<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Security Strategy RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/security-strategy</link>
        <description><![CDATA[ A part of the role of today&#039;s CISO is strategy and business communication. Cyber Security Hub boasts numerous articles in this space, from budgeting to best practices and benchmarking, to deep dives on mitigating risk. ]]></description>
        <language>en</language>
        <pubDate>Sun, 17 May 2026 02:31:35 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/security-strategy" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Introducing AI TrustOps: A readiness framework for secure AI development practic...]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/introducing-ai-trustops-a-readiness-framework-for-secure-ai-development-practices?utm_medium=RSS</link>
                <description><![CDATA[ Learn why the AI Readiness Framework is your roadmap for building and maturing secure AI development practices in the new AI risk landscape ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/introducing-ai-trustops-a-readiness-framework-for-secure-ai-development-practices?utm_medium=RSS</guid>
                <pubDate>Tue, 19 Aug 2025 07:10:14 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Building cyber security resilience through governance &amp; assurance]]></title>
                <link>https://www.cshub.com/security-strategy/articles/building-cyber-security-resilience-through-governance-assurance?utm_medium=RSS</link>
                <description><![CDATA[ The future of cyber security belongs to organizations that integrate security, compliance and risk management into a seamless, proactive governance model ]]></description>
                <author><![CDATA[ n.iliopoulos@obrela.com (Notis Iliopoulos) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/building-cyber-security-resilience-through-governance-assurance?utm_medium=RSS</guid>
                <pubDate>Thu, 12 Jun 2025 13:36:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Cloud security strategies that actually work for businesses]]></title>
                <link>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</link>
                <description><![CDATA[ Explore cloud security approaches that genuinely work in the real world ]]></description>
                <author><![CDATA[ office@alexvakulov.com (Alex Vakulov) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</guid>
                <pubDate>Wed, 21 May 2025 08:57:06 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Breaking the vicious cycle between climate change &amp; cybersecurity]]></title>
                <link>https://www.cshub.com/security-strategy/articles/breaking-the-vicious-cycle-between-climate-change-cybersecurity?utm_medium=RSS</link>
                <description><![CDATA[ Breaking the cycle between climate change and cybersecurity needs more than resilience – it requires systemic transformation ]]></description>
                <author><![CDATA[ kit.palmer@secalliance.com (Katharine Palmer) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/breaking-the-vicious-cycle-between-climate-change-cybersecurity?utm_medium=RSS</guid>
                <pubDate>Wed, 21 May 2025 13:27:49 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Viewing cyber security events in context]]></title>
                <link>https://www.cshub.com/security-strategy/articles/viewing-cyber-security-events-in-context?utm_medium=RSS</link>
                <description><![CDATA[ Red teaming exercises not only test an organization’s security framework but also train responders to think more like attackers ]]></description>
                <author><![CDATA[ gemma.moore@cyberis.com (Gemma Moore) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/viewing-cyber-security-events-in-context?utm_medium=RSS</guid>
                <pubDate>Wed, 16 Apr 2025 10:44:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[6 major cyber attacks &amp; data breaches in March 2025]]></title>
                <link>https://www.cshub.com/attacks/articles/cyber-attacks-data-breaches-march-2025?utm_medium=RSS</link>
                <description><![CDATA[ Cyber attacks and data breaches are wreaking havoc on organizations and users around the globe ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/attacks/articles/cyber-attacks-data-breaches-march-2025?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:45:44 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Are you PCI compliant yet?]]></title>
                <link>https://www.cshub.com/security-strategy/articles/are-you-pci-compliant-yet?utm_medium=RSS</link>
                <description><![CDATA[ Explore the compliance requirements of PCI DSS 4.0 ahead of the looming deadline ]]></description>
                <author><![CDATA[ shaque@pancomm.com (Lynn Marks) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/are-you-pci-compliant-yet?utm_medium=RSS</guid>
                <pubDate>Thu, 13 Mar 2025 14:00:28 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Digital certificates &amp; PKI: Cyber security lessons &amp; emerging challenges]]></title>
                <link>https://www.cshub.com/security-strategy/articles/digital-certificates-pki-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Expired digital certificates expose businesses to operational outages, confidence erosion and questions about their ability to track and manage security ]]></description>
                <author><![CDATA[ sgraham@marketbridge.com (Chris Hickman) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/digital-certificates-pki-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 11 Feb 2025 09:20:55 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The complete guide to third-party management]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/guide-third-party-management?utm_medium=RSS</link>
                <description><![CDATA[ Move from analyzing risk to bringing enterprise-wide third-party management to the entire business ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/guide-third-party-management?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:48:58 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to build contextualized, evergreen OT asset inventories]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/how-to-build-contextualized-evergreen-ot-asset-inventories?utm_medium=RSS</link>
                <description><![CDATA[ Why traditional OT asset inventory methods fall short and how to overcome traditional pitfalls ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/how-to-build-contextualized-evergreen-ot-asset-inventories?utm_medium=RSS</guid>
                <pubDate>Mon, 03 Feb 2025 15:42:18 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Deploying third-party management to navigate risk across industries]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/third-party-management-risk?utm_medium=RSS</link>
                <description><![CDATA[ Rising security risks make the effective management of third parties mission critical ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/third-party-management-risk?utm_medium=RSS</guid>
                <pubDate>Tue, 08 Oct 2024 07:27:34 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Ensuring quality in DORA compliance]]></title>
                <link>https://www.cshub.com/security-strategy/articles/ensuring-quality-dora-compliance?utm_medium=RSS</link>
                <description><![CDATA[ As regulatory frameworks begin to shape cyber security practices it is imperative that organizations integrate quality assurance measures to mitigate risk ]]></description>
                <author><![CDATA[ rodrigo.marcos@crest-approved.org (Rodrigo Marcos Alvarez) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/ensuring-quality-dora-compliance?utm_medium=RSS</guid>
                <pubDate>Wed, 31 Jul 2024 07:52:24 +0000</pubDate>
            </item>
            </channel>
</rss>