<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Network RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/network</link>
        <description><![CDATA[ While the &quot;perimeter&quot; has changed drastically in recent years, it&#039;s clear that threat actors are still in and around an organization&#039;s network. To breach accounts, these hackers must proceed through the network. Cyber Security Hub offers coverage in this space. ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:54:35 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/network" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Oil and gas refineries: Why Private Wireless beats Wi-Fi]]></title>
                <link>https://www.cshub.com/network/whitepapers/oil-gas-refineries-private-wireless-wi-fi?utm_medium=RSS</link>
                <description><![CDATA[ Learn how Private Wireless technology overcomes the limitations of Wi-Fi in metal-heavy environments ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/network/whitepapers/oil-gas-refineries-private-wireless-wi-fi?utm_medium=RSS</guid>
                <pubDate>Fri, 15 Nov 2024 13:47:47 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[PwC and EY impacted by MOVEit cyber attack]]></title>
                <link>https://www.cshub.com/attacks/news/pwc-and-ey-impacted-by-moveit-cyber-attack?utm_medium=RSS</link>
                <description><![CDATA[ The list of victims related to a cyber attack by ransomware gang Clop against document transfer service MOVEit continues to grow ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/attacks/news/pwc-and-ey-impacted-by-moveit-cyber-attack?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Gaining control of financial services cyber security regulations]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/gaining-control-of-financial-services-cyber-security-regulations?utm_medium=RSS</link>
                <description><![CDATA[ Discover the main regulations financial services organizations need to comply with and tips to go beyond simple compliance for powerful cyber security ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/gaining-control-of-financial-services-cyber-security-regulations?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to transform cloud security challenges into business opportunities]]></title>
                <link>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</link>
                <description><![CDATA[ To secure enterprise assets in the cloud, CISOs must address new challenges ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How does CISO strategy prevent threats?]]></title>
                <link>https://www.cshub.com/security-strategy/articles/how-does-ciso-strategy-prevent-threats?utm_medium=RSS</link>
                <description><![CDATA[ Explore about the challenges CISO was facing to protect the organization and how they overcome this with strategies to prevent threats. ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/how-does-ciso-strategy-prevent-threats?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Impact of cloud configuration security practices]]></title>
                <link>https://www.cshub.com/cloud/articles/impact-of-cloud-configuration-security-practices?utm_medium=RSS</link>
                <description><![CDATA[ Cloud configuration security practices are important to prevent cyber threats. ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/impact-of-cloud-configuration-security-practices?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The four pillars of cloud security]]></title>
                <link>https://www.cshub.com/cloud/articles/four-main-pillars-of-cloud-security?utm_medium=RSS</link>
                <description><![CDATA[ Discover more about the four main pillars of cloud security as well as cloud evolution, cloud migration and cloud security ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/four-main-pillars-of-cloud-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Medibank is latest Australian company to suffer cyber security incident]]></title>
                <link>https://www.cshub.com/attacks/news/medibank-is-latest-australian-company-to-suffer-cyber-security-incident?utm_medium=RSS</link>
                <description><![CDATA[ The insurance company was targeted by hackers claiming to have confidential customer information ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/attacks/news/medibank-is-latest-australian-company-to-suffer-cyber-security-incident?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Third-party risk management needs analytics, forecasting and layered defense]]></title>
                <link>https://www.cshub.com/network/interviews/third-party-risk-management-needs-analytics-forecasting-and-layered-defense?utm_medium=RSS</link>
                <description><![CDATA[ Sanne Group’s Ash Hunt describes the challenges external parties pose to business security and explains the tactics he is using to mitigate risks of this kind ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/network/interviews/third-party-risk-management-needs-analytics-forecasting-and-layered-defense?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Top 10 cyber security blogs]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/the-top-ten-cyber-security-blogs?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub's recommended blogs to help keep you and your organization secure ]]></description>
                <author><![CDATA[ cg@freelancewords.co.uk (Chris Godfrey) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/the-top-ten-cyber-security-blogs?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[A practical guide to effective container security]]></title>
                <link>https://www.cshub.com/network/whitepapers/a-practical-guide-to-effective-container-security?utm_medium=RSS</link>
                <description><![CDATA[ Find out how why the container model can result in a more distributed application architecture and greater ease of use ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/network/whitepapers/a-practical-guide-to-effective-container-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[100% Zero Trust: Protecting &amp; Enabling The New Workplace In 2021 And Beyond]]></title>
                <link>https://www.cshub.com/network/webinars/100-zero-trust-embracing-the-new-workplace-in-2021-and-beyond?utm_medium=RSS</link>
                <description><![CDATA[ Well before 2020, CEOs were facing unprecedented challenges as they led their companies into the digital era&mdash;an era that would shake up business models, change the workforce, and test an organis... ]]></description>
                <author><![CDATA[  () ]]></author>
                <guid>https://www.cshub.com/network/webinars/100-zero-trust-embracing-the-new-workplace-in-2021-and-beyond?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:59 +0000</pubDate>
            </item>
            </channel>
</rss>