<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-08T19:45:00+00:00</dc:date>

	
	<item>
		<title> New CSC Report Emphasizes Need for Holistic Domain Security Amid Surge in Popularity for AI (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20231024-new-csc-report-emphasizes-need-for-holistic-domain-security-amid-surge-in-popularity-for-ai</guid>
		<link>https://circleid.com/posts20231024-new-csc-report-emphasizes-need-for-holistic-domain-security-amid-surge-in-popularity-for-ai</link>
		<description><![CDATA[It seems that every day, a new artificial intelligence (AI) capability emerges, posing exciting possibilities for technological advancements -- but also great potential to equal or greater risks. Cybercriminals have taken notice of this rapid surge in the popularity of AI technologies and are attempting to take advantage. <a href="https://circleid.com/posts20231024-new-csc-report-emphasizes-need-for-holistic-domain-security-amid-surge-in-popularity-for-ai">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Securing Weak Links in Supply Chain Attacks (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20220513-securing-weak-links-in-supply-chain-attacks</guid>
		<link>https://circleid.com/posts20220513-securing-weak-links-in-supply-chain-attacks</link>
		<description><![CDATA[We've all heard the term, "you're only as strong as your weakest link." Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors -- be it the dairy farm supplying milk to the multinational food manufacturer or the payment systems that retailers use. These links form supply chains that every business, large and small, deals with. There is simply no way around it. <a href="https://circleid.com/posts20220513-securing-weak-links-in-supply-chain-attacks">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>