<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; Our Tech Talk</title>
	<atom:link href="https://ourtechtalk.com/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://ourtechtalk.com</link>
	<description>Latest Tech News Around The World</description>
	<lastBuildDate>Mon, 17 Jun 2024 17:18:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Ensuring Cybersecurity Resilience: A Deep Dive into Zero-Trust Security for Automotive Manufacturing</title>
		<link>https://ourtechtalk.com/zero-trust-security-for-automotive-manufacturing/</link>
					<comments>https://ourtechtalk.com/zero-trust-security-for-automotive-manufacturing/#respond</comments>
		
		<dc:creator><![CDATA[Alison Lurie]]></dc:creator>
		<pubDate>Mon, 17 Jun 2024 17:18:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[automotive manufacturing]]></category>
		<category><![CDATA[Zero-Trust Security]]></category>
		<guid isPermaLink="false">https://ourtechtalk.com/?p=32280</guid>

					<description><![CDATA[Ensuring Cybersecurity Resilience: A Deep Dive into Zero-Trust Security for Automotive Manufacturing Key Takeaways: Zero-trust security is crucial for safeguarding modern automotive manufacturing against cyber threats. Understanding zero trust principles and implementation can significantly enhance cyberattack resilience. Collaborative efforts and cutting-edge technologies are essential for robust cybersecurity in automotive manufacturing. The Importance of Zero-Trust Security&#8230; <a class="more-link" href="https://ourtechtalk.com/zero-trust-security-for-automotive-manufacturing/">Continue reading <span class="screen-reader-text">Ensuring Cybersecurity Resilience: A Deep Dive into Zero-Trust Security for Automotive Manufacturing</span></a>]]></description>
		
					<wfw:commentRss>https://ourtechtalk.com/zero-trust-security-for-automotive-manufacturing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scanning Attack: What It Is and How to Protect Your Organization Against It</title>
		<link>https://ourtechtalk.com/scanning-attack-what-it-is-and-how-to-protect-your-organization-against-it/</link>
					<comments>https://ourtechtalk.com/scanning-attack-what-it-is-and-how-to-protect-your-organization-against-it/#respond</comments>
		
		<dc:creator><![CDATA[komal00]]></dc:creator>
		<pubDate>Fri, 26 Apr 2024 02:33:50 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Scanning Attack]]></category>
		<guid isPermaLink="false">https://ourtechtalk.com/?p=26396</guid>

					<description><![CDATA[Threat actors utilise scanning attacks to find holes in a network or system. It&#8217;s important to note that the following information is for informational purposes only and is not intended to be used for any other purpose. This article will discuss scanning attacks, the different kinds of scanning available, and the defences you may put&#8230; <a class="more-link" href="https://ourtechtalk.com/scanning-attack-what-it-is-and-how-to-protect-your-organization-against-it/">Continue reading <span class="screen-reader-text">Scanning Attack: What It Is and How to Protect Your Organization Against It</span></a>]]></description>
		
					<wfw:commentRss>https://ourtechtalk.com/scanning-attack-what-it-is-and-how-to-protect-your-organization-against-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Detailed Guide On Malware and its Protection from computer</title>
		<link>https://ourtechtalk.com/a-detailed-guide-on-malware-and-its-protection-from-computer/</link>
					<comments>https://ourtechtalk.com/a-detailed-guide-on-malware-and-its-protection-from-computer/#respond</comments>
		
		<dc:creator><![CDATA[Alison Lurie]]></dc:creator>
		<pubDate>Fri, 31 Dec 2021 10:36:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[system protection from malware]]></category>
		<category><![CDATA[type of malware]]></category>
		<category><![CDATA[what is malware]]></category>
		<guid isPermaLink="false">https://ourtechtalk.com/?p=314</guid>

					<description><![CDATA[Malware is one of the common hazards faced by cybercitizens. Although you are aware of many different types of malware that can be confronted, you don&#8217;t know how badly this malware affects your devices, even if you are using end to end technology . This malware is not predictable. In a way, they can be&#8230; <a class="more-link" href="https://ourtechtalk.com/a-detailed-guide-on-malware-and-its-protection-from-computer/">Continue reading <span class="screen-reader-text">A Detailed Guide On Malware and its Protection from computer</span></a>]]></description>
		
					<wfw:commentRss>https://ourtechtalk.com/a-detailed-guide-on-malware-and-its-protection-from-computer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
