<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Encryption &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/encryption/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 21 Nov 2020 08:14:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Encryption &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Agency Cybersecurity Waivers Would Face New Time Limits, Oversight Under New Bill</title>
		<link>https://risk-academy.ru/agency-cybersecurity-waivers-would-face-new-time-limits-oversight-under-new-bill/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 20 Nov 2020 22:51:29 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Illinois]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[chair]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Committee on Homeland Security]]></category>
		<category><![CDATA[Lauren Underwood]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[New Time]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/agency-cybersecurity-waivers-would-face-new-time-limits-oversight-under-new-bill/</guid>

					<description><![CDATA[With a new proposal that would require federal agencies to get permission from the Office of Management and Budget to opt-out of implementing specific cybersecurity practices— encryption of sensitive information [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>With a new proposal that would require federal agencies to get permission from the Office of Management and Budget to opt-out of implementing specific cybersecurity practices— encryption of sensitive information and multifactor authentication—Sen. Ron Wyden, D-Ore., and Rep. Lauren Underwood, D-Ill., are challenging the status quo in cybersecurity policy.</p>
<p>“To secure our nation’s infrastructure, we must prioritize that federal agencies are adhering to the best cybersecurity practices,” Underwood, the new chair of the Committee on Homeland Security’s subcommittee on cybersecurity, infrastructure protection and innovation said in a press release of the bill’s introduction. “I’m pleased to join Senator Wyden to introduce this timely legislation.” </p>
<p>The generally accepted theory in U.S. cybersecurity policy centers on risk management and the idea that because there are limited resources and variations in system designs and functions, each entity must decide for itself where and how to focus its protection efforts. </p>
<p>The National Institute of Standards and Technology’s 2013 cybersecurity framework is at the heart of this. It references a host of security controls,&#8230;</p>
</div>
<p><a href="https://www.nextgov.com/cybersecurity/2020/11/agency-cybersecurity-waivers-would-face-new-time-limits-oversight-under-new-bill/170234/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber crime – it’s on the rise</title>
		<link>https://risk-academy.ru/cyber-crime-its-on-the-rise/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 22:33:26 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Harassment]]></category>
		<category><![CDATA[online sites]]></category>
		<category><![CDATA[airline routes]]></category>
		<category><![CDATA[Hacker groups]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cyber-crime-its-on-the-rise/</guid>

					<description><![CDATA[Afraid of being hacked or cyber-compromised in some other way? If you want to be very afraid, take a look at the online sites that track the daily flows of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="span-91-199">
<p>Afraid of being hacked or cyber-compromised<br />
in some other way?</p>
<p>If you want to be <em>very</em> afraid, take a look at the online sites that track the daily<br />
flows of global cyber attacks in real time (similar to a real-time map of<br />
global airline routes in the good old days when planes actually flew).</p>
<p>For example, threatmap.checkpoint.com<br />
currently logs around 30 million attempted attacks a day, with the country<br />
locations of the offending and receiving parties changing dynamically from<br />
minute to minute.</p>
<p>Usually, the good guys thwart the attacks.<br />
But when the ‘black hats’ win over the ‘white hats’ in the constant game of<br />
cat-and-mouse, chaos abounds.</p>
<p>The attacks highlight the importance of<br />
constant vigilance on the part of government and companies, as well as<br />
individuals who remarkably are still vulnerable to the entreaties of<br />
disenfranchised Nigerian princesses.</p>
<p>With this week being Australian Cyber Week, what<br />
better time to enforce the message?</p>
<p>The silver lining to the dark threats is that<br />
cyber crime prevention has become a billion dollar industry – and a thriving<br />
ASX sector covering high-level encryption work for sensitive government bodies<br />
to blocking&#8230;</p>
</div>
<p><a href="https://switzer.com.au/the-experts/tim-boreham/cyber-crime-its-on-the-rise/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US issues fifth Space Policy Directive on space cybersecurity</title>
		<link>https://risk-academy.ru/us-issues-fifth-space-policy-directive-on-space-cybersecurity/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 08 Sep 2020 07:26:20 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[President]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[WASHINGTON]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[White House]]></category>
		<category><![CDATA[Space systems]]></category>
		<category><![CDATA[Washington, DC]]></category>
		<category><![CDATA[United States Government]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/us-issues-fifth-space-policy-directive-on-space-cybersecurity/</guid>

					<description><![CDATA[Photo: Washington.org Washington, DC, 7 September 2020. – The White House has issued last week its fifth Space Policy Directive (SPD 5) outlining cybersecurity principles of space systems and operations. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<figure id="attachment_25889" aria-describedby="caption-attachment-25889" style="width: 300px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" title="United States" class="lazy lazy-hidden size-medium wp-image-25889" data-lazy-type="image" src="https://spacewatch.global/wp-content/uploads/2020/09/the-white-house-north-lawn-plus-fountain-and-flowers-credit-stephen-melkisethian_flickr-user-stephenmelkisethian-300x225.jpg" alt="United States" width="300" height="225" srcset="" sizes="(max-width: 300px) 100vw, 300px"/><noscript><img decoding="async" title="Computer security" class="size-medium wp-image-25889" src="https://spacewatch.global/wp-content/uploads/2020/09/the-white-house-north-lawn-plus-fountain-and-flowers-credit-stephen-melkisethian_flickr-user-stephenmelkisethian-300x225.jpg" alt="Computer security" width="300" height="225" srcset="https://spacewatch.global/wp-content/uploads/2020/09/the-white-house-north-lawn-plus-fountain-and-flowers-credit-stephen-melkisethian_flickr-user-stephenmelkisethian-300x225.jpg 300w, https://spacewatch.global/wp-content/uploads/2020/09/the-white-house-north-lawn-plus-fountain-and-flowers-credit-stephen-melkisethian_flickr-user-stephenmelkisethian-768x576.jpg 768w, https://spacewatch.global/wp-content/uploads/2020/09/the-white-house-north-lawn-plus-fountain-and-flowers-credit-stephen-melkisethian_flickr-user-stephenmelkisethian.jpg 780w" sizes="(max-width: 300px) 100vw, 300px"/></noscript><figcaption id="caption-attachment-25889" class="wp-caption-text">Photo: Washington.org</figcaption></figure>
<p><em>Washington, DC, 7 September 2020.</em> – The White House has issued last week its fifth Space Policy Directive (SPD 5) outlining cybersecurity principles of space systems and operations.</p>
<p>The memorandum signed by US President Donald Trump sets forth key cybersecurity principles for space systems and intends to serve as “the foundation for the United States Government approach to the cyber protection of space systems” by defining best practices, improving cybersecurity behaviors and fostering cooperation between agencies, the commercial space industry and other non-government space operators.</p>
<p>The principles outline the use of “risk-based, cybersecurity-informed engineering” in the development and operation of space systems and supporting infrastructures and the development and implementation of cybersecurity plans incorporating</p>
<ul>
<li>the protection against unauthorized access to critical space vehicle functions through appropriate authentication or encryption measures;</li>
<li>the physical protection measures for space facilities;</li>
<li>the protection “against communications jamming and spoofing, such as signal strength monitoring programs, secured transmitters and&#8230;</li>
</ul>
</div>
<p><a href="https://spacewatch.global/2020/09/us-issues-fifth-space-policy-directive-on-space-cybersecurity/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Advisory Services Industry Report 2020-2025 with Profiles of PWC, EY, Deloitte, KPMG, Kudelski Security and More</title>
		<link>https://risk-academy.ru/security-advisory-services-industry-report-2020-2025-with-profiles-of-pwc-ey-deloitte-kpmg-kudelski-security-and-more/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 23:10:40 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[kpmg]]></category>
		<category><![CDATA[technology industry]]></category>
		<category><![CDATA[BFSI]]></category>
		<category><![CDATA[cybersecurity solutions]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Dublin]]></category>
		<category><![CDATA[ResearchAndMarkets.com]]></category>
		<category><![CDATA[data encryption]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[deloitte]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/security-advisory-services-industry-report-2020-2025-with-profiles-of-pwc-ey-deloitte-kpmg-kudelski-security-and-more/</guid>

					<description><![CDATA[DUBLIN, Sept. 4, 2020 /PRNewswire/ &#8212; The &#8220;Global Security Advisory Services Market &#8211; Forecasts from 2020 to 2025&#8221; report has been added to ResearchAndMarkets.com&#8217;s offering. The global security advisory services [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span class="xn-location">DUBLIN</span>, <span class="xn-chron">Sept. 4, 2020</span> /PRNewswire/ &#8212; The &#8220;Global Security Advisory Services Market &#8211; Forecasts from 2020 to 2025&#8221; report has been added to <b>ResearchAndMarkets.com&#8217;s</b> offering. </p>
<p>The global security advisory services market is projected to grow at a CAGR of 21.33% to reach <span class="xn-money">US$29.167 billion</span> by 2025 from <span class="xn-money">US$9.143 billion</span> in 2019.</p>
<p>There is an increase in the adoption of information communication, and technology, data encryption, and cybersecurity solutions by different end-user industries. These industries include BFSI, communication and technology, automobile among others and they are doing this to achieve scalability, protect identities and transactions, reduce operational costs, decrease uptime and encrypt the sensitive data generated and protection of the digital signatures in order to prevent data breaches is increasing the demand for effective encryption solutions. These factors are thereby leading to a surge in the demand for such solutions and bolstering the market growth over the forecast period.</p>
<p>The communications and technology industry to hold a considerable share over the forecast period. This is attributed to the increasing penetration of internet the rising&#8230;</p>
</div>
<p><a href="https://www.prnewswire.com/news-releases/security-advisory-services-industry-report-2020-2025-with-profiles-of-pwc-ey-deloitte-kpmg-kudelski-security-and-more-301124548.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft previews Double Key Encryption to protect sensitive data, IT News, ET CIO</title>
		<link>https://risk-academy.ru/microsoft-previews-double-key-encryption-to-protect-sensitive-data-it-news-et-cio/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 25 Jul 2020 08:12:24 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[previews Double Key Encryption]]></category>
		<category><![CDATA[Double Key Encryption]]></category>
		<category><![CDATA[on-premises key management server]]></category>
		<category><![CDATA[Director, Microsoft]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/microsoft-previews-double-key-encryption-to-protect-sensitive-data-it-news-et-cio/</guid>

					<description><![CDATA[New Delhi: In a bid to further secure customer data and address regulatory needs for some organisations, Microsoft has announced Double Key Encryption for Microsoft 365 which allows to protect [&#8230;]]]></description>
										<content:encoded><![CDATA[<div><img decoding="async" title="Computer security" class="unveil" style="width:350px;float:left;margin-right:10px;margin-bottom:5px;" src="https://etimg.etb2bimg.com/photo/77162037.cms" captionrendered="1" alt="Microsoft previews Double Key Encryption to protect sensitive data"/>New Delhi: In a bid to further secure customer data and address regulatory needs for some organisations, Microsoft has announced Double Key Encryption for Microsoft 365 which allows to protect most confidential data while maintaining full control of your encryption key.</p>
<p>In Public preview, Double Key Encryption for Microsoft 365 uses two keys to protect your data, with one key in your control and the second in Microsoft&#8217;s control. </p>
<p>&#8220;To view the data, one must have access to both keys. Since Microsoft can access only one key, your data and key are unavailable to Microsoft, helping to ensure the privacy and security of your data,&#8221; said Alym Rayani Senior Director, Microsoft 365.</p>
<p>Regulations, particularly in the financial services sector, often contain specialized requirements for certain data, which specifies that an organisation must control their encryption key. </p>
<p>Double Key Encryption will help enterprises protect their mission-critical data &#8211; a small volume of their overall data.</p>
<p>The customers can host the Double Key Encryption service in a location of their choice (on-premises key management server or in the cloud). </p>
<p>Double Key Encryption puts them in control by providing the&#8230;</p>
</div>
<p><a href="https://cio.economictimes.indiatimes.com/news/digital-security/microsoft-previews-double-key-encryption-to-protect-sensitive-data/77162298">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud Misconfigurations a Major Compliance Risk, Say IT Decision Makers</title>
		<link>https://risk-academy.ru/cloud-misconfigurations-a-major-compliance-risk-say-it-decision-makers/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 16:02:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[public internet]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[Cloud infrastructure]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cloud-misconfigurations-a-major-compliance-risk-say-it-decision-makers/</guid>

					<description><![CDATA[Cloud misconfigurations are considered a data security risk by 95% of IT decision makers in the UK, according to a new study from Trend Micro. The findings highlight how human [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="layout-" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>Cloud misconfigurations are considered a data security risk by 95% of IT decision makers in the UK, according to a new study from Trend Micro. The findings highlight how human error is a major cause of organizations’ compliance problems and is obstructing their digital transformation.</p>
<p>Of those who regard cloud misconfiguration as a risk, 41% said it is a “great risk.” For those working in B2C, this rose to 57%, and in administrative or technical roles, 52%.</p>
<p>Nearly two-thirds (62%) of IT decision makers said they are extremely or very concerned about the legal and regulatory compliance implications of cloud threats like misconfiguration, and 27% stated they had experienced such an incident over the past year.</p>
<p>The most common forms of misconfiguration errors include leaving an unencrypted data store exposed to the public internet without any form of authentication required to access it, exposing data to all global users of the same cloud platform and leaving encryption keys and passwords in open repositories.</p>
<p>This provides cyber-criminals with opportunities to undertake nefarious activities such as stealing and ransoming data and installing malicious digital skimming&#8230;</p>
</div>
<p><a href="https://www.infosecurity-magazine.com/news/cloud-misconfigurations-compliance/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Artificial Intelligence (AI) in Cybersecurity Market Worth $46.3 billion by 2027- Exclusive Report Covering Pre and Post COVID-19 Market Estimates by Meticulous Research®</title>
		<link>https://risk-academy.ru/artificial-intelligence-ai-in-cybersecurity-market-worth-46-3-billion-by-2027-exclusive-report-covering-pre-and-post-covid-19-market-estimates-by-meticulous-research/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 19 Jun 2020 18:54:46 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[London]]></category>
		<category><![CDATA[cybersecurity solutions]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[www.meticulousresearch.com/download-sample-report/cp id=5101]]></category>
		<category><![CDATA[disruptive digital technologies]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[AI technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/artificial-intelligence-ai-in-cybersecurity-market-worth-46-3-billion-by-2027-exclusive-report-covering-pre-and-post-covid-19-market-estimates-by-meticulous-research/</guid>

					<description><![CDATA[London, June 19, 2020 (GLOBE NEWSWIRE) &#8212; According to new market research report titled, “Artificial Intelligence (AI) in Cybersecurity Market by Technology (ML, NLP), Security (Endpoint, Cloud, Network), Application (DLP, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p align="justify">London, June 19, 2020 (GLOBE NEWSWIRE) &#8212; According to new market research report titled, <strong>“<u>Artificial Intelligence (AI) </u><u>in Cybersecurity Market</u></strong><strong> by Technology (ML, NLP), Security (Endpoint, Cloud, Network), Application (DLP, UTM, Encryption, IAM, Antivirus, IDP), Industry (Retail, Government, Automotive, BFSI, IT, Healthcare, Education), Geography– Global Forecast to 202</strong><strong>7</strong><strong>”. </strong>The artificial intelligence in cybersecurity market is expected to grow at a CAGR of 23.6% from 2020 to 2027 to reach $46.3 billion by 2027.</p>
<p align="justify"><strong>Download Free Sample Report Now @ </strong><u>https://www.meticulousresearch.com/download-sample-report/cp_id=5101</u></p>
<p align="justify">Artificial intelligence in cybersecurity can simply be defined as the incorporation of AI technology to simplify complex processes of cybersecurity to make the system more reliable, secure, and independent. Emergence of disruptive digital technologies across different industry verticals, increasing demand for advanced cybersecurity solutions &amp; privacy, increase in frequency &amp; complexity of cyber threats, and consistent technological developments are the key factors driving the growth of the artificial intelligence in cybersecurity market. Moreover, the&#8230;</p>
</div>
<p><a href="https://www.globenewswire.com/news-release/2020/06/19/2050757/0/en/Artificial-Intelligence-AI-in-Cybersecurity-Market-Worth-46-3-billion-by-2027-Exclusive-Report-Covering-Pre-and-Post-COVID-19-Market-Estimates-by-Meticulous-Research.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
