<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Resources</title>
    <link>https://470387.hs-sites.com/resources</link>
    <description>Resources</description>
    <language>en</language>
    <pubDate>Wed, 25 Feb 2026 01:40:55 GMT</pubDate>
    <dc:date>2026-02-25T01:40:55Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Secure Remote Access for OT and ICS: Insights from the Experts</title>
      <link>https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts-1</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts-1" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Secure Remote Access for OT and ICS: Insights from the Experts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts-1" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Secure Remote Access for OT and ICS: Insights from the Experts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2F470387.hs-sites.com%2Fresources%2Fsecure-remote-access-for-ot-and-ics-insights-from-the-experts-1&amp;amp;bu=https%253A%252F%252F470387.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>UKM</category>
      <category>PCI DSS</category>
      <category>Events &amp; Webinars</category>
      <pubDate>Tue, 10 Feb 2026 09:30:36 GMT</pubDate>
      <guid>https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts-1</guid>
      <dc:date>2026-02-10T09:30:36Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Cybersecurity Trends in 2026</title>
      <link>https://470387.hs-sites.com/resources/cybersecurity-trends-in-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/cybersecurity-trends-in-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Cybersecurity Trends in 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/cybersecurity-trends-in-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Cybersecurity Trends in 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2F470387.hs-sites.com%2Fresources%2Fcybersecurity-trends-in-2026&amp;amp;bu=https%253A%252F%252F470387.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>compliance</category>
      <category>Press Release</category>
      <pubDate>Tue, 10 Feb 2026 09:26:05 GMT</pubDate>
      <guid>https://470387.hs-sites.com/resources/cybersecurity-trends-in-2026</guid>
      <dc:date>2026-02-10T09:26:05Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity</title>
      <link>https://470387.hs-sites.com/resources/ssh-and-leonardo-a-strategic-partnership-for-trusted-european-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/ssh-and-leonardo-a-strategic-partnership-for-trusted-european-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/ssh-and-leonardo-a-strategic-partnership-for-trusted-european-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2F470387.hs-sites.com%2Fresources%2Fssh-and-leonardo-a-strategic-partnership-for-trusted-european-cybersecurity&amp;amp;bu=https%253A%252F%252F470387.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <pubDate>Tue, 10 Feb 2026 09:23:42 GMT</pubDate>
      <guid>https://470387.hs-sites.com/resources/ssh-and-leonardo-a-strategic-partnership-for-trusted-european-cybersecurity</guid>
      <dc:date>2026-02-10T09:23:42Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Secure Remote Access for OT and ICS: Insights from the Experts</title>
      <link>https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Secure Remote Access for OT and ICS: Insights from the Experts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Secure Remote Access for OT and ICS: Insights from the Experts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2F470387.hs-sites.com%2Fresources%2Fsecure-remote-access-for-ot-and-ics-insights-from-the-experts&amp;amp;bu=https%253A%252F%252F470387.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>CryptoAuditor</category>
      <category>IAM</category>
      <pubDate>Tue, 10 Feb 2026 03:06:45 GMT</pubDate>
      <guid>https://470387.hs-sites.com/resources/secure-remote-access-for-ot-and-ics-insights-from-the-experts</guid>
      <dc:date>2026-02-10T03:06:45Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Resource Post Template [S2][DO NOT DELETE]</title>
      <link>https://470387.hs-sites.com/resources/s2-resource-post-template</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/s2-resource-post-template" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Resource Post Template [S2][DO NOT DELETE]" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://470387.hs-sites.com/resources/s2-resource-post-template" title="" class="hs-featured-image-link"&gt; &lt;img src="https://470387.hs-sites.com/hubfs/S2%20assets/images/placeholder-1.jpg" alt="Resource Post Template [S2][DO NOT DELETE]" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2F470387.hs-sites.com%2Fresources%2Fs2-resource-post-template&amp;amp;bu=https%253A%252F%252F470387.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>CryptoAuditor</category>
      <category>AWS</category>
      <category>3rd party access</category>
      <category>AES</category>
      <pubDate>Tue, 10 Feb 2026 02:54:04 GMT</pubDate>
      <guid>https://470387.hs-sites.com/resources/s2-resource-post-template</guid>
      <dc:date>2026-02-10T02:54:04Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
  </channel>
</rss>
