<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Security Unfiltered </title>
		<link>https://shows.acast.com/security-unfiltered</link>
		<atom:link href="https://feeds.acast.com/public/shows/62f38c5c3e75ca0012f922ea" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Abbie Barker</copyright>
		<itunes:keywords>communication,security,artificialintelligence,smart,technology</itunes:keywords>
		<itunes:author>Commend UK</itunes:author>
		<itunes:subtitle/>
		<itunes:summary><![CDATA[Hello and welcome to Security Unfiltered. A show where we discuss and challenge the ever-changing norms of the security and communication market and see how today's technology and tomorrow's technology fit in the modern world.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[Hello and welcome to Security Unfiltered. A show where we discuss and challenge the ever-changing norms of the security and communication market and see how today's technology and tomorrow's technology fit in the modern world.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Abbie Barker</itunes:name>
			<itunes:email>info+62f38c5c3e75ca0012f922ea@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
		<acast:showUrl>security-unfiltered</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="62f38c5c3e75ca0012f922ec" slug="abbie-barker"><![CDATA[Abbie Barker]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg</url>
				<link>https://shows.acast.com/security-unfiltered</link>
				<title>Security Unfiltered </title>
			</image>
		<item>
			<title>The Future of Ho Ho Hosted Solutions </title>
			<itunes:title>The Future of Ho Ho Hosted Solutions </itunes:title>
			<pubDate>Tue, 20 Dec 2022 14:55:17 GMT</pubDate>
			<itunes:duration>15:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f38c5c3e75ca0012f922ea/e/63a1ccd548642f00107451d9/media.mp3" length="19082476" type="audio/mpeg"/>
			<guid isPermaLink="false">63a1ccd548642f00107451d9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unfiltered/episodes/the-future-of-ho-ho-hosted-solutions</link>
			<acast:episodeId>63a1ccd548642f00107451d9</acast:episodeId>
			<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
			<acast:episodeUrl>the-future-of-ho-ho-hosted-solutions</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsojV0fDU9thAxnaeLNsby/DACZB2gBF13NT9/axqJo7W/pn5WMD5KtES9hmY2bKfg/ppFhHADN9XkBxeSERPtLal3WMvnIGXWvPLkHou9RxviIanka5cqoZuu5aGP3Z1+]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<description><![CDATA[<p>What's the difference between the cloud and hosting? </p><p>Is the cloud only suitable for personal uses? </p><p>How secure and reliable is the cloud? </p><p>Where does it fit in the future of security technology? </p><br><p>Join us for our final episode of 2022 where Phil and Hannah answer these questions and discuss the pros and cons of Ho Ho Hosted Solutions. </p><br><p>#SecurityUnfiltered #ChristmasEpisode</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>What's the difference between the cloud and hosting? </p><p>Is the cloud only suitable for personal uses? </p><p>How secure and reliable is the cloud? </p><p>Where does it fit in the future of security technology? </p><br><p>Join us for our final episode of 2022 where Phil and Hannah answer these questions and discuss the pros and cons of Ho Ho Hosted Solutions. </p><br><p>#SecurityUnfiltered #ChristmasEpisode</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>What is Communication in the Modern World</title>
			<itunes:title>What is Communication in the Modern World</itunes:title>
			<pubDate>Tue, 29 Nov 2022 13:49:02 GMT</pubDate>
			<itunes:duration>23:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f38c5c3e75ca0012f922ea/e/63860dcf632296001078fdf9/media.mp3" length="29285568" type="audio/mpeg"/>
			<guid isPermaLink="false">63860dcf632296001078fdf9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unfiltered/episodes/what-is-communication-in-the-modern-world</link>
			<acast:episodeId>63860dcf632296001078fdf9</acast:episodeId>
			<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
			<acast:episodeUrl>what-is-communication-in-the-modern-world</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsojV0fDU9thAxnaeLNsby/DACZB2gBF13NT9/axqJo7VMN9K+6FxE0/wZ/KeT6fTlh6hX/K3YOt6EPrZ8RAW5M5QRGS0hkaS9Spag8Q0ZB6SMSko6DX7ttJ7dWpxOJm88]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<description><![CDATA[<p>Emails, podcasts...holograms? </p><br><p>What exactly is communication in the modern world and how does it affect our day to day lives, now and in the years to come? In this month's episode of Security Unfiltered, James, Hannah and Abbie discuss just that. </p><br><p>Take a listen today and subscribe for more.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Emails, podcasts...holograms? </p><br><p>What exactly is communication in the modern world and how does it affect our day to day lives, now and in the years to come? In this month's episode of Security Unfiltered, James, Hannah and Abbie discuss just that. </p><br><p>Take a listen today and subscribe for more.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Importance of Cyber Security in Industry</title>
			<itunes:title>The Importance of Cyber Security in Industry</itunes:title>
			<pubDate>Mon, 31 Oct 2022 16:15:04 GMT</pubDate>
			<itunes:duration>25:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f38c5c3e75ca0012f922ea/e/633596b913a430001460b2b8/media.mp3" length="36928533" type="audio/mpeg"/>
			<guid isPermaLink="false">633596b913a430001460b2b8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unfiltered/episodes/the-importance-of-cyber-security-in-industry</link>
			<acast:episodeId>633596b913a430001460b2b8</acast:episodeId>
			<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
			<acast:episodeUrl>the-importance-of-cyber-security-in-industry</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsojV0fDU9thAxnaeLNsby/DACZB2gBF13NT9/axqJo7Vtb1+l0EJZ/aUP+5RWT/eXJYFjNI8W+PrTq8Ux024qAbF4vobFO/3kOtZOG3OU5ShOU2XQ5kf/sWSb9QzeDm87]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<description><![CDATA[In this episode of Security Unfiltered, Sharok chats with Reinhard Tranninger, Industry Expert from Commend International, all about the processes and complexities of cyber security in industry. Is there such a thing as being 100% cyber secure and how obtainable is cyber security for modern businesses?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode of Security Unfiltered, Sharok chats with Reinhard Tranninger, Industry Expert from Commend International, all about the processes and complexities of cyber security in industry. Is there such a thing as being 100% cyber secure and how obtainable is cyber security for modern businesses?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Evolution of Security Technology </title>
			<itunes:title>The Evolution of Security Technology </itunes:title>
			<pubDate>Mon, 05 Sep 2022 13:33:05 GMT</pubDate>
			<itunes:duration>15:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f38c5c3e75ca0012f922ea/e/6315fa91ddd5650014675eb7/media.mp3" length="32124148" type="audio/mpeg"/>
			<guid isPermaLink="false">6315fa91ddd5650014675eb7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unfiltered/episodes/the-evolution-of-security-technology</link>
			<acast:episodeId>6315fa91ddd5650014675eb7</acast:episodeId>
			<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
			<acast:episodeUrl>the-evolution-of-security-technology</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsojV0fDU9thAxnaeLNsby/DACZB2gBF13NT9/axqJo7VnItd3svrZi2Xnjngz+xzKmJeIb/qOHwgC2Ci/iNz/yIYfTNPhScCRRq0cSVGhTsCvrZJKjS5J3FB6hThA2xTP]]></acast:settings>
			<itunes:subtitle>with special guest, Sharok Gerami</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<description><![CDATA[In this episode of Security Unfiltered, James and special guest Sharok Gerami, Managing Director of Commend UK, discuss the evolution of security technology - how far things have come in the last 50 years and are we heading in the right direction for the modern world?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode of Security Unfiltered, James and special guest Sharok Gerami, Managing Director of Commend UK, discuss the evolution of security technology - how far things have come in the last 50 years and are we heading in the right direction for the modern world?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How Ethical is AI?</title>
			<itunes:title>How Ethical is AI?</itunes:title>
			<pubDate>Mon, 15 Aug 2022 09:00:36 GMT</pubDate>
			<itunes:duration>17:35</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f38c5c3e75ca0012f922ea/e/62fa0b34f9b33900126c9420/media.mp3" length="21195240" type="audio/mpeg"/>
			<guid isPermaLink="false">62fa0b34f9b33900126c9420</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unfiltered/episodes/how-ethical-is-ai</link>
			<acast:episodeId>62fa0b34f9b33900126c9420</acast:episodeId>
			<acast:showId>62f38c5c3e75ca0012f922ea</acast:showId>
			<acast:episodeUrl>how-ethical-is-ai</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsojV0fDU9thAxnaeLNsby/DACZB2gBF13NT9/axqJo7XxoDpNZswSM4b6Ka08T5il0fzAi3hiE2P+LUF7GOWFD3bJZG/HWGK/S6LllD+acVKgiW3O2Ma1ISeGE6oOuGoF]]></acast:settings>
			<itunes:subtitle>Is it a help or a hindrance? </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f38c5c3e75ca0012f922ea/1660128469543-2f1d2bfaedeeae32364dff4450dfdf44.jpeg"/>
			<description><![CDATA[In part one of our AI series, James, Hannah, Emily and Phil discuss the ethics surrounding artificial intelligence in the modern security market. Is it a tool to improve the lives and safety of those around us or is it simply too soon for such advanced machine learning? <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In part one of our AI series, James, Hannah, Emily and Phil discuss the ethics surrounding artificial intelligence in the modern security market. Is it a tool to improve the lives and safety of those around us or is it simply too soon for such advanced machine learning? <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
		<itunes:category text="News">
			<itunes:category text="Tech News"/>
		</itunes:category>
		<itunes:category text="News">
			<itunes:category text="Business News"/>
		</itunes:category>
    </channel>
</rss>
