<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Data Security RSS Feed]]></title>
        <link>https://www.processexcellencenetwork.com/rss/categories/data-security</link>
        <description><![CDATA[ &lt;p&gt;Data security plays a crucial role in modern &lt;a href=&quot;https://www.processexcellencenetwork.com/what-is-process-excellence&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;process excellence&lt;/a&gt; and business transformation. As today&rsquo;s businesses adopt new technologies and become ever more data dependent, the ability to effectively protect information is high on the agenda.&lt;/p&gt;
&lt;p&gt;By ensuring that data is not only secure but also compliant with evolving data protection regulations, organizations can achieve greater success and innovation. Whether its investing in novel platforms, expanding &lt;a href=&quot;https://www.processexcellencenetwork.com/ai/articles/ai-operational-excellence&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;AI&lt;/a&gt; use cases, increasing analytics or applying new methodologies, businesses must balance opportunities with meeting data security challenges and requirements.&lt;/p&gt;
&lt;p&gt;Stay up to date with the latest expert insights, best practices and case studies on data security with PEX Network&rsquo;s resources.&lt;/p&gt; ]]></description>
        <language>en</language>
        <pubDate>Sun, 19 Apr 2026 22:14:36 +0000</pubDate>
        <atom:link href="https://www.processexcellencenetwork.com/rss/categories/data-security" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Information security strategy: How to build a system that actually works]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/articles/information-security-strategy-how-to-build-a-system-that-actually-works?utm_medium=RSS</link>
                <description><![CDATA[ A practical framework for creating an information security strategy that supports digital transformation ]]></description>
                <author><![CDATA[ alexcybersmith@gmail.com (Alex Vakulov) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/articles/information-security-strategy-how-to-build-a-system-that-actually-works?utm_medium=RSS</guid>
                <pubDate>Mon, 09 Mar 2026 17:14:04 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[FlowForma launches FlowAssure to boost vendor oversight with AI agents]]></title>
                <link>https://www.processexcellencenetwork.com/ai/news/flowforma-launches-flowassure-to-boost-vendor-oversight-with-ai-agents?utm_medium=RSS</link>
                <description><![CDATA[ Process automation firm FlowForma announced the launch of FlowAssure, a new solution designed to modernize and streamline vendor risk management with AI agents ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.processexcellencenetwork.com/ai/news/flowforma-launches-flowassure-to-boost-vendor-oversight-with-ai-agents?utm_medium=RSS</guid>
                <pubDate>Tue, 25 Nov 2025 13:52:04 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The importance of cybersecurity training for SAP users]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/articles/the-importance-of-cybersecurity-training-for-sap-users?utm_medium=RSS</link>
                <description><![CDATA[ The need for comprehensive cybersecurity training for SAP users has become a necessity ]]></description>
                <author><![CDATA[ betsey@bridgeviewmarketing.com (Joris van de Vis) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/articles/the-importance-of-cybersecurity-training-for-sap-users?utm_medium=RSS</guid>
                <pubDate>Mon, 29 Sep 2025 08:37:07 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Deutsche Telekom accelerates IT processes with AI-powered automation]]></title>
                <link>https://www.processexcellencenetwork.com/ai/news/deutsche-telekom-accelerates-it-processes-with-ai-powered-automation-2?utm_medium=RSS</link>
                <description><![CDATA[ Deutsche Telekom is accelerating its IT processes with AI-powered automation from IBM ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.processexcellencenetwork.com/ai/news/deutsche-telekom-accelerates-it-processes-with-ai-powered-automation-2?utm_medium=RSS</guid>
                <pubDate>Fri, 04 Jul 2025 07:34:59 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Kaizen in AppSec: Driving value through continuous improvement]]></title>
                <link>https://www.processexcellencenetwork.com/continuous-improvement/articles/kaizen-in-appsec-driving-value-through-continuous-improvement?utm_medium=RSS</link>
                <description><![CDATA[ How to apply Kaizen in AppSec and enhance your application security strategy through continuous improvement ]]></description>
                <author><![CDATA[ dag@codific.eu (Dr Dag Flachet) ]]></author>
                <guid>https://www.processexcellencenetwork.com/continuous-improvement/articles/kaizen-in-appsec-driving-value-through-continuous-improvement?utm_medium=RSS</guid>
                <pubDate>Wed, 02 Jul 2025 08:56:16 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[IBM delivers autonomous security operations with agentic AI]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/news/ibm-delivers-autonomous-security-operations-with-agentic-ai?utm_medium=RSS</link>
                <description><![CDATA[ Advanced AI features help transform cybersecurity operations, driving efficiency and precision in threat hunting, detection, investigation and response ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/news/ibm-delivers-autonomous-security-operations-with-agentic-ai?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Apr 2025 08:41:52 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[From data to decisions: Cultivating trust in organizational data]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/articles/data-decisions-trust-organizational-data?utm_medium=RSS</link>
                <description><![CDATA[ Building trust in data involves developing robust data management capabilities like data quality, data security and data governance ]]></description>
                <author><![CDATA[ asoni.mailbox@gmail.com (Abhishek Soni) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/articles/data-decisions-trust-organizational-data?utm_medium=RSS</guid>
                <pubDate>Thu, 19 Dec 2024 09:32:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Strengthening B2B processes with cloud security]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/articles/b2b-processes-cloud-security?utm_medium=RSS</link>
                <description><![CDATA[ As businesses adopt cloud technologies the need for robust security in B2B processes becomes increasingly urgent ]]></description>
                <author><![CDATA[ vnedunoori@gmail.com (Venkata Nedunoori) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/articles/b2b-processes-cloud-security?utm_medium=RSS</guid>
                <pubDate>Thu, 05 Dec 2024 08:29:51 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Green AppDev: Secure the code, save the planet]]></title>
                <link>https://www.processexcellencenetwork.com/data-security/articles/green-appdev-secure-code?utm_medium=RSS</link>
                <description><![CDATA[ To reduce carbon footprint while sustaining innovation, it’s pivotal to examine organizational strategies in your AppDev processes ]]></description>
                <author><![CDATA[ eldada@jfrog.com (Eldad Assis) ]]></author>
                <guid>https://www.processexcellencenetwork.com/data-security/articles/green-appdev-secure-code?utm_medium=RSS</guid>
                <pubDate>Thu, 28 Nov 2024 08:15:52 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[DORA on the horizon: How to forge operational resilience]]></title>
                <link>https://www.processexcellencenetwork.com/opex/articles/dora-operational-resilience?utm_medium=RSS</link>
                <description><![CDATA[ At the heart of DORA lies the imperative to enhance operational resilience, a concept that extends beyond mere technological considerations ]]></description>
                <author><![CDATA[ james.dodson@sabiogroup.com (James Dodson) ]]></author>
                <guid>https://www.processexcellencenetwork.com/opex/articles/dora-operational-resilience?utm_medium=RSS</guid>
                <pubDate>Wed, 28 Aug 2024 07:42:10 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[IBM &amp; Microsoft streamline security operations, Appian, Nintex &amp; more – PEX Vend...]]></title>
                <link>https://www.processexcellencenetwork.com/opex/articles/ibm-microsoft-appian-nintex?utm_medium=RSS</link>
                <description><![CDATA[ IBM and Microsoft collaborate to help clients simplify and modernize security operations and drive business growth ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.processexcellencenetwork.com/opex/articles/ibm-microsoft-appian-nintex?utm_medium=RSS</guid>
                <pubDate>Wed, 28 Aug 2024 07:41:06 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Keeping up with cyber security changes in operations]]></title>
                <link>https://www.processexcellencenetwork.com/opex/articles/keeping-up-with-cyber-security-changes?utm_medium=RSS</link>
                <description><![CDATA[ Bring risk management into your operational processes to avoid failing foul of compliance standards ]]></description>
                <author><![CDATA[ thomas.kolenbach@promapp.com (Thomas Kohlenbach) ]]></author>
                <guid>https://www.processexcellencenetwork.com/opex/articles/keeping-up-with-cyber-security-changes?utm_medium=RSS</guid>
                <pubDate>Wed, 28 Aug 2024 07:39:29 +0000</pubDate>
            </item>
            </channel>
</rss>