<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Identity on microsegment.io</title>
    <link>https://microsegment.io/tags/identity/</link>
    <description>Recent content in Identity on microsegment.io</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://microsegment.io/tags/identity/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Weekly Security Landscape: April 4 - 10, 2026</title>
      <link>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</link>
      <pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This week was not really about malware. It was about trust boundaries failing in quiet, high-leverage places.&lt;/p&gt;&#xA;&lt;p&gt;Older routers became token theft infrastructure. Helpdesks and BPOs became initial access. Mobile and endpoint management platforms kept showing up in CISA KEV. AI kept compressing the window between disclosure and weaponization. And all of it pointed to the same uncomfortable truth: the highest-risk systems are often the ones defenders still treat as support plumbing.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
