{"id":1272,"date":"2017-10-23T17:08:43","date_gmt":"2017-10-23T21:08:43","guid":{"rendered":"http:\/\/itcomposer.com\/itc\/?p=1272"},"modified":"2017-10-29T16:27:24","modified_gmt":"2017-10-29T20:27:24","slug":"information-security","status":"publish","type":"post","link":"http:\/\/itcomposer.com\/itc\/information-security\/","title":{"rendered":"Vines"},"content":{"rendered":"<div class=\"feedzy-rss feedzy-8e7efa3dca1fe83720a5ba3a8104a3bb\"><ul><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102239-former-uk-ambassador-linked-to-epstein-failed-security-vetting-yet-received-clearance\" target=\"_blank\" rel=\" noopener\" title=\"Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/17\/Man-silhouette-by-Ben-Sweet.webp?t=1776441049');\" title=\"Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/17\/Man-silhouette-by-Ben-Sweet.webp?t=1776441049\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102239-former-uk-ambassador-linked-to-epstein-failed-security-vetting-yet-received-clearance\" target=\"_blank\" rel=\" noopener\">Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 17, 2026 at 4:00 pm <\/small><p>Peter Mandelson, a former British ambassador to the United States, failed security vetting clearance before taking his position.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102238-ice-acting-director-todd-lyons-to-resign\" target=\"_blank\" rel=\" noopener\" title=\"ICE Acting Director Todd Lyons to Resign\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/17\/American-flag-by-Joshua-Hoehne.webp?t=1776430411');\" title=\"ICE Acting Director Todd Lyons to Resign\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/17\/American-flag-by-Joshua-Hoehne.webp?t=1776430411\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102238-ice-acting-director-todd-lyons-to-resign\" target=\"_blank\" rel=\" noopener\">ICE Acting Director Todd Lyons to Resign<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 17, 2026 at 1:00 pm <\/small><p>ICE acting director Todd Lyons is set to resign at the end of May.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102211-how-csos-can-win-board-support-for-gunshot-detection-technology\" target=\"_blank\" rel=\" noopener\" title=\"How CSOs Can Win Board Support for Gunshot Detection Technology\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1775571338');\" title=\"How CSOs Can Win Board Support for Gunshot Detection Technology\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1775571338\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102211-how-csos-can-win-board-support-for-gunshot-detection-technology\" target=\"_blank\" rel=\" noopener\">How CSOs Can Win Board Support for Gunshot Detection Technology<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 17, 2026 at 4:00 am <\/small><p>How CSOs can win board support for gunshot detection technology.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber\" target=\"_blank\" rel=\" noopener\" title=\"What Are Security Experts Saying About OpenAI\u2019s GPT-5.4-Cyber?\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Golden-lights-by-Joshua-Sortino.webp?t=1776273162');\" title=\"What Are Security Experts Saying About OpenAI\u2019s GPT-5.4-Cyber?\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Golden-lights-by-Joshua-Sortino.webp?t=1776273162\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber\" target=\"_blank\" rel=\" noopener\">What Are Security Experts Saying About OpenAI\u2019s GPT-5.4-Cyber?<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 16, 2026 at 3:00 pm <\/small><p>OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore\" target=\"_blank\" rel=\" noopener\" title=\"What \u201cThe Pitt\u201d Gets Right About Ransomware and What Hospitals Can\u2019t Afford to Ignore\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Ambulance-by-Albert-Stoynov.webp?t=1776279946');\" title=\"What \u201cThe Pitt\u201d Gets Right About Ransomware and What Hospitals Can\u2019t Afford to Ignore\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Ambulance-by-Albert-Stoynov.webp?t=1776279946\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore\" target=\"_blank\" rel=\" noopener\">What \u201cThe Pitt\u201d Gets Right About Ransomware and What Hospitals Can\u2019t Afford to Ignore<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 16, 2026 at 2:00 pm <\/small><p>The Pitt\u00a0may end its story with systems restored, but real hospitals don\u2019t get that clean ending.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes\" target=\"_blank\" rel=\" noopener\" title=\"Democratized Software, Democratized Risk: Who\u2019s Accountable When Everyone Codes?\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323');\" title=\"Democratized Software, Democratized Risk: Who\u2019s Accountable When Everyone Codes?\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Pink-and-orange-laptop-by-Joshua-Reddekopp.webp?t=1776268323\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102234-democratized-software-democratized-risk-whos-accountable-when-everyone-codes\" target=\"_blank\" rel=\" noopener\">Democratized Software, Democratized Risk: Who\u2019s Accountable When Everyone Codes?<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 16, 2026 at 7:00 am <\/small><p>How to modernize risk management when software creation becomes broadly distributed.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102233-mcgraw-hill-data-breach-caused-by-salesforce-misconfiguration\" target=\"_blank\" rel=\" noopener\" title=\"McGraw Hill Data Breach Caused by Salesforce Misconfiguration\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Student-desks-in-a-room-by-Allen-Y.webp?t=1776266704');\" title=\"McGraw Hill Data Breach Caused by Salesforce Misconfiguration\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/15\/Student-desks-in-a-room-by-Allen-Y.webp?t=1776266704\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102233-mcgraw-hill-data-breach-caused-by-salesforce-misconfiguration\" target=\"_blank\" rel=\" noopener\">McGraw Hill Data Breach Caused by Salesforce Misconfiguration<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 15, 2026 at 4:00 pm <\/small><p>McGraw Hill announced a data breach connected to a Salesforce misconfiguration.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102210-beyond-the-bodyguard-why-executive-protection-requires-a-new-playbook\" target=\"_blank\" rel=\" noopener\" title=\"Beyond the Bodyguard: Why Executive Protection Requires a New Playbook\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F2-Feat-Slide1-1170x658.webp?t=1775570307');\" title=\"Beyond the Bodyguard: Why Executive Protection Requires a New Playbook\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F2-Feat-Slide1-1170x658.webp?t=1775570307\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102210-beyond-the-bodyguard-why-executive-protection-requires-a-new-playbook\" target=\"_blank\" rel=\" noopener\">Beyond the Bodyguard: Why Executive Protection Requires a New Playbook<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 15, 2026 at 4:00 am <\/small><p>A new model is needed for a new era of executive protection.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102231-venice-hydraulic-pump-system-hacked-hackers-claim-power-to-create-floods\" target=\"_blank\" rel=\" noopener\" title=\"Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/14\/Venice-by-Kit-Suman.webp?t=1776276358');\" title=\"Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/14\/Venice-by-Kit-Suman.webp?t=1776276358\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102231-venice-hydraulic-pump-system-hacked-hackers-claim-power-to-create-floods\" target=\"_blank\" rel=\" noopener\">Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 14, 2026 at 4:30 pm <\/small><p>Venice\u2019s hydraulic pump system was hacked.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102230-pro-iranian-actor-claims-la-metro-cyberattack\" target=\"_blank\" rel=\" noopener\" title=\"Pro-Iranian Actor Claims L.A. Metro Cyberattack\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/14\/LA-Metro-by-Rio-Space.webp?t=1776276358');\" title=\"Pro-Iranian Actor Claims L.A. Metro Cyberattack\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/14\/LA-Metro-by-Rio-Space.webp?t=1776276358\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102230-pro-iranian-actor-claims-la-metro-cyberattack\" target=\"_blank\" rel=\" noopener\">Pro-Iranian Actor Claims L.A. Metro Cyberattack<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 14, 2026 at 3:30 pm <\/small><p>New intelligence suggests a pro-Iranian actor is responsible for the L.A. Metro cyberattack.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102229-3-quantum-realities-to-confront-this-world-quantum-day\" target=\"_blank\" rel=\" noopener\" title=\"3 Quantum Realities to Confront this World Quantum Day\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/13\/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451');\" title=\"3 Quantum Realities to Confront this World Quantum Day\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/13\/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102229-3-quantum-realities-to-confront-this-world-quantum-day\" target=\"_blank\" rel=\" noopener\">3 Quantum Realities to Confront this World Quantum Day<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 14, 2026 at 12:15 pm <\/small><p>3 quantum realities security leaders need to confront.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102228-bookingcom-customer-data-hacked-exposed\" target=\"_blank\" rel=\" noopener\" title=\"Booking.com Customer Data Hacked, Exposed\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/13\/Luggage-by-Erwan-Hesry.webp?t=1776083275');\" title=\"Booking.com Customer Data Hacked, Exposed\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/13\/Luggage-by-Erwan-Hesry.webp?t=1776083275\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102228-bookingcom-customer-data-hacked-exposed\" target=\"_blank\" rel=\" noopener\">Booking.com Customer Data Hacked, Exposed<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 13, 2026 at 12:00 pm <\/small><p>Booking.com is warning customers that their information may have been exposed.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102227-top-secret-clearance-holder-charged-with-leaking-classified-national-defense-information\" target=\"_blank\" rel=\" noopener\" title=\"Top Secret Clearance Holder Charged With Leaking Classified National Defense Information\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/10\/Gavel-by-Sasun-Bughdaryan.webp?t=1775836839');\" title=\"Top Secret Clearance Holder Charged With Leaking Classified National Defense Information\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/10\/Gavel-by-Sasun-Bughdaryan.webp?t=1775836839\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102227-top-secret-clearance-holder-charged-with-leaking-classified-national-defense-information\" target=\"_blank\" rel=\" noopener\">Top Secret Clearance Holder Charged With Leaking Classified National Defense Information<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 10, 2026 at 5:00 pm <\/small><p>Former Army employee indicted for allegedly sharing classified national defense information to unauthorized individuals.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102226-what-are-security-experts-saying-about-claude-mythos-and-project-glasswing\" target=\"_blank\" rel=\" noopener\" title=\"What Are Security Experts Saying About Claude Mythos and Project Glasswing?\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/10\/Abstract-shape-by-Kanhaiya-Sharma.webp?t=1775834774');\" title=\"What Are Security Experts Saying About Claude Mythos and Project Glasswing?\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/10\/Abstract-shape-by-Kanhaiya-Sharma.webp?t=1775834774\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102226-what-are-security-experts-saying-about-claude-mythos-and-project-glasswing\" target=\"_blank\" rel=\" noopener\">What Are Security Experts Saying About Claude Mythos and Project Glasswing?<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 10, 2026 at 4:00 pm <\/small><p>Security experts share their thoughts on Claude Mythos and Project Glasswing with Security magazine.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102206-schools-out-but-securitys-not-preparing-for-k-12-summertime-security\" target=\"_blank\" rel=\" noopener\" title=\"School\u2019s Out, But Security\u2019s Not: Preparing for K-12 Summertime Security\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F1-Feat-Slide1-1170x658.webp?t=1775485352');\" title=\"School\u2019s Out, But Security\u2019s Not: Preparing for K-12 Summertime Security\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/04-April\/SEC-0426-F1-Feat-Slide1-1170x658.webp?t=1775485352\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102206-schools-out-but-securitys-not-preparing-for-k-12-summertime-security\" target=\"_blank\" rel=\" noopener\">School\u2019s Out, But Security\u2019s Not: Preparing for K-12 Summertime Security<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 10, 2026 at 12:00 pm <\/small><p>To best prepare for the summer months, school security leaders must understand how the threats they face change once the school year ends.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102225-chinese-supercomputer-allegedly-hacked-10-petabytes-of-data-stolen\" target=\"_blank\" rel=\" noopener\" title=\"Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/09\/Cables-plugged-in-by-Scott-Rodgerson.webp?t=1775761808');\" title=\"Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/09\/Cables-plugged-in-by-Scott-Rodgerson.webp?t=1775761808\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102225-chinese-supercomputer-allegedly-hacked-10-petabytes-of-data-stolen\" target=\"_blank\" rel=\" noopener\">Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 9, 2026 at 7:00 pm <\/small><p>Data has allegedly been stolen from a state-run Chinese supercomputer.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102224-baltimore-security-guards-on-strike\" target=\"_blank\" rel=\" noopener\" title=\"Baltimore Security Guards On Strike\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/09\/Security-guard-by-Job-Moses.webp?t=1775745846');\" title=\"Baltimore Security Guards On Strike\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/09\/Security-guard-by-Job-Moses.webp?t=1775745846\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102224-baltimore-security-guards-on-strike\" target=\"_blank\" rel=\" noopener\">Baltimore Security Guards On Strike<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 9, 2026 at 3:00 pm <\/small><p>Baltimore security guards are participating in a strike.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102221-iranian-linked-cyber-actors-target-us-critical-infrastructure-security-leaders-respond\" target=\"_blank\" rel=\" noopener\" title=\"Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/08\/Power-lines-by-Yuan-Yang.webp?t=1775663200');\" title=\"Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/08\/Power-lines-by-Yuan-Yang.webp?t=1775663200\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102221-iranian-linked-cyber-actors-target-us-critical-infrastructure-security-leaders-respond\" target=\"_blank\" rel=\" noopener\">Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 8, 2026 at 4:00 pm <\/small><p>CISA warns that Iranian-connected cyber actors are focusing U.S. critical infrastructure.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102212-ransomware-response-how-businesses-regain-control-under-pressure\" target=\"_blank\" rel=\" noopener\" title=\"Ransomware Response: How Businesses Regain Control Under Pressure\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/07\/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1776276357');\" title=\"Ransomware Response: How Businesses Regain Control Under Pressure\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/07\/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1776276357\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102212-ransomware-response-how-businesses-regain-control-under-pressure\" target=\"_blank\" rel=\" noopener\">Ransomware Response: How Businesses Regain Control Under Pressure<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 8, 2026 at 9:00 am <\/small><p>You can\u2019t control when ransomware attacks happen, but you can control how you respond.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102215-lapd-records-hacked-and-exposed\" target=\"_blank\" rel=\" noopener\" title=\"LAPD Records Hacked and Exposed\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/08\/Police-in-road-by-AJ-Colores.webp?t=1775656677');\" title=\"LAPD Records Hacked and Exposed\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/08\/Police-in-road-by-AJ-Colores.webp?t=1775656677\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102215-lapd-records-hacked-and-exposed\" target=\"_blank\" rel=\" noopener\">LAPD Records Hacked and Exposed<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 8, 2026 at 9:00 am <\/small><p>A data breach\u00a0has lead to the exposure of sensitive LAPD records.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102208-healthcare-executives-face-a-new-era-of-personal-risk\" target=\"_blank\" rel=\" noopener\" title=\"Healthcare Executives Face a New Era of Personal Risk\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/06\/Man-on-laptop-by-Vitaly-Gariev.webp?t=1775680873');\" title=\"Healthcare Executives Face a New Era of Personal Risk\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/06\/Man-on-laptop-by-Vitaly-Gariev.webp?t=1775680873\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102208-healthcare-executives-face-a-new-era-of-personal-risk\" target=\"_blank\" rel=\" noopener\">Healthcare Executives Face a New Era of Personal Risk<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on April 7, 2026 at 8:00 am <\/small><p>Protecting executives\u2019 digital and physical environments is no longer optional.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102213-new-trump-administration-budget-cuts-707m-from-cisa-funding\" target=\"_blank\" rel=\" noopener\" title=\"New Trump Administration Budget Cuts $707M from CISA Funding\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/07\/United-States-capitol-by-Louis-Velazquez.webp?t=1775573360');\" title=\"New Trump Administration Budget Cuts $707M from CISA Funding\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/04\/07\/United-States-capitol-by-Louis-Velazquez.webp?t=1775573360\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102213-new-trump-administration-budget-cuts-707m-from-cisa-funding\" target=\"_blank\" rel=\" noopener\">New Trump Administration Budget Cuts $707M from CISA Funding<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on April 7, 2026 at 4:00 am <\/small><p>The White House plans to cut $707M from CISA funding.\u00a0<\/p><\/div><\/li><\/ul> <\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":[],"categories":[29,30,27,28],"tags":[],"_links":{"self":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272"}],"collection":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/comments?post=1272"}],"version-history":[{"count":7,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272\/revisions"}],"predecessor-version":[{"id":1304,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272\/revisions\/1304"}],"wp:attachment":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/media?parent=1272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/categories?post=1272"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/tags?post=1272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}