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[We want to hear your views on the state of cyber security today]]></title>
                <link>https://www.cshub.com/case-studies/articles/we-want-to-hear-your-views-on-the-state-of-cyber-security-today?utm_medium=RSS</link>
                <description><![CDATA[ Help educate your fellow cyber security professionals on the biggest challenges facing the cyber world today by taking part in our mid-year survey ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/case-studies/articles/we-want-to-hear-your-views-on-the-state-of-cyber-security-today?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[SaaS Security Survey Report 2022]]></title>
                <link>https://www.cshub.com/case-studies/whitepapers/saas-security-survey-report-2022?utm_medium=RSS</link>
                <description><![CDATA[ Find out what steps CISOs are taking to ensure the growing SaaS app attack surface is secured ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/case-studies/whitepapers/saas-security-survey-report-2022?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Top 10 cyber security blogs]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/the-top-ten-cyber-security-blogs?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub's recommended blogs to help keep you and your organization secure ]]></description>
                <author><![CDATA[ cg@freelancewords.co.uk (Chris Godfrey) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/the-top-ten-cyber-security-blogs?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Outpacing Compliance, Realizing Risk Management &amp; Achieving Forward Posture&amp;nbsp...]]></title>
                <link>https://www.cshub.com/case-studies/articles/outpacing-compliance-realizing-risk-management-achieving-forward-posture?utm_medium=RSS</link>
                <description><![CDATA[ The benefit of being in a highly regulated environment is that there is familiarity with how and when legislation tends to change and when and where subsequent regulatory changes occur. When outpacing... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/case-studies/articles/outpacing-compliance-realizing-risk-management-achieving-forward-posture?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:20:03 +0000</pubDate>
            </item>
            </channel>
</rss>