<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/rsmuser1/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Wed, 11 Mar 2026 21:08:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Securing Tomorrow: Evaluating Cyber Catastrophe</title>
		<link>https://warroom.rsmus.com/evaluating-cyber-catastrophe/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 21:20:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6238</guid>

					<description><![CDATA[On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. Please note that the views expressed in this article are opinionated and reflect the author’s perspective, and readers are encouraged [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The Weakest Link: Bridging the Gap Between Tech and People</title>
		<link>https://warroom.rsmus.com/gap-tech-people/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 16 Feb 2024 20:11:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6230</guid>

					<description><![CDATA[On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. In the continuous struggle to keep our digital world safe and secure, it’s important to understand that behind every cyber [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>From Borders to Bytes: Cyber as the New Global Commons</title>
		<link>https://warroom.rsmus.com/cyber-global-commons/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 09 Feb 2024 21:00:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6149</guid>

					<description><![CDATA[On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. For many years, there has been an ongoing debate among policymakers, scholars, and international organizations on whether cyberspace should be [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Emerging Threats on the Horizon: Current Threat Intelligence Trends, Threats, and Mitigation Strategies</title>
		<link>https://warroom.rsmus.com/threat-intelligence-trends/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 02 Feb 2024 21:20:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6136</guid>

					<description><![CDATA[On each Friday for the month of February, RSM&#8217;s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. Cyber-attacks have become a persistent threat in today’s digital age. With the increasing dependence on technology in our personal and [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
