<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Human Risk Management Blog</title>
    <link>https://blog.knowbe4.com</link>
    <description>KnowBe4's blog keeps you informed about the latest in security including social engineering, ransomware and phishing attacks.</description>
    <language>en-us</language>
    <pubDate>Mon, 13 Oct 2025 13:30:00 GMT</pubDate>
    <dc:date>2025-10-13T13:30:00Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>[Cybersecurity Awareness Month] The Rise of Dr. Deepfake: Combatting Social Engineering’s Newest Weapon</title>
      <link>https://blog.knowbe4.com/cybersecurity-awareness-month-the-rise-of-dr.-deepfake-combatting-social-engineerings-newest-weapon</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cybersecurity-awareness-month-the-rise-of-dr.-deepfake-combatting-social-engineerings-newest-weapon" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CAM_BlogPost_Images_James.png" alt="[Cybersecurity Awareness Month] The Rise of Dr. Deepfake: Combatting Social Engineering’s Newest Weapon" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Deepfakes are easier to create than ever and are being used to attack organizations, families and individuals. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cybersecurity-awareness-month-the-rise-of-dr.-deepfake-combatting-social-engineerings-newest-weapon" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CAM_BlogPost_Images_James.png" alt="[Cybersecurity Awareness Month] The Rise of Dr. Deepfake: Combatting Social Engineering’s Newest Weapon" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Deepfakes are easier to create than ever and are being used to attack organizations, families and individuals. &lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fcybersecurity-awareness-month-the-rise-of-dr.-deepfake-combatting-social-engineerings-newest-weapon&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity Awareness Month</category>
      <category>Deepfake</category>
      <category>Human Risk Management</category>
      <pubDate>Mon, 13 Oct 2025 13:30:00 GMT</pubDate>
      <guid>https://blog.knowbe4.com/cybersecurity-awareness-month-the-rise-of-dr.-deepfake-combatting-social-engineerings-newest-weapon</guid>
      <dc:date>2025-10-13T13:30:00Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>Checkups and Checklists: Cyber Risk Isn’t Just a Technical Problem</title>
      <link>https://blog.knowbe4.com/checkups-and-checklists-cyber-risk-isnt-just-a-technical-problem</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/checkups-and-checklists-cyber-risk-isnt-just-a-technical-problem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Checkups and Checklists: Cyber Risk Isn’t Just a Technical Problem" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the moment. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/checkups-and-checklists-cyber-risk-isnt-just-a-technical-problem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Checkups and Checklists: Cyber Risk Isn’t Just a Technical Problem" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the moment. &lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fcheckups-and-checklists-cyber-risk-isnt-just-a-technical-problem&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>Security Culture</category>
      <category>Human Risk Management</category>
      <pubDate>Fri, 13 Jun 2025 15:55:01 GMT</pubDate>
      <guid>https://blog.knowbe4.com/checkups-and-checklists-cyber-risk-isnt-just-a-technical-problem</guid>
      <dc:date>2025-06-13T15:55:01Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>Shadow AI: A New Insider Risk for Cybersecurity Teams to Tackle Now</title>
      <link>https://blog.knowbe4.com/shadow-ai-a-new-insider-risk-for-cybersecurity-teams-to-tackle</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/shadow-ai-a-new-insider-risk-for-cybersecurity-teams-to-tackle" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Shadow AI: A New Insider Risk for Cybersecurity Teams to Tackle Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; Don't get me wrong,&amp;nbsp;I love using generative AI daily for research and writing. This is about how other users could be using it when they don't know what they don't know and are accidental in their actions to hurt the organization where they work.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/shadow-ai-a-new-insider-risk-for-cybersecurity-teams-to-tackle" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Shadow AI: A New Insider Risk for Cybersecurity Teams to Tackle Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; Don't get me wrong,&amp;nbsp;I love using generative AI daily for research and writing. This is about how other users could be using it when they don't know what they don't know and are accidental in their actions to hurt the organization where they work.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fshadow-ai-a-new-insider-risk-for-cybersecurity-teams-to-tackle&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Culture</category>
      <category>AI</category>
      <pubDate>Thu, 10 Apr 2025 19:04:40 GMT</pubDate>
      <guid>https://blog.knowbe4.com/shadow-ai-a-new-insider-risk-for-cybersecurity-teams-to-tackle</guid>
      <dc:date>2025-04-10T19:04:40Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>Fortifying Defenses Against AI-Powered OSINT Cyber Attacks</title>
      <link>https://blog.knowbe4.com/fortifying-defenses-against-ai-powered-osint-cyber-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/fortifying-defenses-against-ai-powered-osint-cyber-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Fortifying Defenses Against AI-Powered OSINT Cyber Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In the ever-evolving landscape of cybersecurity, the convergence of Artificial Intelligence (AI) and Open-Source Intelligence (OSINT) has created new opportunities for risk.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/fortifying-defenses-against-ai-powered-osint-cyber-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Fortifying Defenses Against AI-Powered OSINT Cyber Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In the ever-evolving landscape of cybersecurity, the convergence of Artificial Intelligence (AI) and Open-Source Intelligence (OSINT) has created new opportunities for risk.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Ffortifying-defenses-against-ai-powered-osint-cyber-attacks&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Phishing</category>
      <pubDate>Wed, 13 Nov 2024 20:08:55 GMT</pubDate>
      <guid>https://blog.knowbe4.com/fortifying-defenses-against-ai-powered-osint-cyber-attacks</guid>
      <dc:date>2024-11-13T20:08:55Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>[Cybersecurity Awareness Month] Keeping Your Mobile Devices Secure from the ‘Inside’ Out</title>
      <link>https://blog.knowbe4.com/cybersecurity-awareness-month-james-mcquiggan-2024</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cybersecurity-awareness-month-james-mcquiggan-2024" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Evangelist-Blog-James.jpg" alt="[Cybersecurity Awareness Month] Keeping Your Mobile Devices Secure from the ‘Inside’ Out" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As remote work and connecting while traveling has become the norm, mobile device security responsibilities have also increased. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cybersecurity-awareness-month-james-mcquiggan-2024" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Evangelist-Blog-James.jpg" alt="[Cybersecurity Awareness Month] Keeping Your Mobile Devices Secure from the ‘Inside’ Out" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As remote work and connecting while traveling has become the norm, mobile device security responsibilities have also increased. &lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fcybersecurity-awareness-month-james-mcquiggan-2024&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KnowBe4</category>
      <category>Cybersecurity Awareness Month</category>
      <pubDate>Tue, 08 Oct 2024 14:19:44 GMT</pubDate>
      <guid>https://blog.knowbe4.com/cybersecurity-awareness-month-james-mcquiggan-2024</guid>
      <dc:date>2024-10-08T14:19:44Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>[Security Masterminds Podcast] The Human Side of Cybersecurity: Bridging the Gap with Empathy and Strategy</title>
      <link>https://blog.knowbe4.com/security-masterminds-podcast-human-side-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-podcast-human-side-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-4%20(1).jpg" alt="[Security Masterminds Podcast] The Human Side of Cybersecurity: Bridging the Gap with Empathy and Strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In cybersecurity, technology often takes center stage. From the latest AI-driven defenses to sophisticated encryption techniques, it's easy to overlook the most crucial element: the human factor.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-podcast-human-side-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-4%20(1).jpg" alt="[Security Masterminds Podcast] The Human Side of Cybersecurity: Bridging the Gap with Empathy and Strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In cybersecurity, technology often takes center stage. From the latest AI-driven defenses to sophisticated encryption techniques, it's easy to overlook the most crucial element: the human factor.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fsecurity-masterminds-podcast-human-side-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Awareness Training</category>
      <category>KnowBe4</category>
      <pubDate>Wed, 04 Sep 2024 14:58:25 GMT</pubDate>
      <guid>https://blog.knowbe4.com/security-masterminds-podcast-human-side-cybersecurity</guid>
      <dc:date>2024-09-04T14:58:25Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>[Security Masterminds Podcast] Securing Software Over 50 Years: Reflections from an Industry Veteran</title>
      <link>https://blog.knowbe4.com/security-masterminds-podcast-securing-software</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-podcast-securing-software" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-4%20(1).jpg" alt="Securing Software Over 50 Years: Reflections from an Industry Veteran" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Does the challenge of keeping up with cybersecurity trends sound familiar? You may have been told to update your antivirus software and hope for the best, only to find that your digital assets are still at risk.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-podcast-securing-software" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-4%20(1).jpg" alt="Securing Software Over 50 Years: Reflections from an Industry Veteran" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Does the challenge of keeping up with cybersecurity trends sound familiar? You may have been told to update your antivirus software and hope for the best, only to find that your digital assets are still at risk.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fsecurity-masterminds-podcast-securing-software&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KnowBe4</category>
      <category>Security Masterminds Podcast</category>
      <pubDate>Mon, 22 Jul 2024 18:36:12 GMT</pubDate>
      <guid>https://blog.knowbe4.com/security-masterminds-podcast-securing-software</guid>
      <dc:date>2024-07-22T18:36:12Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>Protecting Your Digital Footprint: The Dangers of Sharing Too Much on Social Media</title>
      <link>https://blog.knowbe4.com/protecting-your-digital-footprint</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/protecting-your-digital-footprint" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Protecting Your Digital Footprint: The Dangers of Too Much Sharing on Social Media" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, Twitter and Instagram to share their thoughts, experiences and personal moments with friends and family.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/protecting-your-digital-footprint" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="Protecting Your Digital Footprint: The Dangers of Too Much Sharing on Social Media" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, Twitter and Instagram to share their thoughts, experiences and personal moments with friends and family.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fprotecting-your-digital-footprint&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Social Engineering</category>
      <pubDate>Fri, 03 May 2024 18:00:22 GMT</pubDate>
      <guid>https://blog.knowbe4.com/protecting-your-digital-footprint</guid>
      <dc:date>2024-05-03T18:00:22Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>AI and the Boardroom: Bridging Innovation and Security</title>
      <link>https://blog.knowbe4.com/ai-and-the-boardroom-bridging-innovation-and-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/ai-and-the-boardroom-bridging-innovation-and-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="AI and the Boardroom: Bridging Innovation and Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;Today, artificial intelligence (AI) is no longer a futuristic concept but a tool that is driving operational efficiency, customer experience, and decision-making processes. Organizations are observing its transformative power firsthand across various industries and organizational aspects.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/ai-and-the-boardroom-bridging-innovation-and-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Social%20Image%20Repository/Evangelist%20Blog%20Social%20Graphics/Evangelists-James%20McQuiggan.jpg" alt="AI and the Boardroom: Bridging Innovation and Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;Today, artificial intelligence (AI) is no longer a futuristic concept but a tool that is driving operational efficiency, customer experience, and decision-making processes. Organizations are observing its transformative power firsthand across various industries and organizational aspects.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fai-and-the-boardroom-bridging-innovation-and-security&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Culture</category>
      <pubDate>Tue, 19 Mar 2024 17:18:09 GMT</pubDate>
      <guid>https://blog.knowbe4.com/ai-and-the-boardroom-bridging-innovation-and-security</guid>
      <dc:date>2024-03-19T17:18:09Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
    <item>
      <title>[Security Masterminds] The Art of Defending Against Social Engineering in the Age of AI: Insights from Rachel Tobac</title>
      <link>https://blog.knowbe4.com/security-masterminds-the-art-of-defending-against-social-engineering-in-the-age-of-ai-insights-from-rachel-tobac</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-the-art-of-defending-against-social-engineering-in-the-age-of-ai-insights-from-rachel-tobac" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-3.jpg" alt="[Security Masterminds] The Art of Defending Against Social Engineering in the Age of AI: Insights from Rachel Tobac" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.knowbe4.com/what-is-social-engineering/"&gt;Social engineering&lt;/a&gt; attacks can seem unpredictable and challenging to defend against. However, with the right approach, organizations can better protect themselves.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/security-masterminds-the-art-of-defending-against-social-engineering-in-the-age-of-ai-insights-from-rachel-tobac" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Sec-Masterminds-SM-3.jpg" alt="[Security Masterminds] The Art of Defending Against Social Engineering in the Age of AI: Insights from Rachel Tobac" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.knowbe4.com/what-is-social-engineering/"&gt;Social engineering&lt;/a&gt; attacks can seem unpredictable and challenging to defend against. However, with the right approach, organizations can better protect themselves.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fsecurity-masterminds-the-art-of-defending-against-social-engineering-in-the-age-of-ai-insights-from-rachel-tobac&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Masterminds Podcast</category>
      <pubDate>Wed, 13 Mar 2024 13:27:38 GMT</pubDate>
      <guid>https://blog.knowbe4.com/security-masterminds-the-art-of-defending-against-social-engineering-in-the-age-of-ai-insights-from-rachel-tobac</guid>
      <dc:date>2024-03-13T13:27:38Z</dc:date>
      <dc:creator>James McQuiggan</dc:creator>
    </item>
  </channel>
</rss>
