{"id":1272,"date":"2017-10-23T17:08:43","date_gmt":"2017-10-23T21:08:43","guid":{"rendered":"http:\/\/itcomposer.com\/itc\/?p=1272"},"modified":"2017-10-29T16:27:24","modified_gmt":"2017-10-29T20:27:24","slug":"information-security","status":"publish","type":"post","link":"http:\/\/itcomposer.com\/itc\/information-security\/","title":{"rendered":"Vines"},"content":{"rendered":"<div class=\"feedzy-rss feedzy-8e7efa3dca1fe83720a5ba3a8104a3bb\"><ul><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102306-did-iran-hack-tank-readers-at-us-gas-stations-security-leaders-discuss\" target=\"_blank\" rel=\" noopener\" title=\"Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/15\/Gas-station-by-Hans-Eiskonen.webp?t=1778875430');\" title=\"Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/15\/Gas-station-by-Hans-Eiskonen.webp?t=1778875430\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102306-did-iran-hack-tank-readers-at-us-gas-stations-security-leaders-discuss\" target=\"_blank\" rel=\" noopener\">Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 15, 2026 at 8:00 pm <\/small><p>Security leaders share their thoughts on the attack, Iran\u2019s potential involvement and the broader implications.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102302-why-most-workplace-violence-prevention-starts-too-late\" target=\"_blank\" rel=\" noopener\" title=\"Why Most Workplace Violence Prevention Starts Too Late\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Man-with-covered-face-by-Jeremy-Weber.webp?t=1778775586');\" title=\"Why Most Workplace Violence Prevention Starts Too Late\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Man-with-covered-face-by-Jeremy-Weber.webp?t=1778775586\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102302-why-most-workplace-violence-prevention-starts-too-late\" target=\"_blank\" rel=\" noopener\">Why Most Workplace Violence Prevention Starts Too Late<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 15, 2026 at 4:00 pm <\/small><p>If your people are running, hiding, or fighting, the prevention window has already closed.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102268-ai-makes-phishing-scams-harder-to-identify-in-the-workplace\" target=\"_blank\" rel=\" noopener\" title=\"AI Makes Phishing Scams Harder to Identify in the Workplace\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News1-Feat-Slide1-1170x658.webp?t=1777321628');\" title=\"AI Makes Phishing Scams Harder to Identify in the Workplace\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News1-Feat-Slide1-1170x658.webp?t=1777321628\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102268-ai-makes-phishing-scams-harder-to-identify-in-the-workplace\" target=\"_blank\" rel=\" noopener\">AI Makes Phishing Scams Harder to Identify in the Workplace<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 15, 2026 at 12:00 pm <\/small><p>Phishing grows harder to identify in the age of AI.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102269-funding-has-limited-security-readiness\" target=\"_blank\" rel=\" noopener\" title=\"Funding Has Limited Security Readiness\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953');\" title=\"Funding Has Limited Security Readiness\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102269-funding-has-limited-security-readiness\" target=\"_blank\" rel=\" noopener\">Funding Has Limited Security Readiness<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 15, 2026 at 12:00 pm <\/small><p>Limited security funding opens organizations to threat actors.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102270-2025-saw-a-surge-in-wireless-vulnerabilities\" target=\"_blank\" rel=\" noopener\" title=\"2025 Saw a Surge in Wireless Vulnerabilities\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News3-Feat-Slide1-1170x658.webp?t=1777322198');\" title=\"2025 Saw a Surge in Wireless Vulnerabilities\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-News3-Feat-Slide1-1170x658.webp?t=1777322198\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102270-2025-saw-a-surge-in-wireless-vulnerabilities\" target=\"_blank\" rel=\" noopener\">2025 Saw a Surge in Wireless Vulnerabilities<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 15, 2026 at 12:00 pm <\/small><p>Wireless vulnerabilities rose in 2025.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102301-foxconn-confirms-cyberattack-security-experts-discuss\" target=\"_blank\" rel=\" noopener\" title=\"Foxconn Confirms Cyberattack, Security Experts Discuss\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Laptop-and-monitor-by-Glen-Carrie.webp?t=1778773854');\" title=\"Foxconn Confirms Cyberattack, Security Experts Discuss\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Laptop-and-monitor-by-Glen-Carrie.webp?t=1778773854\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102301-foxconn-confirms-cyberattack-security-experts-discuss\" target=\"_blank\" rel=\" noopener\">Foxconn Confirms Cyberattack, Security Experts Discuss<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 14, 2026 at 4:00 pm <\/small><p>Foxconn confirmed a cyberattack has disrupted some of its North American facilities<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102300-expert-insights-on-the-west-pharmaceutical-ransomware-attack\" target=\"_blank\" rel=\" noopener\" title=\"Expert Insights on the West Pharmaceutical Ransomware Attack\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Pills-spilled-by-Towfiqu-barbhuiya.webp?t=1778769586');\" title=\"Expert Insights on the West Pharmaceutical Ransomware Attack\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/14\/Pills-spilled-by-Towfiqu-barbhuiya.webp?t=1778769586\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102300-expert-insights-on-the-west-pharmaceutical-ransomware-attack\" target=\"_blank\" rel=\" noopener\">Expert Insights on the West Pharmaceutical Ransomware Attack<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 14, 2026 at 3:00 pm <\/small><p>West Pharmaceutical Services experienced a ransomware incident.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now\" target=\"_blank\" rel=\" noopener\" title=\"The Bench You'll Need in Three Years Depends on Decisions You Make Now\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709');\" title=\"The Bench You&#039;ll Need in Three Years Depends on Decisions You Make Now\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now\" target=\"_blank\" rel=\" noopener\">The Bench You'll Need in Three Years Depends on Decisions You Make Now<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 14, 2026 at 4:00 am <\/small><p>Today\u2019s hiring shortcut is tomorrow\u2019s talent shortage.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit\" target=\"_blank\" rel=\" noopener\" title=\"What Security Leaders Say About the First AI-Developed Zero-Day Exploit\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Coding-by-Walkator.webp?t=1778685541');\" title=\"What Security Leaders Say About the First AI-Developed Zero-Day Exploit\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Coding-by-Walkator.webp?t=1778685541\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit\" target=\"_blank\" rel=\" noopener\">What Security Leaders Say About the First AI-Developed Zero-Day Exploit<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 13, 2026 at 4:00 pm <\/small><p>Security leaders discuss the first AI-created\u00a0zero-day exploit.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy\" target=\"_blank\" rel=\" noopener\" title=\"Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Glowing-fibers-by-Luke-Jones.webp?t=1778673918');\" title=\"Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/13\/Glowing-fibers-by-Luke-Jones.webp?t=1778673918\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy\" target=\"_blank\" rel=\" noopener\">Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 13, 2026 at 12:00 pm <\/small><p>Cybersecurity is no longer a function that can be delegated and reviewed after the fact.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102267-why-security-leaders-need-to-move-beyond-the-mental-illness-narrative\" target=\"_blank\" rel=\" noopener\" title=\"Why Security Leaders Need to Move Beyond the Mental Illness Narrative\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-Edu-Feat-Slide1-1170x658.webp?t=1777320214');\" title=\"Why Security Leaders Need to Move Beyond the Mental Illness Narrative\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-Edu-Feat-Slide1-1170x658.webp?t=1777320214\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102267-why-security-leaders-need-to-move-beyond-the-mental-illness-narrative\" target=\"_blank\" rel=\" noopener\">Why Security Leaders Need to Move Beyond the Mental Illness Narrative<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 13, 2026 at 4:00 am <\/small><p>For mental health awareness month, Brian LeBlanc highlights why security is pivotal to preventing a crisis in the workplace.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102296-top-2026-security-conferences\" target=\"_blank\" rel=\" noopener\" title=\"Top 2026 Security Conferences\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/11\/SEC_security-conferences-of-2026.webp?t=1778521334');\" title=\"Top 2026 Security Conferences\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/11\/SEC_security-conferences-of-2026.webp?t=1778521334\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102296-top-2026-security-conferences\" target=\"_blank\" rel=\" noopener\">Top 2026 Security Conferences<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 11, 2026 at 5:46 pm <\/small><p>Security\u00a0magazine offers a roundup of security conferences taking place in 2026.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102258-digital-trust-and-identity-at-isc-west\" target=\"_blank\" rel=\" noopener\" title=\"Digital Trust and Identity at ISC West\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-Talk-Feat-Slide1-1170x658.webp?t=1778688553');\" title=\"Digital Trust and Identity at ISC West\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-Talk-Feat-Slide1-1170x658.webp?t=1778688553\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102258-digital-trust-and-identity-at-isc-west\" target=\"_blank\" rel=\" noopener\">Digital Trust and Identity at ISC West<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 11, 2026 at 4:00 am <\/small><p>ISC West keynote highlights how gaps across physical access points, digital systems and human processes undermine trust and organizational resilience.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says\" target=\"_blank\" rel=\" noopener\" title=\"AI Will Tell Your Breach Story for the Next Two Years \u2014 Day One Decides What It Says\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Megaphone-by-Igor-Omilaev.webp?t=1778183697');\" title=\"AI Will Tell Your Breach Story for the Next Two Years \u2014 Day One Decides What It Says\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Megaphone-by-Igor-Omilaev.webp?t=1778183697\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says\" target=\"_blank\" rel=\" noopener\">AI Will Tell Your Breach Story for the Next Two Years \u2014 Day One Decides What It Says<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 8, 2026 at 4:00 pm <\/small><p>The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102282-10-data-breaches-to-know-about-april-2026\" target=\"_blank\" rel=\" noopener\" title=\"10 Data Breaches to Know About (April 2026)\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/01\/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611');\" title=\"10 Data Breaches to Know About (April 2026)\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/01\/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102282-10-data-breaches-to-know-about-april-2026\" target=\"_blank\" rel=\" noopener\">10 Data Breaches to Know About (April 2026)<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 8, 2026 at 12:46 pm <\/small><p>A roundup of recent data breach stories.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102256-partners-in-protection-how-to-utilize-a-canine-security-force\" target=\"_blank\" rel=\" noopener\" title=\"Partners in Protection: How to Utilize a Canine Security Force\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-F4-Feat-Slide1-1170x658.webp?t=1778688552');\" title=\"Partners in Protection: How to Utilize a Canine Security Force\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-F4-Feat-Slide1-1170x658.webp?t=1778688552\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102256-partners-in-protection-how-to-utilize-a-canine-security-force\" target=\"_blank\" rel=\" noopener\">Partners in Protection: How to Utilize a Canine Security Force<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 8, 2026 at 4:00 am <\/small><p>Organizations of all sizes are looking for innovative ways, including canine teams, to advance their security programs.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext\" target=\"_blank\" rel=\" noopener\" title=\"Research: Microsoft Edge Loads Stored Passwords in Cleartext\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941');\" title=\"Research: Microsoft Edge Loads Stored Passwords in Cleartext\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext\" target=\"_blank\" rel=\" noopener\">Research: Microsoft Edge Loads Stored Passwords in Cleartext<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 7, 2026 at 4:30 pm <\/small><p>A researcher found that Microsoft Edge will load saved passwords into memory in plaintext, even when they are not being used.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102293-will-this-world-password-day-be-the-last\" target=\"_blank\" rel=\" noopener\" title=\"Will This World Password Day Be the Last?\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213');\" title=\"Will This World Password Day Be the Last?\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/07\/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102293-will-this-world-password-day-be-the-last\" target=\"_blank\" rel=\" noopener\">Will This World Password Day Be the Last?<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 7, 2026 at 3:30 pm <\/small><p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102291-synthetic-identities-are-redefining-trust-in-biometric-systems\" target=\"_blank\" rel=\" noopener\" title=\"Synthetic Identities Are Redefining Trust in Biometric Systems\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/06\/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1778076735');\" title=\"Synthetic Identities Are Redefining Trust in Biometric Systems\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/06\/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1778076735\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102291-synthetic-identities-are-redefining-trust-in-biometric-systems\" target=\"_blank\" rel=\" noopener\">Synthetic Identities Are Redefining Trust in Biometric Systems<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 7, 2026 at 5:00 am <\/small><p>Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102292-security-experts-discuss-proposed-government-patching-deadlines\" target=\"_blank\" rel=\" noopener\" title=\"Security Experts Discuss Proposed Government Patching Deadlines\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/06\/Keyboard-by-ic-Ci.webp?t=1778080922');\" title=\"Security Experts Discuss Proposed Government Patching Deadlines\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/06\/Keyboard-by-ic-Ci.webp?t=1778080922\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102292-security-experts-discuss-proposed-government-patching-deadlines\" target=\"_blank\" rel=\" noopener\">Security Experts Discuss Proposed Government Patching Deadlines<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 6, 2026 at 4:09 pm <\/small><p>U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102288-cybersecurity-professionals-need-to-think-like-business-leaders\" target=\"_blank\" rel=\" noopener\" title=\"Cybersecurity Professionals Need to Think Like Business Leaders\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/05\/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516');\" title=\"Cybersecurity Professionals Need to Think Like Business Leaders\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/2026\/05\/05\/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/102288-cybersecurity-professionals-need-to-think-like-business-leaders\" target=\"_blank\" rel=\" noopener\">Cybersecurity Professionals Need to Think Like Business Leaders<\/a><\/span><div class=\"rss_content\" style=\"\"><small>on May 6, 2026 at 4:00 pm <\/small><p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn\u2019t speak their language.\u00a0<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"width:150px; height:150px;\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102254-5-skills-that-will-serve-you-in-your-security-career\" target=\"_blank\" rel=\" noopener\" title=\"5 Skills That Will Serve You in Your Security Career\" style=\"width:150px; height:150px;\"><span class=\"fetched\" style=\"background-image:  url('https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-F3-Feat-Slide1-1170x658.webp?t=1778688553');\" title=\"5 Skills That Will Serve You in Your Security Career\"><\/span><amp-img width=\"150\" height=\"150\" src=\"https:\/\/www.securitymagazine.com\/ext\/resources\/Issues\/2026\/05-May\/SEC-0526-F3-Feat-Slide1-1170x658.webp?t=1778688553\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.securitymagazine.com\/articles\/102254-5-skills-that-will-serve-you-in-your-security-career\" target=\"_blank\" rel=\" noopener\">5 Skills That Will Serve You in Your Security Career<\/a><\/span><div class=\"rss_content\" style=\"\"><small>by <a href=\"\/\/www.securitymagazine.com\" target=\"_blank\" title=\"www.securitymagazine.com\" >algerj@bnpmedia.com (Jordyn Alger)<\/a> on May 6, 2026 at 11:00 am <\/small><p>An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.<\/p><\/div><\/li><\/ul> <\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":[],"categories":[29,30,27,28],"tags":[],"_links":{"self":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272"}],"collection":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/comments?post=1272"}],"version-history":[{"count":7,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272\/revisions"}],"predecessor-version":[{"id":1304,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/posts\/1272\/revisions\/1304"}],"wp:attachment":[{"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/media?parent=1272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/categories?post=1272"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/itcomposer.com\/itc\/wp-json\/wp\/v2\/tags?post=1272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}