<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Whitepapers RSS Feed]]></title>
        <link>https://www.cshub.com/rss/whitepapers</link>
        <description><![CDATA[ Cyber Security Hub ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:54:54 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/whitepapers" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Introducing AI TrustOps: A readiness framework for secure AI development practic...]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/introducing-ai-trustops-a-readiness-framework-for-secure-ai-development-practices?utm_medium=RSS</link>
                <description><![CDATA[ Learn why the AI Readiness Framework is your roadmap for building and maturing secure AI development practices in the new AI risk landscape ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/introducing-ai-trustops-a-readiness-framework-for-secure-ai-development-practices?utm_medium=RSS</guid>
                <pubDate>Tue, 19 Aug 2025 07:10:14 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The complete guide to third-party management]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/guide-third-party-management?utm_medium=RSS</link>
                <description><![CDATA[ Move from analyzing risk to bringing enterprise-wide third-party management to the entire business ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/guide-third-party-management?utm_medium=RSS</guid>
                <pubDate>Fri, 28 Mar 2025 15:48:58 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to build contextualized, evergreen OT asset inventories]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/how-to-build-contextualized-evergreen-ot-asset-inventories?utm_medium=RSS</link>
                <description><![CDATA[ Why traditional OT asset inventory methods fall short and how to overcome traditional pitfalls ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/how-to-build-contextualized-evergreen-ot-asset-inventories?utm_medium=RSS</guid>
                <pubDate>Mon, 03 Feb 2025 15:42:18 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Oil and gas refineries: Why Private Wireless beats Wi-Fi]]></title>
                <link>https://www.cshub.com/network/whitepapers/oil-gas-refineries-private-wireless-wi-fi?utm_medium=RSS</link>
                <description><![CDATA[ Learn how Private Wireless technology overcomes the limitations of Wi-Fi in metal-heavy environments ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/network/whitepapers/oil-gas-refineries-private-wireless-wi-fi?utm_medium=RSS</guid>
                <pubDate>Fri, 15 Nov 2024 13:47:47 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Deploying third-party management to navigate risk across industries]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/third-party-management-risk?utm_medium=RSS</link>
                <description><![CDATA[ Rising security risks make the effective management of third parties mission critical ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/third-party-management-risk?utm_medium=RSS</guid>
                <pubDate>Tue, 08 Oct 2024 07:27:34 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Enhancing your security operations center through AI integration]]></title>
                <link>https://www.cshub.com/threat-defense/whitepapers/security-operations-center-ai-integration?utm_medium=RSS</link>
                <description><![CDATA[ Explore the integration of AI in enhancing security operations, the pivotal role of AI in modernizing your SOC and the pragmatic solutions to the challenges of AI adoption in cyber security operations ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/threat-defense/whitepapers/security-operations-center-ai-integration?utm_medium=RSS</guid>
                <pubDate>Thu, 04 Apr 2024 13:08:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Modern SOC: How to leverage AI-based SecOps &amp; quantify the value of cyber securi...]]></title>
                <link>https://www.cshub.com/threat-defense/whitepapers/modern-soc-how-to-leverage-ai-based-secops-quantify-the-value-of-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Delving into the inefficiencies and scaling issues associated with security operations centers, this paper focuses on the transformative impact of artificial intelligence on cyber security ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/threat-defense/whitepapers/modern-soc-how-to-leverage-ai-based-secops-quantify-the-value-of-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 27 Feb 2024 15:30:19 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Cyber security guide to third-party risk management]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/cyber-security-guide-to-third-party-risk-management?utm_medium=RSS</link>
                <description><![CDATA[ Learn how to build a TPRM program that effectively manages third-party risks ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/cyber-security-guide-to-third-party-risk-management?utm_medium=RSS</guid>
                <pubDate>Mon, 05 Feb 2024 04:17:29 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The what, why and how of Zero Trust network architecture]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/the-what-why-and-how-of-zero-trust-network-architecture?utm_medium=RSS</link>
                <description><![CDATA[ Learn how the Zero Trust security model works, the challenges it solves, its logical components, and the various ways in which it can be deployed ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/the-what-why-and-how-of-zero-trust-network-architecture?utm_medium=RSS</guid>
                <pubDate>Wed, 29 Nov 2023 02:18:14 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to think like a hacker and secure your data]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/how-to-think-like-a-hacker-and-secure-your-data?utm_medium=RSS</link>
                <description><![CDATA[ A guide to using hacking techniques to reinforce your data protection strategy  ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/how-to-think-like-a-hacker-and-secure-your-data?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Oct 2023 13:44:25 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Changing times in DevSecOps playbook]]></title>
                <link>https://www.cshub.com/security-strategy/whitepapers/why-modern-security-teams-need-a-transformation-and-how-they-can-do-it?utm_medium=RSS</link>
                <description><![CDATA[ Why modern security teams need a transformation and how they can do it ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/whitepapers/why-modern-security-teams-need-a-transformation-and-how-they-can-do-it?utm_medium=RSS</guid>
                <pubDate>Mon, 04 Mar 2024 14:38:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Reducing fraud and friction in consumer experiences]]></title>
                <link>https://www.cshub.com/threat-defense/whitepapers/reducing-fraud-and-friction-in-consumer-experiences?utm_medium=RSS</link>
                <description><![CDATA[ How to protect customers without impacting the customer onboarding experience ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/threat-defense/whitepapers/reducing-fraud-and-friction-in-consumer-experiences?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
            </channel>
</rss>