<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Cloud RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/cloud</link>
        <description><![CDATA[ As more and more enterprises migrate to the cloud (whether that&#039;s private, public, hybrid, etc.), Cyber Security Hub aims to closely cover the space. ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:54:23 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/cloud" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Cloud security strategies that actually work for businesses]]></title>
                <link>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</link>
                <description><![CDATA[ Explore cloud security approaches that genuinely work in the real world ]]></description>
                <author><![CDATA[ office@alexvakulov.com (Alex Vakulov) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</guid>
                <pubDate>Wed, 21 May 2025 08:57:06 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Why companies are investing in cloud security]]></title>
                <link>https://www.cshub.com/cloud/articles/investment-in-cloud-security?utm_medium=RSS</link>
                <description><![CDATA[ The best way to adopt and roll out cloud security across your organization ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/investment-in-cloud-security?utm_medium=RSS</guid>
                <pubDate>Fri, 03 Nov 2023 19:06:57 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The future of cloud security]]></title>
                <link>https://www.cshub.com/cloud/reports/the-future-of-cloud-security?utm_medium=RSS</link>
                <description><![CDATA[ Based on a survey of more than 700 cyber security professionals, Cyber Security Hub provides an in-depth look at trends, challenges and investment opportunities in cloud security ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/reports/the-future-of-cloud-security?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:42:23 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to overcome data security and sovereignty challenges]]></title>
                <link>https://www.cshub.com/cloud/interviews/how-to-overcome-data-security-and-sovereignty-challenges?utm_medium=RSS</link>
                <description><![CDATA[ Key insights on cloud migration, data security and sovereignty and incident response from fellow of cyber security and governance at Singapore University of Social Sciences, Anthony Lim ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/cloud/interviews/how-to-overcome-data-security-and-sovereignty-challenges?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to create an AI strategy for the cloud]]></title>
                <link>https://www.cshub.com/iot/interviews/how-to-create-an-ai-strategy-for-the-cloud?utm_medium=RSS</link>
                <description><![CDATA[ Cloud security architect and cyber security consultant Mayank Sharma shares key insights on cloud migration and how to manage an Internet of Things cyber security strategy ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/iot/interviews/how-to-create-an-ai-strategy-for-the-cloud?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Public cloud protection]]></title>
                <link>https://www.cshub.com/cloud/videos/public-cloud-protection?utm_medium=RSS</link>
                <description><![CDATA[ Discover cloud security best practices for legacy systems, driving a cyber secure company culture and security management ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/videos/public-cloud-protection?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How confident are you that your data is safe?]]></title>
                <link>https://www.cshub.com/cloud/videos/how-confident-are-you-that-your-data-is-safe?utm_medium=RSS</link>
                <description><![CDATA[ Key insights on cloud migration, data security and sovereignty and incident response ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/videos/how-confident-are-you-that-your-data-is-safe?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Balancing security and innovation with cloud adoption]]></title>
                <link>https://www.cshub.com/cloud/videos/balancing-security-and-innovation-with-cloud-adoption?utm_medium=RSS</link>
                <description><![CDATA[ How to assess approaches to security and compliance controls to support continuity and reliability ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/videos/balancing-security-and-innovation-with-cloud-adoption?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to adopt cloud and govern it]]></title>
                <link>https://www.cshub.com/cloud/videos/how-to-adopt-cloud-and-govern-it?utm_medium=RSS</link>
                <description><![CDATA[ How to create and manage an Internet of Things (IoT) strategy and how to remain compliant with cyber security regulations ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/videos/how-to-adopt-cloud-and-govern-it?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to transform cloud security challenges into business opportunities]]></title>
                <link>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</link>
                <description><![CDATA[ To secure enterprise assets in the cloud, CISOs must address new challenges ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How does CISO strategy prevent threats?]]></title>
                <link>https://www.cshub.com/security-strategy/articles/how-does-ciso-strategy-prevent-threats?utm_medium=RSS</link>
                <description><![CDATA[ Explore about the challenges CISO was facing to protect the organization and how they overcome this with strategies to prevent threats. ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/how-does-ciso-strategy-prevent-threats?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How carding can affect your business]]></title>
                <link>https://www.cshub.com/attacks/articles/how-carding-can-affect-your-business?utm_medium=RSS</link>
                <description><![CDATA[ An exploration of the carding threat vector and why ecommerce sites are vulnerable to it ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/attacks/articles/how-carding-can-affect-your-business?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
            </channel>
</rss>