<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://stateofsecurity.com/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>MSI :: State of Security</title>
		<atom:link href="https://stateofsecurity.com/feed/podcast/msi-state-of-security/" rel="self" type="application/rss+xml"/>
		<link>https://stateofsecurity.com/series/msi-state-of-security/</link>
		<description>Insight from the Information Security Experts</description>
		<lastBuildDate>Mon, 06 Apr 2026 18:07:57 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>© 2019 MSI :: State of Security</copyright>
		<itunes:subtitle>Insight from the Information Security Experts</itunes:subtitle>
		<itunes:author>MSI :: State of Security</itunes:author>
		<itunes:summary>Insight from the Information Security Experts</itunes:summary>
		<itunes:owner>
			<itunes:name>MSI :: State of Security</itunes:name>
			<itunes:email>info@microsolved.com</itunes:email>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:category text="Technology">
			<itunes:category text="Tech News"></itunes:category>
		</itunes:category>
		<itunes:category text="Business">
									<itunes:category text="Business News"></itunes:category>
							</itunes:category>
		<googleplay:author><![CDATA[MSI :: State of Security]]></googleplay:author>
			<googleplay:email>info@microsolved.com</googleplay:email>			<googleplay:description>Insight from the Information Security Experts</googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<podcast:locked owner="info@microsolved.com">yes</podcast:locked>
		<podcast:guid>8b100339-a1b4-5e75-bbd0-b9ad71ad3819</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.13.0" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.6.5</generator>

<item>
	<title>Micro Podcast – Business E-mail Compromise – “Protect”</title>
	<link>https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-protect/</link>
	<pubDate>Mon, 11 Mar 2019 19:50:44 +0000</pubDate>
	<dc:creator><![CDATA[MSI :: State of Security]]></dc:creator>
	<guid isPermaLink="false">https://stateofsecurity.com/?post_type=podcast&#038;p=5052</guid>
	<description><![CDATA[In this episode of the MSI podcast, we continue our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The second step is to “Protect”. <a href="https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-protect/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
	<itunes:subtitle><![CDATA[In this episode of the MSI podcast, we continue our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. T]]></itunes:subtitle>
	<content:encoded><![CDATA[In this episode of the MSI podcast, we continue our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The second step is to “Protect”. <a href="https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-protect/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></content:encoded>
	<enclosure url="https://s3.amazonaws.com/MSIMedia/MSIMicro_005_BEC_Protect.mp3" length="5892365" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode of the MSI podcast, we continue our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The second step is to “Protect”. Continue reading &#8594;]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[MSI :: State of Security]]></itunes:author>	<googleplay:description><![CDATA[In this episode of the MSI podcast, we continue our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The second step is to “Protect”. Continue reading &#8594;]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Micro Podcast – Business E-mail Compromise &#8211; &#8220;Identify&#8221;</title>
	<link>https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-identify/</link>
	<pubDate>Mon, 11 Mar 2019 19:21:58 +0000</pubDate>
	<dc:creator><![CDATA[MSI :: State of Security]]></dc:creator>
	<guid isPermaLink="false">https://stateofsecurity.com/?post_type=podcast&#038;p=5051</guid>
	<description><![CDATA[In this episode of the MSI podcast, we begin our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The first step is to "Identify" the threat at hand. <a href="https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-identify/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
	<itunes:subtitle><![CDATA[In this episode of the MSI podcast, we begin our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The ]]></itunes:subtitle>
	<content:encoded><![CDATA[In this episode of the MSI podcast, we begin our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The first step is to "Identify" the threat at hand. <a href="https://stateofsecurity.com/podcast/micro-podcast-business-e-mail-compromise-identify/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></content:encoded>
	<enclosure url="https://s3.amazonaws.com/MSIMedia/MSIMicro_004_Identify.mp3" length="7010601" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode of the MSI podcast, we begin our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The first step is to "Identify" the threat at hand. Continue reading &#8594;]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[MSI :: State of Security]]></itunes:author>	<googleplay:description><![CDATA[In this episode of the MSI podcast, we begin our series on the business email compromise checklist. While BEC is a significant issue and a common form of compromise leading to fraud, there are several things you can do to combat this form of attack. The first step is to "Identify" the threat at hand. Continue reading &#8594;]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
