<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="https://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://securitybrief.in/story/netskope-launches-mumbai-management-plane-for-indian-data</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T14:42:00+12:00</news:publication_date>
      <news:title>Netskope launches Mumbai management plane for Indian data</news:title>
      <news:keywords>Data Protection, Hybrid Cloud, Digital Transformation, Network Security, Enterprise security, Cloud Security, Data governance, Cyber Risk, Data centers (DC), Metadata, Data transfer, Partner Programmes, Critical Infrastructure, Mumbai, Netskope, Data sovereignty, Data residency, Zero Trust Security, Data Privacy, Data Localisation, Financial Services, Cloud, Artificial Intelligence (AI), AI Adoption, Managed Service Provider (MSP), Digital Sovereignty, India, AI Ethics &amp; Governance, NewEdge, Cybersecurity, Cloud Service Providers (CSP), Secure Access Service Edge (SASE), Machine learning (ML), Firewalls, Hyperscale, Cloud Access Security Broker (CASB), Breach Prevention</news:keywords>
    </news:news>
    <lastmod>2026-04-17T14:50:07+12:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/qnu-labs-quantum-security-passes-fibre-network-test</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:15:00+12:00</news:publication_date>
      <news:title>QNu Labs quantum security passes fibre network test</news:title>
      <news:keywords>Network Infrastructure, Network Security, Utilities, Critical Infrastructure, Quantum Computing, Encryption Keys, Data Traffic, Infosec, Banking, Financial Services, India, Cybersecurity, VIAVI Solutions, VIAVI, Bengaluru, Firewalls, Encryption, Breach Prevention</news:keywords>
    </news:news>
    <lastmod>2026-04-13T15:25:06+12:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/cyberscope-joins-lunar-strategy-in-web3-security-push</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:30:00+12:00</news:publication_date>
      <news:title>Cyberscope joins Lunar Strategy in Web3 security push</news:title>
      <news:keywords>Software Development, Crypto, Penetration testing, Cyber Risk, Regulation, CREST, AI Security, Digital Asset, Security testing, Decentralised finance, Infosec, Web3, Artificial Intelligence (AI), India, Risk Management, Cybersecurity, Security by Design, Institutional investors, Decentralized Finance (DeFi), Know your customer (KYC), DevOps, Risk &amp; Compliance, Application Performance Monitoring (APM)</news:keywords>
    </news:news>
    <lastmod>2026-04-09T15:40:09+12:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/building-digital-trust-data-quality-provides-a-scalable-path</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:45:00+12:00</news:publication_date>
      <news:title>Building digital trust: Data quality provides a scalable path</news:title>
      <news:keywords>Data Protection, Productivity, Identity Theft, Data management, Fintech, Geolocation, Data governance, Regulation, Data Quality, Regulatory technology, Identity proofing, Open banking, Risk &amp; Compliance, Digital Identity, Financial crime, Infosec, Synthetic Identity, Modelling, Banking, Digital Trust, Data Privacy, Financial Services, Fraud prevention, Identity verification, Risk Management, Cybersecurity, Quality Management, Anti-money laundering (AML), Customer Experience (CX), United Kingdom (UK), United States (US), Know your customer (KYC), Bud Walker, Opinion, Marketing Technologies (MarTech), Physical Security</news:keywords>
    </news:news>
    <lastmod>2026-04-22T06:15:06+12:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/eventus-security-wins-four-awards-at-global-infosec</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-31T20:10:00+13:00</news:publication_date>
      <news:title>Eventus Security wins four awards at Global InfoSec</news:title>
      <news:keywords>Managed Security Services Provider (MSSP), Threat intelligence, Hybrid IT, Enterprise security, Skills shortage, Cyber Threat, Cyber Risk, Security Operations Centres (SOCs), Critical Infrastructure, Security Posture, Cyber resilience, OT security, Operational Technologies (OT), Financial Services, Security Services, India, Southeast Asia, Risk Management, Middle East, Threat Landscape, Managed Detection and Response (MDR), Extended Detection and Response (XDR), IoT Security, Advanced Persistent Threat Protection, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-03-31T20:20:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/data-governance-vs-data-quality-which-comes-first-in-2026</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-26T18:15:00+13:00</news:publication_date>
      <news:title>Data governance vs. data quality: Which comes first in 2026?</news:title>
      <news:keywords>Bobby Joseph, Productivity, Digital Transformation, Data management, Data ownership, Financial institutions, Integration, Data governance, Data Quality, IT Governance, Identity Solutions, C-Suite, Banking, Data Ingestion, Financial Services, Data Strategy, Artificial Intelligence (AI), AI Ethics &amp; Governance, Risk Management, AI Data, Information Governance, United Kingdom (UK), United States (US), Machine learning (ML), Opinion, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-04-10T06:15:06+12:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/blue-cloud-wins-telangana-arogyasree-healthcare-order</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-25T16:00:00+13:00</news:publication_date>
      <news:title>Blue Cloud wins Telangana Arogyasree healthcare order</news:title>
      <news:keywords>Public Sector, Facial recognition, Biometrics, Government of India, GovTech, Video analytics, Identity and Access Management (IAM), Infrastructure monitoring, Access Control, Patient Monitoring, Artificial Intelligence (AI), India, Health Technologies (HealthTech), Edge AI, Medical Technologies (MedTech), Surveillance, Physical Security, Digital Entertainment, Cybersecurity</news:keywords>
    </news:news>
    <lastmod>2026-03-25T16:10:07+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/bloodhound-expands-identity-attack-path-mapping-reach</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-20T15:15:00+13:00</news:publication_date>
      <news:title>BloodHound expands identity attack path mapping reach</news:title>
      <news:keywords>Data Protection, ServiceNow, Okta, Data encryption, Encryption, IT Department, Enterprise security, Privileged Access Management (PAM), Cloud Security, Key management, IT management, Identity governance, GitHub, Cyber Risk, DevSecOps, Endpoint Management, macOS, Source code, Identity and Access Management (IAM), Threat detection, Access Control, BloodHound, Risk &amp; Compliance, Active Directory, Incident Response, Customer data, Mac, Infosec, Zero Trust Security, Threat actors, Identity Security, Jamf Software, Risk Management, Cybersecurity, Supply Chain Security, Software Development, Single Sign-On (SSO), Mobile Device Management (MDM), Application Security, Advanced Persistent Threat Protection, Physical Security, Supply Chain, Customer Data Platforms (CDP), Endpoint Detection and Response (EDR), Source Code Management (SCM), SmartPhones, Marketing Technologies (MarTech), Security Operations Centres (SOCs)</news:keywords>
    </news:news>
    <lastmod>2026-03-20T15:15:05+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/optivalue-unveils-ai-powered-multi-layer-drone-shield</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-19T16:15:00+13:00</news:publication_date>
      <news:title>OptiValue unveils AI-powered multi-layer drone shield</news:title>
      <news:keywords>Unmanned Aerial Vehicles (UAV), Critical Infrastructure, Supply Chain, National Security, Neural Networks, Radio Frequency, Artificial Intelligence (AI), India, Edge AI, Machine learning (ML)</news:keywords>
    </news:news>
    <lastmod>2026-03-19T16:20:16+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/qualys-adds-ai-tool-to-forecast-software-patch-risks</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-13T17:00:00+13:00</news:publication_date>
      <news:title>Qualys adds AI tool to forecast software patch risks</news:title>
      <news:keywords>Security Operations Centres (SOCs), Windows, Software Updates, Ubuntu, Digital Transformation, IT Department, Downtime, Cloud Security, Patching, Containers, DevSecOps, Predictive analytics, Qualys, OT security, Servers, Artificial Intelligence (AI), Risk Management, Cybersecurity, Machine learning (ML), Change Management, DataCentre infrastructure, Data Analytics, IoT Security, Application Security, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-03-13T17:05:05+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/ai-fuelled-ddos-attacks-surge-past-eight-million-globally</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-13T16:30:00+13:00</news:publication_date>
      <news:title>AI-fuelled DDoS attacks surge past eight million globally</news:title>
      <news:keywords>Business Continuity, Botnet, Public Sector, Managed Security Services Provider (MSSP), Threat intelligence, Network Security, NETSCOUT, Cloud Security, Dark web, Internet Service Provider (ISP), Internet of Things (IoT), Mobile operators, Cybercriminals, Critical Infrastructure, DNS, DDos-as-a-Service (DDosaaS), Access Networks, Large Language Models (LLMs), Artificial Intelligence (AI), Threat actors, Security Services, Internet Security, Risk Management, Cybersecurity, Threat Landscape, Resilience, Cloud Service Providers (CSP), Distributed Denial of Service (DDoS), Machine learning (ML), Firewalls, Distributors, Risk &amp; Compliance, Breach Prevention</news:keywords>
    </news:news>
    <lastmod>2026-03-13T16:35:09+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/jfrog-flags-13-critical-ci-cd-flaws-in-github-workflows</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-06T19:13:00+13:00</news:publication_date>
      <news:title>JFrog flags 13 critical CI/CD flaws in GitHub workflows</news:title>
      <news:keywords>Microsoft, Software engineering, Threat intelligence, Fintech, GitHub, Application Security, DevSecOps, Threat detection, Supply Chain, AI Security, Datadog, Open source, Trivy, Infosec, Artificial Intelligence (AI), Secrets Management, AppSec, Cybersecurity, GitHub Actions, Ansible, Supply Chain Security, Software Development, Cloud Native Computing Foundation, Security Information and Event Management (SIEM), Advanced Persistent Threat Protection, Source Code Management (SCM)</news:keywords>
    </news:news>
    <lastmod>2026-03-06T19:25:06+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/cyber-safety-for-women-tackling-stalking-deepfakes-and-online-harassment</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-06T19:02:00+13:00</news:publication_date>
      <news:title>Cyber safety for women: Tackling stalking, deepfakes and online harassment</news:title>
      <news:keywords>Social Media, Cyberbullying, Data Protection, Digital Literacy, Identity Theft, Online Safety, Online harrassment, IT Department, International Womens Day (IWD)s Day (IWD), Hate speech, Gender equality, Deepfakes, India, AI Ethics &amp; Governance, AI Safety, Physical Security, Opinion, Uma Pendyala</news:keywords>
    </news:news>
    <lastmod>2026-03-23T16:35:09+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/account-takeover-ato-fraud-the-hidden-threat-to-your-business-and-how-to-stop-it</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-04T23:39:00+13:00</news:publication_date>
      <news:title>Account Takeover (ATO) fraud: The hidden threat to your business and how to stop it</news:title>
      <news:keywords>Malware, Data Protection, Business Continuity, Identity Theft, Voice recognition, Digital Transformation, Facial recognition, Threat intelligence, Online fraud, Biometrics, Enterprise security, Fintech, Cloud Security, Phishing, Spear Phishing, Social Engineering, Identity and Access Management (IAM), Supply Chain, Regulatory technology, Behavioural Biometrics, Digital Identity, Infosec, Banking, Real time data, Zero Trust Security, Data Privacy, Financial Services, Fraud prevention, Identity verification, FIDO2, Cyber fraud, Security Keys, Cybersecurity, Multi-factor authentication (MFA), Bobby Joseph, Opinion, Surveillance, Physical Security, Email Security, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-03-20T06:15:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/redefining-leadership-in-technology-a-woman-leader-s-perspective-in-the-age-of-artificial-intelligence-a42e258c-f38a-4ca0-9821-095118e57367</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-04T15:43:00+13:00</news:publication_date>
      <news:title>Redefining leadership in technology: A woman leader's perspective in the age of artificial intelligence</news:title>
      <news:keywords>IT Industry, Data Protection, Intelligent systems, Sustainability, Leadership, Surveillance, Digital Transformation, International Womens Day (IWD)s Day (IWD), Security industry, Gender diversity, Regulation, Milestone Systems, Organisational culture, Critical Infrastructure, Video analytics, Gender equality, Predictive analytics, Data Privacy, Digital Infrastructure, Artificial Intelligence (AI), AI Ethics &amp; Governance, Digital Acceleration, Risk Management, Cybersecurity, Mentorship, Women in Technology, Change Management, Opinion, Data Analytics, Digital Entertainment, Risk &amp; Compliance, Video Surveillance-as-a-Service (VSaaS), Clean technologies, Diya Girish</news:keywords>
    </news:news>
    <lastmod>2026-03-19T16:35:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/from-participation-to-influence-redefining-women-s-leadership-in-india-s-technology-transformation-era</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-03-03T15:30:00+13:00</news:publication_date>
      <news:title>From participation to influence: redefining women's leadership in india's technology transformation era</news:title>
      <news:keywords>Security Operations Centres (SOCs), IT Industry, Data Protection, Managed Services, Hybrid Cloud, Digital Transformation, IT Department, Public Cloud, ICT sector, Cloud Security, Diversity, Equity &amp; Inclusion (DEI), KPIs, Data governance, Gender diversity, Regulation, Digital Economy, Multi-cloud, DevSecOps, Cyber resilience, Risk &amp; Compliance, Infosec, IT Infrastructure, Zero Trust Security, Financial Services, Cloud, Artificial Intelligence (AI), Hybrid &amp; Remote Work, AI Ethics &amp; Governance, Risk Management, Cybersecurity, Mentorship, Women in Technology, Ransomware-as-a-Service (RaaS), Opinion, Cloud Services, Application Security, Partner Programmes, International Womens Day (IWD)s Day (IWD), Ridhima Sawant</news:keywords>
    </news:news>
    <lastmod>2026-03-19T16:35:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/industry-4-0-study-warns-ot-ubiquity-masks-weak-governance</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-02-26T21:45:00+13:00</news:publication_date>
      <news:title>Industry 4.0 study warns OT ubiquity masks weak governance</news:title>
      <news:keywords>Robotics (Robots), Network Infrastructure, Manufacturing, Digital Transformation, SCADA, Industrial IoT (IIoT), Germany, Industrial Control Systems, Critical Infrastructure, Industry 4.0, Cyber resilience, Access Control, OT security, ICS, Operational Technologies (OT), Industrial Automation, Industrial cybersecurity, Risk Management, Cybersecurity, Threat Landscape, United States (US), Change Management, IoT Security, Internet of Things (IoT), Physical Security, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-03-16T07:45:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/ai-driven-phishing-surge-as-acronis-warns-msps-at-risk</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-02-20T16:30:00+13:00</news:publication_date>
      <news:title>AI-driven phishing surge as Acronis warns MSPs at risk</news:title>
      <news:keywords>Malware, Acronis, Ransomware, South Korea, ICT sector, Cloud Security, Phishing, Cyber Threat, Cyber attacks, Spear Phishing, Germany, Critical Infrastructure, Social Engineering, Email Security, Law enforcement, Supply Chain, Netherlands, Business Email Compromise, Data exfiltration, Incident Response, TeamViewer, Infosec, Artificial Intelligence (AI), Industrial cybersecurity, Managed Service Provider (MSP), India, Risk Management, Cybersecurity, Resilience, United States (US), Machine learning (ML), Common Vulnerabilities and Exposures (CVE), Ransomware-as-a-Service (RaaS), Advanced Persistent Threat Protection, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-02-21T18:55:09+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/lockbit-5-0-ransomware-targets-windows-linux-esxi</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-02-18T17:00:00+13:00</news:publication_date>
      <news:title>LockBit 5.0 ransomware targets Windows, Linux, ESXi</news:title>
      <news:keywords>Cloud Services, Physical Security, Breach Prevention, Windows, Malware, Virtualisation, Linux, Data Protection, Disaster Recovery (DR), Small Business (SMB), Acronis, Ransomware, Business Continuity, Data breach, Encryption, Threat intelligence, IT Department, Enterprise security, Cloud Security, Cybercrime, Virtualization, Hypervisor, Critical Infrastructure, Law enforcement, Cyber resilience, Access Control, File encryption, Incident Response, Infosec, IT Infrastructure, Lockbit, Data theft, Managed Service Provider (MSP), Cybersecurity, Advanced Persistent Threat (APT), Multi-factor authentication (MFA)</news:keywords>
    </news:news>
    <lastmod>2026-02-18T17:30:06+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/xiid-cytex-link-ai-governance-with-zero-trust-access</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-02-15T06:15:00+13:00</news:publication_date>
      <news:title>Xiid &amp; Cytex link AI governance with zero trust access</news:title>
      <news:keywords>Security Operations Centres (SOCs), Gartner, Data Protection, Ransomware, Shadow IT, Encryption, IT Department, Network Security, Enterprise security, Cloud Security, Phishing, Regulation, Critical Infrastructure, Social Engineering, Identity and Access Management (IAM), Threat detection, Supply Chain, Security Posture, Credential abuse, Cyber resilience, Threat monitoring, Access Control, AI Security, IT Governance, Data exfiltration, Posture management, Incident Response, Hospitals, ZTNA, Infosec, Zero Trust Security, Data Privacy, Financial Services, Artificial Intelligence (AI), Threat Protection, AI Ethics &amp; Governance, SEC, Risk Management, Cybersecurity, Digital Operational Resilience Act, Supply Chain Security, AI Agents (Agentic AI), GRC, Network Access Control (NAC), Generative AI (GenAI), Cyber Resilience Act (CRA), AI Monitoring (AIM), Firewalls, Advanced Persistent Threat Protection, Physical Security, Email Security, Cloud Access Security Broker (CASB), Risk &amp; Compliance, Health Technologies (HealthTech), Analyst report, Breach Prevention, Forrester</news:keywords>
    </news:news>
    <lastmod>2026-02-16T13:00:08+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/black-kite-unveils-threattrace-to-bolster-third-party-risk</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-01-31T05:30:00+13:00</news:publication_date>
      <news:title>Black Kite unveils ThreatTrace to bolster third-party risk</news:title>
      <news:keywords>Security Operations Centres (SOCs), Kaseya, SolarWinds, Threat intelligence, Network Security, Dark web, Cyber Risk, Threat detection, Supply Chain, Data Loss Prevention (DLP), Cyber resilience, IP addresses, Risk &amp; Compliance, Security Ratings, Data exfiltration, Infosec, Zero Trust Security, DNS security, Cloud, Managed Service Provider (MSP), Attack Surface Management, Risk Management, Cybersecurity, Supply Chain Security, Resilience, GRC, Cloud Service Providers (CSP), Black Kite, Firewalls, Advanced Persistent Threat Protection, IT Automation, Breach Prevention</news:keywords>
    </news:news>
    <lastmod>2026-01-31T06:00:06+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/threat-visibility-gap-hampers-ai-driven-cyber-defence</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-01-30T14:51:00+13:00</news:publication_date>
      <news:title>Threat visibility gap hampers AI-driven cyber defence</news:title>
      <news:keywords>Ransomware, Security breaches, Threat intelligence, Enterprise security, Cloud Security, Integration, Cyber Risk, Critical Infrastructure, Incident Response, Real time data, Cloud, Artificial Intelligence (AI), Attack Surface Management, MTTR, MTTD, Risk Management, Cybersecurity, Security Operations Centres (SOCs), Machine learning (ML), Breach Prevention, Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-01-30T16:05:05+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/lf-energy-audit-boosts-security-of-everest-ev-charging</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-01-22T21:00:00+13:00</news:publication_date>
      <news:title>LF Energy audit boosts security of EVerest EV charging</news:title>
      <news:keywords>Software Updates, Smart Grids, Transparency, Security vulnerabilities, Internet of Things (IoT), Patching, Electric vehicles (EVs), Critical Infrastructure, Roaming services, Europe (European), Firmware, Open source, Energy sector, LF Energy, Cybersecurity, Threat modelling, Supply Chain Security, Cartech, Supply Chain, Automotive</news:keywords>
    </news:news>
    <lastmod>2026-02-23T15:20:55+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/manual-compliance-strain-fuels-automation-push-survey</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-01-21T12:45:00+13:00</news:publication_date>
      <news:title>Manual compliance strain fuels automation push - survey</news:title>
      <news:keywords>Security Operations Centres (SOCs), Webinar, Public Sector, Managed Services, Digital Transformation, Enterprise security, Skills shortage, Regulation, Evidence management, Workflow Automation, Process automation, Audit, Real time data, Financial Services, Artificial Intelligence (AI), Risk Management, Cybersecurity, Resilience, GRC, Healthcare, Machine learning (ML), Partner Programmes, Robotic Process Automation (RPA), Risk &amp; Compliance</news:keywords>
    </news:news>
    <lastmod>2026-01-21T13:15:05+13:00</lastmod>
  </url>
  <url>
    <loc>https://securitybrief.in/story/cobalt-launches-two-way-microsoft-teams-pentesting-tool</loc>
    <news:news>
      <news:publication>
        <news:name>SecurityBrief India</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-01-21T12:40:00+13:00</news:publication_date>
      <news:title>Cobalt launches two-way Microsoft Teams pentesting tool</news:title>
      <news:keywords>Security Operations Centres (SOCs), Microsoft, Digital Transformation, IT Department, Cloud marketplace, Cloud Security, Slack, Microsoft Teams, Application Security, Penetration testing, DevSecOps, Fortune 100, Cobalt, Security Posture, Security testing, Infosec, Enterprise Resource Planning (ERP), Real time data, AppSec, Hybrid &amp; Remote Work, Risk Management, Cybersecurity, Software Development, Unified Communications (UC), DevOps, Risk &amp; Compliance, Application Performance Monitoring (APM)</news:keywords>
    </news:news>
    <lastmod>2026-01-21T13:15:06+13:00</lastmod>
  </url>
</urlset>
