<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>News, Posts &amp; Events</title>
    <link>https://www.arcticsecurity.com/resources</link>
    <description>Learn what's new and where to meet us.</description>
    <language>en</language>
    <pubDate>Wed, 20 Aug 2025 12:26:52 GMT</pubDate>
    <dc:date>2025-08-20T12:26:52Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Abusix integration for Arctic Hub</title>
      <link>https://www.arcticsecurity.com/resources/abusix-integration-for-arctic-hub</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/abusix-integration-for-arctic-hub" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0086-product_update_Abusix.jpg" alt="Abusix integration for Arctic Hub" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As national and regional CERTs take on broader responsibility for cybersecurity oversight within their countries, the challenge of operationalizing large volumes of threat intelligence remains a persistent bottleneck. We have now&amp;nbsp;partnered with &lt;strong&gt;Abusix&amp;nbsp;&lt;/strong&gt;to integrate abuse intelligence into our Arctic Hub early warning platform, offering government response teams a new layer of actionable visibility.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/abusix-integration-for-arctic-hub" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0086-product_update_Abusix.jpg" alt="Abusix integration for Arctic Hub" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As national and regional CERTs take on broader responsibility for cybersecurity oversight within their countries, the challenge of operationalizing large volumes of threat intelligence remains a persistent bottleneck. We have now&amp;nbsp;partnered with &lt;strong&gt;Abusix&amp;nbsp;&lt;/strong&gt;to integrate abuse intelligence into our Arctic Hub early warning platform, offering government response teams a new layer of actionable visibility.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Fabusix-integration-for-arctic-hub&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <category>Press release</category>
      <pubDate>Wed, 20 Aug 2025 12:26:52 GMT</pubDate>
      <guid>https://www.arcticsecurity.com/resources/abusix-integration-for-arctic-hub</guid>
      <dc:date>2025-08-20T12:26:52Z</dc:date>
      <dc:creator>Arctic Security</dc:creator>
    </item>
    <item>
      <title>Arctic Hub 2025</title>
      <link>https://www.arcticsecurity.com/resources/arctic-hub-2025</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/arctic-hub-2025" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0085-product_update_2025.jpg" alt="Arctic Hub 2025" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As we prepare for this year's key&amp;nbsp;gathering at FIRST in Copenhagen, we're pleased to share the progress Arctic Hub has made since the summer of 2024. This year, we focused on addressing practical needs identified by our community of over 30 national CSIRT teams, with six releases that enhanced core functionality and platform reliability.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/arctic-hub-2025" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0085-product_update_2025.jpg" alt="Arctic Hub 2025" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As we prepare for this year's key&amp;nbsp;gathering at FIRST in Copenhagen, we're pleased to share the progress Arctic Hub has made since the summer of 2024. This year, we focused on addressing practical needs identified by our community of over 30 national CSIRT teams, with six releases that enhanced core functionality and platform reliability.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Farctic-hub-2025&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <category>Product Blog</category>
      <pubDate>Tue, 24 Jun 2025 07:22:03 GMT</pubDate>
      <guid>https://www.arcticsecurity.com/resources/arctic-hub-2025</guid>
      <dc:date>2025-06-24T07:22:03Z</dc:date>
      <dc:creator>Juha Haaga</dc:creator>
    </item>
    <item>
      <title>UK’s NCSC Tests EASM Tools and the Findings Are Eye-Opening</title>
      <link>https://www.arcticsecurity.com/resources/uks-ncsc-tests-easm-tools-and-the-findings-are-eye-opening</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/uks-ncsc-tests-easm-tools-and-the-findings-are-eye-opening" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0084-bridge_NCSC_EASM-smaller.jpg" alt="UK’s NCSC Tests EASM Tools and the Findings Are Eye-Opening" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Recently, the UK's National Cyber Security Centre (NCSC) put External Attack Surface Management (EASM) tools &lt;a href="https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials"&gt;to the test&lt;/a&gt;. Their goal? See whether EASM&amp;nbsp;tools actually help organizations understand and reduce their digital exposure. They undertook&amp;nbsp;a significant initiative: collaborating with providers, conducting product trials with 27 organizations, and accumulating over 900 combined trial days to evaluate&amp;nbsp;EASM in real-world settings.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/uks-ncsc-tests-easm-tools-and-the-findings-are-eye-opening" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0084-bridge_NCSC_EASM-smaller.jpg" alt="UK’s NCSC Tests EASM Tools and the Findings Are Eye-Opening" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Recently, the UK's National Cyber Security Centre (NCSC) put External Attack Surface Management (EASM) tools &lt;a href="https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials"&gt;to the test&lt;/a&gt;. Their goal? See whether EASM&amp;nbsp;tools actually help organizations understand and reduce their digital exposure. They undertook&amp;nbsp;a significant initiative: collaborating with providers, conducting product trials with 27 organizations, and accumulating over 900 combined trial days to evaluate&amp;nbsp;EASM in real-world settings.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Fuks-ncsc-tests-easm-tools-and-the-findings-are-eye-opening&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <pubDate>Tue, 01 Apr 2025 06:00:00 GMT</pubDate>
      <guid>https://www.arcticsecurity.com/resources/uks-ncsc-tests-easm-tools-and-the-findings-are-eye-opening</guid>
      <dc:date>2025-04-01T06:00:00Z</dc:date>
      <dc:creator>Arctic Security</dc:creator>
    </item>
    <item>
      <title>Expanding Cybersecurity Visibility: Arctic Security’s Partnership with Shadowserver</title>
      <link>https://www.arcticsecurity.com/resources/arctic-securitys-partnership-with-shadowserver</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/arctic-securitys-partnership-with-shadowserver" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0083-bridge_partner_smaller.jpg" alt="Expanding Cybersecurity Visibility: Arctic Security’s Partnership with Shadowserver" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Arctic Security is excited to announce a partnership with&lt;a href="https://www.shadowserver.org/"&gt; The Shadowserver Foundation&lt;/a&gt;, a nonprofit organization dedicated to improving global cybersecurity. Shadowserver collects vast amounts of threat intelligence and provides free daily remediation reports to vetted organizations, including governments, law enforcement, and enterprises.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/arctic-securitys-partnership-with-shadowserver" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0083-bridge_partner_smaller.jpg" alt="Expanding Cybersecurity Visibility: Arctic Security’s Partnership with Shadowserver" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Arctic Security is excited to announce a partnership with&lt;a href="https://www.shadowserver.org/"&gt; The Shadowserver Foundation&lt;/a&gt;, a nonprofit organization dedicated to improving global cybersecurity. Shadowserver collects vast amounts of threat intelligence and provides free daily remediation reports to vetted organizations, including governments, law enforcement, and enterprises.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Farctic-securitys-partnership-with-shadowserver&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <category>News</category>
      <category>Press release</category>
      <pubDate>Thu, 20 Mar 2025 13:36:54 GMT</pubDate>
      <guid>https://www.arcticsecurity.com/resources/arctic-securitys-partnership-with-shadowserver</guid>
      <dc:date>2025-03-20T13:36:54Z</dc:date>
      <dc:creator>Arctic Security</dc:creator>
    </item>
    <item>
      <title>Understanding Security Debt</title>
      <link>https://www.arcticsecurity.com/resources/understanding-security-debt</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/understanding-security-debt" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0079-intricate_explorer_smaller.jpg" alt="Understanding Security Debt" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When we think about cybersecurity, technical jargon, such as malware, firewalls, encryption, and so on, often comes to mind. Here’s a new term you should know: &lt;span style="font-weight: bold;"&gt;security debt&lt;/span&gt;. While originating in software development, this concept is not just for tech-savvy professionals. It’s a simple idea with implications for systems, businesses, and society. This post will explore the idea of security debt, why it matters, and how it accumulates in systems.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/understanding-security-debt" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0079-intricate_explorer_smaller.jpg" alt="Understanding Security Debt" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When we think about cybersecurity, technical jargon, such as malware, firewalls, encryption, and so on, often comes to mind. Here’s a new term you should know: &lt;span style="font-weight: bold;"&gt;security debt&lt;/span&gt;. While originating in software development, this concept is not just for tech-savvy professionals. It’s a simple idea with implications for systems, businesses, and society. This post will explore the idea of security debt, why it matters, and how it accumulates in systems.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Funderstanding-security-debt&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <category>Guest blog</category>
      <pubDate>Wed, 19 Feb 2025 13:18:36 GMT</pubDate>
      <author>maren.kruke@visma.com (Maren Kruke)</author>
      <guid>https://www.arcticsecurity.com/resources/understanding-security-debt</guid>
      <dc:date>2025-02-19T13:18:36Z</dc:date>
    </item>
    <item>
      <title>Protecting Your Network: Lessons from the Fortigate Breach</title>
      <link>https://www.arcticsecurity.com/resources/protecting-your-network-lessons-from-the-fortigate-breach</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/protecting-your-network-lessons-from-the-fortigate-breach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0079-material_waves_smaller.jpg" alt="Protecting Your Network: Lessons from the Fortigate Breach" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;In cybersecurity, the full impact of a breach or vulnerability often unfolds over time. While an incident may initially appear contained, its ramifications can ripple outward, affecting systems, organizations, and industries long after the event. This was starkly demonstrated by the Fortigate breach, where exploiting a zero-day vulnerability led to significant consequences that persisted well beyond the initial discovery. This article explores the breach, its fallout, and actionable steps to protect your network against such risks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.arcticsecurity.com/resources/protecting-your-network-lessons-from-the-fortigate-breach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.arcticsecurity.com/hubfs/arctic_blog_0079-material_waves_smaller.jpg" alt="Protecting Your Network: Lessons from the Fortigate Breach" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;In cybersecurity, the full impact of a breach or vulnerability often unfolds over time. While an incident may initially appear contained, its ramifications can ripple outward, affecting systems, organizations, and industries long after the event. This was starkly demonstrated by the Fortigate breach, where exploiting a zero-day vulnerability led to significant consequences that persisted well beyond the initial discovery. This article explores the breach, its fallout, and actionable steps to protect your network against such risks.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4097425&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.arcticsecurity.com%2Fresources%2Fprotecting-your-network-lessons-from-the-fortigate-breach&amp;amp;bu=https%253A%252F%252Fwww.arcticsecurity.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Blog</category>
      <pubDate>Thu, 16 Jan 2025 13:24:16 GMT</pubDate>
      <guid>https://www.arcticsecurity.com/resources/protecting-your-network-lessons-from-the-fortigate-breach</guid>
      <dc:date>2025-01-16T13:24:16Z</dc:date>
      <dc:creator>Arctic Security</dc:creator>
    </item>
  </channel>
</rss>
