<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; shinigami</title>
<link>https://blog.intelligencex.org/rss/author/shinigami</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; shinigami</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>The Federal Information Security Modernization Act (FISMA)</title>
<link>https://blog.intelligencex.org/the-federal-information-security-modernization-act-fisma</link>
<guid>https://blog.intelligencex.org/the-federal-information-security-modernization-act-fisma</guid>
<description><![CDATA[ The Federal Information Security Modernization was set-up by U.S. Congress in 2002 and it is managed by NIST (National Institute of Standards Technology) and FISMA both. The FISMA security framework was designed to protect federal sensitive information from any unauthorized access. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202603/image_870x580_69aab8c9ef66d.webp" length="63778" type="image/jpeg"/>
<pubDate>Thu, 19 Mar 2026 11:27:05 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>FISMA</media:keywords>
</item>

<item>
<title>Third&#45;Party Risk Management (TPRM)</title>
<link>https://blog.intelligencex.org/third-party-risk-management-tprm</link>
<guid>https://blog.intelligencex.org/third-party-risk-management-tprm</guid>
<description><![CDATA[ Third party risk management is a procedure for assessing, identifying, and reducing risks associated with outsourcing businesses, which includes third party vendors, suppliers, or business partners related to security breaches, financial losses, and legal violations.
TPRM helps organizations to minimize their business risks from cyber-threats, allowing them to stay updated with security compliance. TPRM provides different security solutions to organizations that help them to analyze vulnerabilities in safety controls and to fix them before any consequences arise. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202603/image_870x580_69b0018396ebb.webp" length="25614" type="image/jpeg"/>
<pubDate>Thu, 19 Mar 2026 11:21:02 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>TPRM</media:keywords>
</item>

<item>
<title>CERT&#45;In (Indian Computer Emergency Response Team)</title>
<link>https://blog.intelligencex.org/cert-in-indian-computer-emergency-response-team</link>
<guid>https://blog.intelligencex.org/cert-in-indian-computer-emergency-response-team</guid>
<description><![CDATA[ The Indian Computer Emergency Response Team is designed to secure digital systems from cyber threats. CERT provides immediate response and more power to Indian cyber-security related services.
This team needs to respond and perform quickly if any phishing or malicious activities are detected by any suspicious user or internet hackers trying to illegally hack security systems.
Whenever there is an emergency alert for cybersecurity threats, the Indian Computer Emergency Response Team comes into action for Indian cyber community to ensure data security. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_69984fdbef3f1.webp" length="37840" type="image/jpeg"/>
<pubDate>Tue, 24 Feb 2026 10:55:16 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>CERT-In</media:keywords>
</item>

<item>
<title>Cybersecurity Maturity Model Certification (CMMC)</title>
<link>https://blog.intelligencex.org/cybersecurity-maturity-model-certification-cmmc</link>
<guid>https://blog.intelligencex.org/cybersecurity-maturity-model-certification-cmmc</guid>
<description><![CDATA[ The Cybersecurity Maturity Model Certification is a U.S. DoD framework that validates organizations’ safety structures regarding Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) data protection.
The CMMC is created and managed by the Department of Defense (DoD). This model ensures complete protection of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) that is stored and processed by authorized contractors. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_69944b5b8bcc9.webp" length="26124" type="image/jpeg"/>
<pubDate>Tue, 17 Feb 2026 16:26:58 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>CMMC</media:keywords>
</item>

<item>
<title>Multi&#45;Cloud Security &amp;amp; Compliance</title>
<link>https://blog.intelligencex.org/multi-cloud-security-compliance</link>
<guid>https://blog.intelligencex.org/multi-cloud-security-compliance</guid>
<description><![CDATA[ Multi-cloud security is a complete security solution that protects companies, customer data, assets and applications from advanced security threats.
Multi-cloud security is a service that protects organization’s data across multiple cloud providers. By using multiple clouds we can protect our sensitive data more precisely than usual. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_698dc8ebbea7c.webp" length="87422" type="image/jpeg"/>
<pubDate>Thu, 12 Feb 2026 18:11:04 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>Multi-Cloud Security &amp; Compliance</media:keywords>
</item>

<item>
<title>Zero Trust Architecture (ZTA)</title>
<link>https://blog.intelligencex.org/zero-trust-architecture-zta</link>
<guid>https://blog.intelligencex.org/zero-trust-architecture-zta</guid>
<description><![CDATA[ Zero trust Architecture is a modern and boundless security framework that follows the principle of “never trust, always verify”. This framework strictly mandates strict authentication for every user and device. ZTA minimizes the cyber-attack with least access to protect data and applications. ZTA allows only authorized person to access regardless of network location. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_698b25d14f3d7.webp" length="14136" type="image/jpeg"/>
<pubDate>Thu, 12 Feb 2026 14:55:54 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>Zero Trust, Zero Trust Security, Zero Trust Architecture</media:keywords>
</item>

<item>
<title>AI&#45;Driven Compliance Monitoring</title>
<link>https://blog.intelligencex.org/ai-driven-compliance-monitoring</link>
<guid>https://blog.intelligencex.org/ai-driven-compliance-monitoring</guid>
<description><![CDATA[ AI driven compliance monitoring refers to a modern technology where all the crucial operations related to any compliance are performed by Artificial Intelligence. These AI enabled systems monitor real time activities, identify potential risks, and provide advance alerts to avoid violations. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_6989c71b43d4d.webp" length="48524" type="image/jpeg"/>
<pubDate>Mon, 09 Feb 2026 17:15:46 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>AI Compliance Monitoring</media:keywords>
</item>

<item>
<title>HIPAA: Health Insurance Portability and Accountability Act for Medical Data</title>
<link>https://blog.intelligencex.org/the-health-insurance-portability-and-accountability-act-or-hipaa</link>
<guid>https://blog.intelligencex.org/the-health-insurance-portability-and-accountability-act-or-hipaa</guid>
<description><![CDATA[ The Health Insurance Portability and Accountability Act, which is also known as HIPAA is a set of rules that was created in 1996. It is overseen by the Department of Health and Human Services and the Office for Civil Rights. These groups make sure that HIPAA is followed correctly. The Department of Health and Human Services and the Office, for Civil Rights work together to manage HIPAA. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_697c8fb7c61d4.webp" length="55424" type="image/jpeg"/>
<pubDate>Thu, 05 Feb 2026 12:37:30 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>HIPAA, health insurance protection, medical data safety</media:keywords>
</item>

<item>
<title>Compliance Automation</title>
<link>https://blog.intelligencex.org/compliance-automation</link>
<guid>https://blog.intelligencex.org/compliance-automation</guid>
<description><![CDATA[ Compliance automation is a technology where system keeps all the records automatically for all complaints. This technology is much faster and efficient than manual process. It facilitates security services to track all compliance procedures in one place. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_69831c8f27eeb.webp" length="60252" type="image/jpeg"/>
<pubDate>Thu, 05 Feb 2026 11:26:32 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>Compliance Automation</media:keywords>
</item>

<item>
<title>The Payment Card Industry Data Security Standard (PCI DSS)</title>
<link>https://blog.intelligencex.org/the-payment-card-industry-data-security-standard-pci-dss</link>
<guid>https://blog.intelligencex.org/the-payment-card-industry-data-security-standard-pci-dss</guid>
<description><![CDATA[ The PCI DSS is a global security service for those organizations who deal with debit/credit card personal data essentials. Organizations must register as a PCI SSC Participating Organization (PO). PCI DSS provides the rules to ensure a safe environment for cardholder data, protecting both customers and businesses from online theft and fraud. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6970a20045382.webp" length="34730" type="image/jpeg"/>
<pubDate>Wed, 21 Jan 2026 15:47:00 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>PCI, DSS, CARD PAYMENT SECURITY</media:keywords>
</item>

<item>
<title>The FBI Internet Crime Complaint Center (IC3)</title>
<link>https://blog.intelligencex.org/the-fbi-internet-crime-complaint-center-ic3</link>
<guid>https://blog.intelligencex.org/the-fbi-internet-crime-complaint-center-ic3</guid>
<description><![CDATA[ IC3 is the FBI’s central hub for reporting internet related crimes, fraud, online scams and other cyber-crimes. It was established in 2000. This provides a simple yet effective mechanism for the general public to report any suspected internet activity. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696f60872c3c4.webp" length="91716" type="image/jpeg"/>
<pubDate>Tue, 20 Jan 2026 16:53:37 +0530</pubDate>
<dc:creator>shinigami</dc:creator>
<media:keywords>FBI, IC3, cyber crime</media:keywords>
</item>

</channel>
</rss>