<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Threat Defense RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/threat-defense</link>
        <description><![CDATA[ Heading attackers off at the pass begins with quality threat defense. That could be a layered solution approach, or leading threat intelligence spread across the security environment. Cyber Security Hub provides commentary on this area. ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:56:16 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/threat-defense" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Building cyber security resilience through governance &amp; assurance]]></title>
                <link>https://www.cshub.com/security-strategy/articles/building-cyber-security-resilience-through-governance-assurance?utm_medium=RSS</link>
                <description><![CDATA[ The future of cyber security belongs to organizations that integrate security, compliance and risk management into a seamless, proactive governance model ]]></description>
                <author><![CDATA[ n.iliopoulos@obrela.com (Notis Iliopoulos) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/building-cyber-security-resilience-through-governance-assurance?utm_medium=RSS</guid>
                <pubDate>Thu, 12 Jun 2025 13:36:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Cloud security strategies that actually work for businesses]]></title>
                <link>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</link>
                <description><![CDATA[ Explore cloud security approaches that genuinely work in the real world ]]></description>
                <author><![CDATA[ office@alexvakulov.com (Alex Vakulov) ]]></author>
                <guid>https://www.cshub.com/cloud/articles/cloud-security-strategies-that-actually-work-for-businesses?utm_medium=RSS</guid>
                <pubDate>Wed, 21 May 2025 08:57:06 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Viewing cyber security events in context]]></title>
                <link>https://www.cshub.com/security-strategy/articles/viewing-cyber-security-events-in-context?utm_medium=RSS</link>
                <description><![CDATA[ Red teaming exercises not only test an organization’s security framework but also train responders to think more like attackers ]]></description>
                <author><![CDATA[ gemma.moore@cyberis.com (Gemma Moore) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/viewing-cyber-security-events-in-context?utm_medium=RSS</guid>
                <pubDate>Wed, 16 Apr 2025 10:44:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[6 major cyber attacks &amp; data breaches in March 2025]]></title>
                <link>https://www.cshub.com/attacks/articles/cyber-attacks-data-breaches-march-2025?utm_medium=RSS</link>
                <description><![CDATA[ Cyber attacks and data breaches are wreaking havoc on organizations and users around the globe ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/attacks/articles/cyber-attacks-data-breaches-march-2025?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:45:44 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How cyber security experts are fighting AI-generated threats]]></title>
                <link>https://www.cshub.com/threat-defense/articles/cyber-security-experts-fight-ai-generated-threats?utm_medium=RSS</link>
                <description><![CDATA[ As AI-powered cyber threats grow more sophisticated, cyber security teams must  implement proactive security measures to counter emerging risks ]]></description>
                <author><![CDATA[ office@alexvakulov.com (Alex Vakulov) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/cyber-security-experts-fight-ai-generated-threats?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:47:49 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Ransomware defense: Moving beyond payment bans to true cyber security]]></title>
                <link>https://www.cshub.com/threat-defense/articles/ransomware-defense-payment-bans-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ To combat ransomware, organizations must take proactive steps that make stolen data worthless to attackers ]]></description>
                <author><![CDATA[ krista@coeurconsulting.co.uk (Simon Pamplin) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/ransomware-defense-payment-bans-cyber-security?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:48:44 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Cyber security implications of DeepSeek’s open-source AI model]]></title>
                <link>https://www.cshub.com/threat-defense/articles/cyber-security-implications-deepseek-ai?utm_medium=RSS</link>
                <description><![CDATA[ DeepSeek security vulnerabilities could be turned into a dangerous tool that cyber criminals can exploit ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/cyber-security-implications-deepseek-ai?utm_medium=RSS</guid>
                <pubDate>Mon, 03 Feb 2025 13:47:46 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[4 benefits of security testing in agile environments]]></title>
                <link>https://www.cshub.com/security-strategy/articles/security-testing-agile-environments?utm_medium=RSS</link>
                <description><![CDATA[ Security teams require efficient, cost-effective solutions to mitigate the risk of a successful cyber attack ]]></description>
                <author><![CDATA[ tst@outpost24.com (Thomas Stacey) ]]></author>
                <guid>https://www.cshub.com/security-strategy/articles/security-testing-agile-environments?utm_medium=RSS</guid>
                <pubDate>Tue, 09 Jul 2024 07:30:51 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Enhancing your security operations center through AI integration]]></title>
                <link>https://www.cshub.com/threat-defense/whitepapers/security-operations-center-ai-integration?utm_medium=RSS</link>
                <description><![CDATA[ Explore the integration of AI in enhancing security operations, the pivotal role of AI in modernizing your SOC and the pragmatic solutions to the challenges of AI adoption in cyber security operations ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/threat-defense/whitepapers/security-operations-center-ai-integration?utm_medium=RSS</guid>
                <pubDate>Thu, 04 Apr 2024 13:08:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Enhancing cyber security in financial services: Simulated cyber attacks]]></title>
                <link>https://www.cshub.com/threat-defense/articles/enhancing-cyber-security-in-financial-services-simulated-cyber-attacks?utm_medium=RSS</link>
                <description><![CDATA[ CREST’s Nick Benson examines whether financial regulators are doing enough to set mandatory minimum standards for complex, unpredictable and critical intelligence-led cyber attacks ]]></description>
                <author><![CDATA[ alliea@prpr.co.uk (Nick Benson) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/enhancing-cyber-security-in-financial-services-simulated-cyber-attacks?utm_medium=RSS</guid>
                <pubDate>Wed, 27 Mar 2024 11:25:09 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Modern SOC: How to leverage AI-based SecOps &amp; quantify the value of cyber securi...]]></title>
                <link>https://www.cshub.com/threat-defense/whitepapers/modern-soc-how-to-leverage-ai-based-secops-quantify-the-value-of-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Delving into the inefficiencies and scaling issues associated with security operations centers, this paper focuses on the transformative impact of artificial intelligence on cyber security ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/threat-defense/whitepapers/modern-soc-how-to-leverage-ai-based-secops-quantify-the-value-of-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 27 Feb 2024 15:30:19 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Synthetic identity theft and how to stay secure]]></title>
                <link>https://www.cshub.com/threat-defense/articles/synthetic-identity-theft-and-how-to-stay-secure?utm_medium=RSS</link>
                <description><![CDATA[ The fight against identity theft is not just a challenge for businesses or individuals – it is a collective battle ]]></description>
                <author><![CDATA[ office@alexvakulov.com (Alex Vakulov) ]]></author>
                <guid>https://www.cshub.com/threat-defense/articles/synthetic-identity-theft-and-how-to-stay-secure?utm_medium=RSS</guid>
                <pubDate>Tue, 30 Jan 2024 09:04:44 +0000</pubDate>
            </item>
            </channel>
</rss>