<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
		>

<channel>
	<title> | Josh | Activity</title>
	<link>https://technologyleadersclub.com/members/josh-porter/activity/</link>
	<atom:link href="https://technologyleadersclub.com/members/josh-porter/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for Josh.</description>
	<lastBuildDate>Fri, 03 Apr 2026 11:56:43 +0100</lastBuildDate>
	<generator>https://buddypress.org/?v=2.8.61</generator>
	<language>en-GB</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
		
								<item>
				<guid isPermaLink="false">5f928ee1727cd172b3a6abe488f376fa</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=797</link>
				<pubDate>Wed, 10 Apr 2024 09:14:00 +0100</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-cloud-migration-success-means-looking-and-learning-before-you-leap/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/04/shutterstock_1018377550-e1713537685973.jpg?fit=1000%2C563&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-cloud-migration-success-means-looking-and-learning-before-you-leap/"><span class="bb-post-title">Whitepaper | Cloud Migration Success Means Looking – and Learning – Before You Leap</span></a> <p>New hybrid cloud approaches require enhanced collaboration with vendors and heightened vigilance against security vulnerabilities. Cloud native networks and applications offer tremendous benefits: greater&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e7a3cf29b422ae685e0cedd7f09ef812</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=777</link>
				<pubDate>Tue, 02 Apr 2024 13:25:16 +0100</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/technology-leaders-club-is-ai-going-to-be-a-necessary-tool-for-modern-businesses/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/04/shutterstock_1856980936-scaled-e1713537799802.jpg?fit=2436%2C1369&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/technology-leaders-club-is-ai-going-to-be-a-necessary-tool-for-modern-businesses/"><span class="bb-post-title">What You Thought | Do you think AI is going to be a necessary tool for modern businesses?</span></a> <p>Recently we asked our Technology Leaders Club community a question &#8211; Do you think AI is going to be a necessary tool for modern businesses?<br />
We had some illuminating responses&#8230;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">83c901e85a12488d9282d0d4dae78e60</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=757</link>
				<pubDate>Wed, 27 Mar 2024 14:15:26 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/ebook-threat-detection-response-lessons-learned/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_2197426809-e1713537938960.jpg?fit=1000%2C563&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/ebook-threat-detection-response-lessons-learned/"><span class="bb-post-title">eBook | Threat Detection &amp; Response: Lessons Learned</span></a> <p>Detecting and responding to threats is the primary objective of your security operations program, but as our environments spill over into myriad SaaS tools and other cloud environments, are these detection&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">426d727496f9c9d1ae1e9b07e0d2bff0</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=620</link>
				<pubDate>Fri, 15 Mar 2024 11:58:41 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-if-it-isnt-actionable-does-it-even-matter/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_1062915296-scaled.jpg?fit=2560%2C1440&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-if-it-isnt-actionable-does-it-even-matter/"><span class="bb-post-title">Whitepaper | If it Isn’t Actionable, Does it Even Matter?</span></a> <p>The success of your security operations automation strategy depends on having all of the necessary data readily available so that threats can be prioritised and rapidly resolved but establishing a&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9147846b8a594e7e83f5a5819c282f3e</guid>
				<title>Josh changed their profile photo</title>
				<link>https://technologyleadersclub.com/activity/p/79/</link>
				<pubDate>Fri, 15 Mar 2024 10:42:52 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">6558ce1a7e32dec79e44e4a33f06bbb7</guid>
				<title>Josh updated their profile</title>
				<link>https://technologyleadersclub.com/activity/p/64/</link>
				<pubDate>Wed, 13 Mar 2024 16:10:40 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">64fbcf230e5be45c2511163e41020558</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=275</link>
				<pubDate>Mon, 04 Mar 2024 15:52:12 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/partner-content-exabeam-at-tlc-connect-global/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/Exabeam.png?fit=816%2C434&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/partner-content-exabeam-at-tlc-connect-global/"><span class="bb-post-title">Partner Content | Exabeam at TLC Connect Global</span></a> <p>Ahead of their appearance at TLC Connect Global in Amsterdam, Exabeam have shared some materials to showcase their expertise and to demonstrate why our community should be excited to hear what they have to say&#8230;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">86be8324587da0a615692132046d73d9</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=269</link>
				<pubDate>Fri, 23 Feb 2024 14:35:06 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-leave-no-one-behind-how-to-unlock-your-entire-digital-ecosystem/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_1917622298-scaled.jpg?fit=2560%2C1440&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-leave-no-one-behind-how-to-unlock-your-entire-digital-ecosystem/"><span class="bb-post-title">Whitepaper | Leave No-one Behind: How to Unlock Your Entire Digital Ecosystem</span></a> <p>Data readiness, user engagement, and the unified platform are vital to delivering an integrated experience and will become critical to an organisation’s survival. The businesses that will thrive in an&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">688e118bb18e600566ed15bed9d93002</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=265</link>
				<pubDate>Tue, 30 Jan 2024 14:22:52 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-data-protection-for-the-information-economy-the-data-awareness-challenge/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_519801490-1-e1713537855525.jpg?fit=1000%2C563&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-data-protection-for-the-information-economy-the-data-awareness-challenge/"><span class="bb-post-title">Whitepaper | Data Protection for the Information Economy: The Data Awareness Challenge</span></a> <p>Fundamental to meeting any data protection legislation is knowing your data: what you have, why you have it, how you got it, what you do with it, and where you keep it. Building data awareness  is now an&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">dae843bbff6028ea7046690010bcfd0c</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=261</link>
				<pubDate>Mon, 18 Dec 2023 14:07:05 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-from-vulnerability-to-victory-mastering-next-gen-tactics-to-thwart-software-supply-chain-attacks/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_1396210841-scaled.jpg?fit=2560%2C1440&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-from-vulnerability-to-victory-mastering-next-gen-tactics-to-thwart-software-supply-chain-attacks/"><span class="bb-post-title">Whitepaper | From Vulnerability to Victory Mastering Next-Gen Tactics to Thwart Software Supply Chain Attacks</span></a> <p>With software supply chain attacks on the rise, organisations are struggling to detect, let alone prevent, these attacks. No one is immune to these mounting threats – so how do we move from vulnerability to victory?</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">87de5acdade0841c7da3d38bddf859c6</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=478</link>
				<pubDate>Thu, 30 Nov 2023 14:38:00 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-how-to-run-a-successful-iam-project/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_1152185600-scaled.jpg?fit=2560%2C2560&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-how-to-run-a-successful-iam-project/"><span class="bb-post-title">Whitepaper | How to Run a Successful IAM Project</span></a> <p>It’s critical that security teams are able to demonstrate the value of necessary projects and secure buy-in from the business, but with the C-suite guarding the company purse strings more closely than ever,&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">5f56a0b0745b1aadfa7522c1598db12c</guid>
				<title>Josh posted a new post.</title>
				<link>https://technologyleadersclub.com/?p=257</link>
				<pubDate>Fri, 24 Nov 2023 13:51:19 +0000</pubDate>

									<content:encoded><![CDATA[ <a class="bb-post-img-link" href="https://technologyleadersclub.com/whitepaper-exploring-the-need-for-cloud-email-security/"><img src="https://i0.wp.com/technologyleadersclub.com/wp-content/uploads/2024/03/shutterstock_759701224-scaled.jpg?fit=2560%2C1707&#038;ssl=1" /></a> <div class="bb-content-wrp"><a class="bb-post-title-link" href="https://technologyleadersclub.com/whitepaper-exploring-the-need-for-cloud-email-security/"><span class="bb-post-title">Whitepaper | Exploring the Need for Cloud Email Security</span></a> <p>Attackers are taking advantage of the open, connected nature of the cloud to carry out new cyber-attacks. As a result, while it is often overlooked, email is still one of the most important channels to&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>
		