<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Reports RSS Feed]]></title>
        <link>https://www.cshub.com/rss/reports</link>
        <description><![CDATA[ Cyber Security Hub ]]></description>
        <language>en</language>
        <pubDate>Tue, 05 May 2026 13:02:31 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/reports" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Threat report 2024: Cyber security in the era of AI]]></title>
                <link>https://www.cshub.com/security-strategy/reports/threat-report-2024-cyber-security-in-the-era-of-ai?utm_medium=RSS</link>
                <description><![CDATA[ Unveiling the state of affairs directly from the front lines of cyber security ]]></description>
                <author><![CDATA[ mayank.t@eccouncil.org (EC-Council Team) ]]></author>
                <guid>https://www.cshub.com/security-strategy/reports/threat-report-2024-cyber-security-in-the-era-of-ai?utm_medium=RSS</guid>
                <pubDate>Wed, 21 Feb 2024 08:29:40 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How MDR with proactive threat hunting improves cyber resilience]]></title>
                <link>https://www.cshub.com/threat-defense/reports/mdr-proactive-threat-hunting?utm_medium=RSS</link>
                <description><![CDATA[ The best practices for introducing proactive threat hunting with 24/7 multi-signal MDR and correlating threats through log analytics ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/threat-defense/reports/mdr-proactive-threat-hunting?utm_medium=RSS</guid>
                <pubDate>Tue, 12 Mar 2024 08:29:07 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Mid-year state of cyber security: APAC]]></title>
                <link>https://www.cshub.com/case-studies/reports/mid-year-state-of-cyber-security-apac?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub provides an in-depth look at trends, challenges and investment opportunities across APAC ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/case-studies/reports/mid-year-state-of-cyber-security-apac?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:41:52 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Mid-year state of cyber security report: EMEA and NAM]]></title>
                <link>https://www.cshub.com/security-strategy/reports/mid-year-state-of-cyber-security-report-emea-and-nam?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub offers an in-depth look at the latest trends, challenges and investment opportunities throughout EMEA and NAM ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/security-strategy/reports/mid-year-state-of-cyber-security-report-emea-and-nam?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:42:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The future of cloud security]]></title>
                <link>https://www.cshub.com/cloud/reports/the-future-of-cloud-security?utm_medium=RSS</link>
                <description><![CDATA[ Based on a survey of more than 700 cyber security professionals, Cyber Security Hub provides an in-depth look at trends, challenges and investment opportunities in cloud security ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/reports/the-future-of-cloud-security?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:42:23 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to foster secure and efficient data practices]]></title>
                <link>https://www.cshub.com/data/reports/how-to-foster-secure-and-efficient-data-practices?utm_medium=RSS</link>
                <description><![CDATA[ Discover how to foster secure, safe data transfer practices at your business ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/data/reports/how-to-foster-secure-and-efficient-data-practices?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:43:10 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Why good email security is essential for every business]]></title>
                <link>https://www.cshub.com/security-strategy/reports/why-good-email-security-is-essential-for-every-business?utm_medium=RSS</link>
                <description><![CDATA[ Based on insights from cyber security experts, this report explores how an insufficient email security strategy can affect a business’s internal security and external brand ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/security-strategy/reports/why-good-email-security-is-essential-for-every-business?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:43:54 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to strengthen email security and protection against advanced ransomware atta...]]></title>
                <link>https://www.cshub.com/security-strategy/reports/how-to-strengthen-email-security-and-protection-against-advanced-ransomware-attacks?utm_medium=RSS</link>
                <description><![CDATA[ Organizations need to act today to overcome changing email security threats as ransomware tactics continue to evolve ]]></description>
                <author><![CDATA[ ben.watts@iqpc.com (Ben Watts) ]]></author>
                <guid>https://www.cshub.com/security-strategy/reports/how-to-strengthen-email-security-and-protection-against-advanced-ransomware-attacks?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:44:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[CS Hub Mid-Year Market Report 2022]]></title>
                <link>https://www.cshub.com/executive-decisions/reports/cs-hub-mid-year-market-report-2022?utm_medium=RSS</link>
                <description><![CDATA[ Find out the temperature of the industry and the latest cyber security trends according to CISOs in CS Hub’s mid-year report ]]></description>
                <author><![CDATA[  (Cyber Security Hub Editor) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/reports/cs-hub-mid-year-market-report-2022?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:42:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[CISO considerations for managed XDR investment]]></title>
                <link>https://www.cshub.com/threat-defense/reports/ciso-considerations-for-managed-xdr-investment?utm_medium=RSS</link>
                <description><![CDATA[ Read about why security owners are turning to XDR and CISO’s top considerations before investing in managed XDR ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/threat-defense/reports/ciso-considerations-for-managed-xdr-investment?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:49 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[CISO strategies for proactive threat prevention]]></title>
                <link>https://www.cshub.com/security-strategy/reports/ciso-strategies-for-proactive-threat-prevention?utm_medium=RSS</link>
                <description><![CDATA[ This report will explore how to implement a prevent-first cyber security strategy as reactive strategies fall short in the face of today’s threats ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/security-strategy/reports/ciso-strategies-for-proactive-threat-prevention?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:49 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The state of cloud configuration security practices]]></title>
                <link>https://www.cshub.com/cloud/reports/the-state-of-cloud-configuration-security-practices?utm_medium=RSS</link>
                <description><![CDATA[ This report reveals the results of Cyber Security Hub’s Cloud Configuration Security Practices survey offering expert insight and analysis into the state of cloud security today ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/cloud/reports/the-state-of-cloud-configuration-security-practices?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:49 +0000</pubDate>
            </item>
            </channel>
</rss>