<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Rose Security]]></title><description><![CDATA[Zoë Rose]]></description><link>https://www.rosesec.com/blog</link><generator>RSS for Node</generator><lastBuildDate>Thu, 12 Mar 2026 14:56:37 GMT</lastBuildDate><atom:link href="https://www.rosesec.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hypershield: using AI to make vulnerabilities non-exploitable]]></title><description><![CDATA[Is the future of security allowing AI to make changes at the kernel level? How have eBPF and AI protect our environment?]]></description><link>https://www.rosesec.com/post/hypershield-using-ai-to-make-vulnerabilities-non-exploitable</link><guid isPermaLink="false">67af24262ad0a44a5cc15dad</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Tue, 18 Feb 2025 10:40:19 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_caf42b1177dc4e3bab87fe708c736a09~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[AI for All]]></title><description><![CDATA[Yesterday at #CiscoLiveEMEA I was a panelist speaking with  Rebecca Stone ,  Kimberly Moss , and  Jason Warfield  for the panel AI for...]]></description><link>https://www.rosesec.com/post/ai-for-all</link><guid isPermaLink="false">67ac9b60a654b25aca0814d3</guid><category><![CDATA[Diversity]]></category><pubDate>Wed, 12 Feb 2025 13:01:32 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_dd7eac35853745cfbe041ab3acb2e3b7~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[International Women’s Day 2024]]></title><description><![CDATA[The UN’s theme for International Women’s Day 2024 is “Invest in women: Accelerate progress” but what does that look like? For an...]]></description><link>https://www.rosesec.com/post/international-women-s-day-2024</link><guid isPermaLink="false">65eaf34f38d2eafee413f8be</guid><category><![CDATA[Diversity]]></category><category><![CDATA[Career Start]]></category><pubDate>Fri, 08 Mar 2024 11:22:07 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_d1f35103692c4d628feed0a0769cfcee~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Meraki Switching 17 - encapsulating 'Better Together' by providing context]]></title><description><![CDATA[Having worked in consulting for a number of years, a common issue I found across a variety of industries and organisations was...]]></description><link>https://www.rosesec.com/post/meraki-switching-17-encapsulating-better-together-by-providing-context</link><guid isPermaLink="false">65cf352f1bf1d62544eb8392</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Tue, 20 Feb 2024 08:00:21 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_54f891676a334e59bef8c7f5c3ecc80c~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Cisco Live EMEA and Tech Field Day extra embodies "Better Together"]]></title><description><![CDATA[As the title suggests, I spent last week as an attendee of Cisco Live EMEA and as a delegate of Tech Field Day extra. As someone who has...]]></description><link>https://www.rosesec.com/post/cisco-live-emea-and-tech-field-day-extra-embodies-better-together</link><guid isPermaLink="false">65cf3754650f51a7de4ca580</guid><category><![CDATA[InfoSec / Cyber]]></category><category><![CDATA[Diversity]]></category><pubDate>Fri, 16 Feb 2024 10:27:12 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_e94184ac06f44956b60163f265daa636~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Can emerging technologies create self-healing networks? ]]></title><description><![CDATA[When talking about Machine Learning (ML) and Artificial Intelligence (AI), it’s often forgotten to discuss the value of the data fed into...]]></description><link>https://www.rosesec.com/post/can-emerging-technologies-create-self-healing-networks</link><guid isPermaLink="false">64353a4f75e1e792e5521a0d</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Tue, 11 Apr 2023 10:56:16 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_99d4f738c7dd48138e9b7578a4077a61~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Ladies in the Imposter Network who are changing the industry]]></title><description><![CDATA[International Women’s Day is a lovely reminder to look at the hardworking ladies across the world, celebrate the challenges they have...]]></description><link>https://www.rosesec.com/post/ladies-in-the-imposter-network-who-are-changing-the-industry</link><guid isPermaLink="false">6407976916dc9c2bf6b9cab4</guid><category><![CDATA[Diversity]]></category><pubDate>Wed, 08 Mar 2023 07:32:58 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_fb83dddae0d64b779d5493ae801d6d82~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Are We All Imposters?]]></title><description><![CDATA[Taking a quick rewind to the first half of 2022, during another brilliant Security Field Day conference, Chris Grundemann and I caught up...]]></description><link>https://www.rosesec.com/post/are-we-all-imposters</link><guid isPermaLink="false">63fe1eb3c1c27ed58361e666</guid><category><![CDATA[Career Start]]></category><pubDate>Mon, 06 Mar 2023 07:03:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_bbe6aad5b5ff49a28efaa266fe630c31~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Taking Non-Tech Skills and Applying them to Cyber Security]]></title><description><![CDATA[The principles of cyber security are often not well understood, many times analogies are used to explain something. I have even heard...]]></description><link>https://www.rosesec.com/post/taking-non-tech-skills-and-applying-them-to-cyber-security</link><guid isPermaLink="false">5fc3a4aa24242700173506c4</guid><pubDate>Mon, 16 May 2022 07:01:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_e99c512f7c024e90a80619952af77579~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Microsoft Security: use what you have more effectively]]></title><description><![CDATA[Whilst simplicity is a big part of security, reality is many organisations have complex infrastructure; especially enterprise networks....]]></description><link>https://www.rosesec.com/post/microsoft-security-use-what-you-have-more-effectively</link><guid isPermaLink="false">6259338ef8fd881ef9fdecc7</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Tue, 03 May 2022 07:39:07 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_0f22cd9c372a4cf08760deff13e5bd34~mv2.png/v1/fit/w_1000,h_808,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Tech and Security Field Day Disclosure]]></title><description><![CDATA[As a delegate of Tech Field Day, there are certain privileges; including the flights to/from the conference location, hotel...]]></description><link>https://www.rosesec.com/post/tech-and-security-field-day-disclosure</link><guid isPermaLink="false">5ebd4aee210f920017f9bdef</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Tue, 12 Apr 2022 07:18:21 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_ab14cc665e974da3a01fda8ef7413fbc~mv2.png/v1/fit/w_300,h_300,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Where security should fit into your organisation’s container strategy]]></title><description><![CDATA[Originally posted to Peerlyst, 29 March 2020. Implementing containerisation provides the sense of ease, these short-lived environments...]]></description><link>https://www.rosesec.com/post/where-security-should-fit-into-your-organisation-s-container-strategy</link><guid isPermaLink="false">5f20121c0bac9a0017a51a59</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Mon, 10 Aug 2020 07:00:11 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_072eab0b69e54b779cd6e2e7ead60019~mv2_d_5977_3985_s_4_2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[The Risk of Default Configuration]]></title><description><![CDATA[A robust cyber security programme includes a variety of: technical controls, training, and programmes to respond to any identified gaps....]]></description><link>https://www.rosesec.com/post/risk-of-default-configuration</link><guid isPermaLink="false">5f1ecdd168edb5001753b4a4</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Mon, 27 Jul 2020 13:12:09 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/04ba0b2450a4460bad90b90bc9908adf.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Proactive Security is the Not-So-Secret Weapon]]></title><description><![CDATA[Recently, I shared my thoughts with Gestalt IT regarding Ransomware, Backups, and carefully tailoring disaster recovery and business...]]></description><link>https://www.rosesec.com/post/proactive-security-is-the-not-so-secret-weapon</link><guid isPermaLink="false">5ef721cd42cd1b0017522cee</guid><pubDate>Mon, 27 Jul 2020 11:00:14 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ff2fc45f80454ff3b37062017c26aad8.jpg/v1/fit/w_942,h_855,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Incident Response with loved ones]]></title><description><![CDATA[Provide a safe environment to ask questions, and educate regarding online safety, including physical security..]]></description><link>https://www.rosesec.com/post/2020/03/15/incident-response-with-loved-ones</link><guid isPermaLink="false">5ea1c3ddc049ec0017131320</guid><category><![CDATA[Personal Security]]></category><pubDate>Wed, 15 Jul 2020 11:00:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_09d66f7d7470450bab1ffc897a251fd0~mv2.png/v1/fit/w_623,h_870,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[The Link between Oversharing and Human Behaviour]]></title><description><![CDATA[Based on research done by Nationwide Building Society Humans are social beings; we need to collaboration, appreciation, recognition, and...]]></description><link>https://www.rosesec.com/post/the-link-between-oversharing-and-human-behaviour</link><guid isPermaLink="false">5f0054691f5b8500175db821</guid><pubDate>Mon, 06 Jul 2020 11:00:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/52db41c9eee648479d93bb10171078ce.jpg/v1/fit/w_655,h_655,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Infrastructure Intelligence for SMEs]]></title><description><![CDATA[It’s an ongoing struggle for small to medium sized enterprises (SMEs), balancing the solutions required to monitor and digest data on...]]></description><link>https://www.rosesec.com/post/infrastructure-intelligence-for-smes</link><guid isPermaLink="false">5ee6346a46cb8400178044b9</guid><pubDate>Mon, 29 Jun 2020 11:00:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/0fb6dc8a6cb74de287f9ba00051ec135.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Looking at the Current State of Container and Kubernetes Security]]></title><description><![CDATA[In a survey created by StackRox, with more than 540 IT professionals responding, it was revealed that majority of persons (94%) experienced ]]></description><link>https://www.rosesec.com/post/2020/04/22/looking-at-the-current-state-of-container-and-kubernetes-security</link><guid isPermaLink="false">5ea1c3db91502400177b11ae</guid><category><![CDATA[InfoSec / Cyber]]></category><pubDate>Wed, 22 Apr 2020 10:42:55 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/2621e2_33d3f2a0a471485ba920972097bc5bb6~mv2.jpeg/v1/fit/w_800,h_443,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Cyber awareness learning – motivate and empower your employees]]></title><description><![CDATA[What is the ‘language’ of business? Put simply, it’s risk. What is the ‘language’ of cyber security? Also risk. Effective cyber security...]]></description><link>https://www.rosesec.com/post/2020/04/20/cyber-awareness-learning-motivate-and-empower-your-employees</link><guid isPermaLink="false">5ea1c3db9045f3001722330d</guid><pubDate>Mon, 20 Apr 2020 06:00:00 GMT</pubDate><dc:creator>Zoë Rose</dc:creator></item><item><title><![CDATA[Podcasting config]]></title><description><![CDATA[Whilst I’m nowhere near qualified to advise on a proper AV configuration, or know really all that much on the topic - I do have my own...]]></description><link>https://www.rosesec.com/post/2020/04/19/podcasting-config</link><guid isPermaLink="false">5ea1c3db43f279001788cc6d</guid><category><![CDATA[Public Speaking]]></category><pubDate>Sun, 19 Apr 2020 11:50:30 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/652a10e0fddd4794887217b2ac2646f9.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Zoë Rose</dc:creator></item></channel></rss>