<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[LABYRINTH]]></title><description><![CDATA[deception based intrusion detection platform ]]></description><link>https://www.labyrinth.tech/blog-1</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 20:57:51 GMT</lastBuildDate><atom:link href="https://www.labyrinth.tech/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Before the Breach: Why Proactive Security is Your Key Priority]]></title><description><![CDATA[In recent years, cybersecurity has been shifting from reactive defenses (detect &#38; respond) toward preemptive strategies - to anticipate, block, or at least delay attackers before they penetrate deeply. ]]></description><link>https://www.labyrinth.tech/post/before-the-breach-why-proactive-security-is-your-key-priority</link><guid isPermaLink="false">69d6392e803e1156065d2a84</guid><pubDate>Wed, 08 Apr 2026 11:33:29 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f2991_42832db9276b4ccf80826eed75f869cd~mv2.png/v1/fit/w_1000,h_857,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Dmytro Matrosov</dc:creator></item></channel></rss>