<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Strategy Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/cyber-security-strategy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-security-strategy/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 06 Apr 2026 09:30:34 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Cyber Security Strategy Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-security-strategy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Trivy Supply Chain Attack: Why We Must Re-evaluate the Value of Open Source</title>
		<link>https://www.vertexcybersecurity.com.au/the-trivy-supply-chain-attack-why-we-must-re-evaluate-the-value-of-open-source/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-trivy-supply-chain-attack-why-we-must-re-evaluate-the-value-of-open-source</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 00:40:16 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[CanisterWorm]]></category>
		<category><![CDATA[Cyber Security Strategy]]></category>
		<category><![CDATA[npm package vulnerability]]></category>
		<category><![CDATA[open source security]]></category>
		<category><![CDATA[Supply chain attack]]></category>
		<category><![CDATA[Trivy breach]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10469</guid>

					<description><![CDATA[The Trivy supply chain attack and CanisterWorm have compromised dozens of npm packages. Discover why the undervaluation of open source software poses a major risk to AI and global technology.]]></description>
		
		
		
			</item>
		<item>
		<title>Is Log Monitoring a Waste of Your Budget? The Case for Prevention Over Detection</title>
		<link>https://www.vertexcybersecurity.com.au/is-log-monitoring-a-waste-of-your-budget-the-case-for-prevention-over-detection/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-log-monitoring-a-waste-of-your-budget-the-case-for-prevention-over-detection</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 02 Dec 2025 00:40:51 +0000</pubDate>
				<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[Cost of Cyber Security]]></category>
		<category><![CDATA[Cyber Security Strategy]]></category>
		<category><![CDATA[Log Monitoring]]></category>
		<category><![CDATA[Prevention vs Detection]]></category>
		<category><![CDATA[Preventive Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9922</guid>

					<description><![CDATA[Buying a SOC before implementing basic security controls is like installing cameras in a house without doors. Discover why prevention is a better investment than detection.]]></description>
		
		
		
			</item>
	</channel>
</rss>
