<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; iOCO Switzerland</title>
	<atom:link href="https://ch.ioco.tech/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://ch.ioco.tech</link>
	<description>We are iOCO</description>
	<lastBuildDate>Thu, 10 Oct 2024 19:45:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://ch.ioco.tech/wp-content/uploads/2025/01/cropped-icon-32x32.png</url>
	<title>Cybersecurity &#8211; iOCO Switzerland</title>
	<link>https://ch.ioco.tech</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI’s potential for good in the cyber security space</title>
		<link>https://ch.ioco.tech/ais-potential-for-good-in-the-cyber-security-space/</link>
		
		<dc:creator><![CDATA[iOCO]]></dc:creator>
		<pubDate>Tue, 07 Nov 2023 11:46:15 +0000</pubDate>
				<category><![CDATA[Ai]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CASA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://staging.ch.ioco.tech/new/?p=77806</guid>

					<description><![CDATA[Cyber security professionals can use generative AI to better defend against the attackers who are using the same AI tools to create attacks. When people engage in the artificial intelligence (AI) debate, top of the list of concerns is often the intellectual property (IP) and copyright issue, especially regarding code generation or creative outputs from [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The road to Zero Trust not necessarily paved with gold</title>
		<link>https://ch.ioco.tech/the-road-to-zero-trust-not-necessarily-paved-with-gold/</link>
		
		<dc:creator><![CDATA[iOCO]]></dc:creator>
		<pubDate>Thu, 24 Aug 2023 16:10:14 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[iOCO]]></category>
		<category><![CDATA[P2P]]></category>
		<category><![CDATA[Zero-Trust]]></category>
		<guid isPermaLink="false">https://staging.ch.ioco.tech/new/?p=77191</guid>

					<description><![CDATA[As discussed in my first article in this series, whilst Zero Trust must be the goal, there are a few potholes to navigate on the journey. Let me expand slightly more on these caveats, but also expose the greatest ally of Zero Trust. &#160; Paul Meyer. &#160; Peer to peer (P2P) technologies – prevalent in the [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Why Zero Trust must be an essential part of cybersecurity strategy</title>
		<link>https://ch.ioco.tech/why-zero-trust-must-be-an-essential-part-of-cybersecurity-strategy/</link>
		
		<dc:creator><![CDATA[iOCO]]></dc:creator>
		<pubDate>Thu, 17 Aug 2023 10:38:41 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[iOCO]]></category>
		<category><![CDATA[Zero-Trust]]></category>
		<guid isPermaLink="false">https://staging.ch.ioco.tech/new/?p=77145</guid>

					<description><![CDATA[In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
