<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 12:19 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Apr 2026 23:34:48 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/google-appsheet-abused-to-compromise-30000-facebook-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-appsheet-abused-to-compromise-30000-facebook-accounts/]]></link>
			<title>Google AppSheet abused to compromise 30,000 Facebook accounts</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 23:34:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-vulnerability-exposes-servers-to-takeover/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-vulnerability-exposes-servers-to-takeover/]]></link>
			<title>cPanel Vulnerability Exposes Servers to Takeover </title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 22:34:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/state-cisos-losing-confidence-in-ability-to-manage-cyber-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/state-cisos-losing-confidence-in-ability-to-manage-cyber-risks/]]></link>
			<title>State CISOs losing confidence in ability to manage cyber risks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 21:32:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-bolsters-security-ai-support-in-latest-sd-wan-release/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-bolsters-security-ai-support-in-latest-sd-wan-release/]]></link>
			<title>Cisco bolsters security, AI support in latest SD-WAN release</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 21:04:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hutt-city-council-phishing-attack-exposes-700-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hutt-city-council-phishing-attack-exposes-700-users/]]></link>
			<title>Hutt City Council Phishing Attack Exposes 700+ Users</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 20:31:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-era-of-chatbot-aiops-is-fading-as-agentic-ai-gains-traction/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-era-of-chatbot-aiops-is-fading-as-agentic-ai-gains-traction/]]></link>
			<title>The era of chatbot AIOps is fading as agentic AI gains traction</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 20:04:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/auvik-bets-agentic-ai-can-fill-the-networking-skills-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/auvik-bets-agentic-ai-can-fill-the-networking-skills-gap/]]></link>
			<title>Auvik bets agentic AI can fill the networking skills gap</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 18:00:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-removes-adguards-trusttunnel-ios-app-from-russian-app-store/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-removes-adguards-trusttunnel-ios-app-from-russian-app-store/]]></link>
			<title>Apple removes AdGuard’s TrustTunnel iOS app from Russian App Store</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:27:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack/]]></link>
			<title>SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:18:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clickup-data-leak-exposes-enterprise-emails-for-over-a-year/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clickup-data-leak-exposes-enterprise-emails-for-over-a-year/]]></link>
			<title>ClickUp Data Leak Exposes Enterprise Emails for Over a Year </title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:27:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-will-be-behind-on-ai-until-it-isnt-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-will-be-behind-on-ai-until-it-isnt-computerworld/]]></link>
			<title>Apple will be behind on AI — until it isn’t – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:58:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog/]]></link>
			<title>CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:26:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats/]]></link>
			<title>New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:15:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iocta-2026-report-warns-of-ai-driven-cybercrime/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iocta-2026-report-warns-of-ai-driven-cybercrime/]]></link>
			<title>IOCTA 2026 Report Warns Of AI-Driven Cybercrime</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 14:25:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-attacks-target-executives-via-microsoft-teams/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-attacks-target-executives-via-microsoft-teams/]]></link>
			<title>Phishing Attacks Target Executives via Microsoft Teams</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 13:24:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-lawmakers-fail-to-agree-on-watered-down-ai-act-talks-pushed-to-may-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-lawmakers-fail-to-agree-on-watered-down-ai-act-talks-pushed-to-may-computerworld/]]></link>
			<title>EU lawmakers fail to agree on watered-down AI Act, talks pushed to May – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 12:55:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/6-best-intrusion-detection-prevention-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/6-best-intrusion-detection-prevention-systems/]]></link>
			<title>6 Best Intrusion Detection &#038; Prevention Systems</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately/]]></link>
			<title>Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:05:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-reminders-reinvented-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-reminders-reinvented-computerworld/]]></link>
			<title>Android reminders, reinvented – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:53:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cert-in-warns-msmes-of-rising-ai-cyberattack-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cert-in-warns-msmes-of-rising-ai-cyberattack-risks/]]></link>
			<title>CERT-In Warns MSMEs Of Rising AI Cyberattack Risks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:20:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/]]></link>
			<title>CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whos-the-better-ceo-apples-tim-cook-or-microsofts-satya-nadella-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whos-the-better-ceo-apples-tim-cook-or-microsofts-satya-nadella-computerworld/]]></link>
			<title>Who’s the better CEO, Apple’s Tim Cook or Microsoft’s Satya Nadella? – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 07:24:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/]]></link>
			<title>LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 05:44:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/best-ai-deepfake-and-scam-detection-tools-for-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/best-ai-deepfake-and-scam-detection-tools-for-security/]]></link>
			<title>Best AI Deepfake and Scam Detection Tools for Security</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 05:15:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clickup-disclosed-feature-flag-misconfiguration-exposed-893-email-addresses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clickup-disclosed-feature-flag-misconfiguration-exposed-893-email-addresses/]]></link>
			<title>ClickUp Disclosed Feature Flag Misconfiguration Exposed 893 Email Addresses</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 04:13:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/aws-unveils-trio-of-key-ai-strategy-announcements/]]></guid>
			<link><![CDATA[https://fxtechnology.org/aws-unveils-trio-of-key-ai-strategy-announcements/]]></link>
			<title>AWS unveils trio of key AI strategy announcements</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 02:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sas-makes-ai-governance-the-centerpiece-of-its-agent-strategy-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sas-makes-ai-governance-the-centerpiece-of-its-agent-strategy-computerworld/]]></link>
			<title>SAS makes AI governance the centerpiece of its agent strategy – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 01:46:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signal-to-roll-out-anti-phishing-safeguards-following-account-takeovers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signal-to-roll-out-anti-phishing-safeguards-following-account-takeovers/]]></link>
			<title>Signal to roll out anti-phishing safeguards following account takeovers</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 01:09:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/7-best-network-security-tools-to-use/]]></guid>
			<link><![CDATA[https://fxtechnology.org/7-best-network-security-tools-to-use/]]></link>
			<title>7 Best Network Security Tools to Use</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 00:08:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-korea-linked-actor-targets-web3-execs-in-social-engineering-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-korea-linked-actor-targets-web3-execs-in-social-engineering-campaign/]]></link>
			<title>North Korea-linked actor targets Web3 execs in social-engineering campaign</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 23:07:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/no-impact-on-operations-or-safety/]]></guid>
			<link><![CDATA[https://fxtechnology.org/no-impact-on-operations-or-safety/]]></link>
			<title>No Impact On Operations Or Safety</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 22:07:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/can-apples-new-ceo-turn-things-around-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/can-apples-new-ceo-turn-things-around-computerworld/]]></link>
			<title>Can Apple’s new CEO turn things around? – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:12:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pitney-bowes-confirms-salesforce-breach-after-hacker-leaks-25-million-records/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pitney-bowes-confirms-salesforce-breach-after-hacker-leaks-25-million-records/]]></link>
			<title>Pitney Bowes confirms Salesforce breach after hacker leaks 25 million records</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 19:03:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign/]]></link>
			<title>Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:53:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push/]]></link>
			<title>Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:48:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enterprises-need-to-think-beyond-gpus-for-agentic-ai-analysts-say-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enterprises-need-to-think-beyond-gpus-for-agentic-ai-analysts-say-computerworld/]]></link>
			<title>Enterprises need to think beyond GPUs for agentic AI, analysts say – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:37:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fleet-hopes-to-be-the-mdm-provider-for-the-ai-era-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fleet-hopes-to-be-the-mdm-provider-for-the-ai-era-computerworld/]]></link>
			<title>Fleet hopes to be the MDM provider for the AI Era – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:11:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/7-best-penetration-testing-tools-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/7-best-penetration-testing-tools-software/]]></link>
			<title>7 Best Penetration Testing Tools &#038; Software</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 18:02:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fundamental-tension-undermines-manufacturers-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fundamental-tension-undermines-manufacturers-cybersecurity/]]></link>
			<title>‘Fundamental tension’ undermines manufacturers’ cybersecurity</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 17:01:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybersecurity-incident-at-shanghai-tunnel-engineering-co/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybersecurity-incident-at-shanghai-tunnel-engineering-co/]]></link>
			<title>Cybersecurity Incident At Shanghai Tunnel Engineering Co</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 16:00:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/infected-cisco-firewalls-need-cold-start-to-clear-persistent-firestarter-backdoor/]]></guid>
			<link><![CDATA[https://fxtechnology.org/infected-cisco-firewalls-need-cold-start-to-clear-persistent-firestarter-backdoor/]]></link>
			<title>Infected Cisco firewalls need cold start to clear persistent Firestarter backdoor</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 15:23:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-17-heads-up-this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-17-heads-up-this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></link>
			<title>CyberheistNews Vol 16 #17 [Heads Up] This Sophisticated Scam Should Be a Warning to All Companies</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:59:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/]]></link>
			<title>VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:49:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-collaboration-technology-defines-the-next-phase-of-hybrid-work-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-collaboration-technology-defines-the-next-phase-of-hybrid-work-computerworld/]]></link>
			<title>How collaboration technology defines the next phase of hybrid work – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:31:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-data-flows-force-rethink-of-data-center-networking-at-backblaze/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-data-flows-force-rethink-of-data-center-networking-at-backblaze/]]></link>
			<title>AI data flows force rethink of data center networking at Backblaze</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:22:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-smart-meeting-rooms-are-becoming-strategic-it-assets-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-smart-meeting-rooms-are-becoming-strategic-it-assets-computerworld/]]></link>
			<title>Why smart meeting rooms are becoming strategic IT assets  – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:05:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-the-meeting-room-has-become-the-true-test-of-hybrid-work-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-the-meeting-room-has-become-the-true-test-of-hybrid-work-computerworld/]]></link>
			<title>Why the meeting room has become the true test of hybrid work – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 13:30:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/can-everyday-it-decisions-turn-sustainability-from-intent-into-impact-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/can-everyday-it-decisions-turn-sustainability-from-intent-into-impact-computerworld/]]></link>
			<title>Can everyday IT decisions turn sustainability from intent into impact? – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 13:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-security-matters-in-the-meeting-room-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-security-matters-in-the-meeting-room-computerworld/]]></link>
			<title>Why security matters in the meeting room – Computerworld</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 12:29:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/]]></link>
			<title>Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 12:25:54 +0000]]></pubDate>
		</item>
				</channel>
</rss>
