<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
	<channel>
		<title><![CDATA[Secure.com Blog]]></title>
		<description><![CDATA[Practical guides, deep dives, and honest takes on security operations, threat detection, and incident response.]]></description>
		<link>https://www.secure.com/blog</link>
		<atom:link href="https://www.secure.com/blog/feed.xml" rel="self" type="application/rss+xml" />
		<language>en-US</language>
		<lastBuildDate>Tue, 12 May 2026 14:37:43 +0000</lastBuildDate>
		<item>
			<title><![CDATA[You Can&#8217;t Govern What You Can&#8217;t Package: The Case for an AI Agent Capability Standard]]></title>
			<description><![CDATA[AI agents are being deployed into production without any way to version, audit, or revoke what they do and that's a governance crisis waiting to happen.]]></description>
			<link>https://www.secure.com/blog/risk-and-governance/ai-agent-governance/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/risk-and-governance/ai-agent-governance/</guid>
			<pubDate>Tue, 12 May 2026 14:22:55 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[How to Prevent Cloud Misconfiguration Before It Costs You a Breach]]></title>
			<description><![CDATA[Cloud misconfigurations cause most breaches — not sophisticated attacks. Here is how to stop them before they become headlines.]]></description>
			<link>https://www.secure.com/blog/infrastructure-security/how-to-prevent-cloud-misconfiguration/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/infrastructure-security/how-to-prevent-cloud-misconfiguration/</guid>
			<pubDate>Tue, 12 May 2026 11:37:15 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[How to Implement Effective AppSec Security Gates in CI/CD Pipelines]]></title>
			<description><![CDATA[A practical guide to building AppSec security gates that block real risk, route findings to the right owners, and keep releases moving.]]></description>
			<link>https://www.secure.com/blog/appsec/appsec-security-gates-cicd-pipelines/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/appsec/appsec-security-gates-cicd-pipelines/</guid>
			<pubDate>Tue, 12 May 2026 06:13:58 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[Why Agentless Scanning is Needed for Cloud Security]]></title>
			<description><![CDATA[Agents slow you down in the cloud — agentless scanning gives you full coverage without installing a single piece of software.]]></description>
			<link>https://www.secure.com/blog/infrastructure-security/why-agentless-scanning-is-needed-for-cloud-security/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/infrastructure-security/why-agentless-scanning-is-needed-for-cloud-security/</guid>
			<pubDate>Mon, 11 May 2026 18:23:34 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[What Continuous Compliance Really Requires]]></title>
			<description><![CDATA[Continuous compliance is not a once-a-year audit. It is a daily operating standard that most teams are not built for yet.]]></description>
			<link>https://www.secure.com/blog/compliance/continuous-compliance-requirements/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/compliance/continuous-compliance-requirements/</guid>
			<pubDate>Mon, 11 May 2026 15:04:42 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[Forget the 45%. The Number That Matters Is Eight.]]></title>
			<description><![CDATA[The model writes code that works. Your scanner says it's clean. Your customer data is already exposed.]]></description>
			<link>https://www.secure.com/blog/appsec/vibe-coding-security-risks/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/appsec/vibe-coding-security-risks/</guid>
			<pubDate>Mon, 11 May 2026 13:56:21 +0000</pubDate>
		</item>
		<item>
			<title><![CDATA[Continuous  Automated Evidence Collection Workflow for Security Teams]]></title>
			<description><![CDATA[Learn how automated evidence collection keeps your security team compliant, audit-ready, and in control — 24/7.]]></description>
			<link>https://www.secure.com/blog/compliance/automated-evidence-collection/</link>
			<guid isPermaLink="false">https://www.secure.com/blog/compliance/automated-evidence-collection/</guid>
			<pubDate>Mon, 11 May 2026 10:00:09 +0000</pubDate>
		</item>
	</channel>
</rss>
