<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>ZeroShare Security Blog</title>
    <link>https://deployzeroshare.com/blog</link>
    <description>Expert insights on AI security, data protection, and compliance. Learn how to protect your organization from AI-related data leaks with actionable strategies from security professionals.</description>
    <language>en-us</language>
    <lastBuildDate>Thu, 09 Apr 2026 14:55:06 GMT</lastBuildDate>
    <pubDate>Tue, 20 Jan 2026 09:00:00 GMT</pubDate>
    <ttl>60</ttl>
    <atom:link href="https://deployzeroshare.com/feed.xml" rel="self" type="application/rss+xml"/>
    <image>
      <url>https://deployzeroshare.com/logo_150x150.png</url>
      <title>ZeroShare Security Blog</title>
      <link>https://deployzeroshare.com/blog</link>
      <width>150</width>
      <height>150</height>
    </image>
    <copyright>Copyright 2026 ZeroShare, Inc. All rights reserved.</copyright>
    <managingEditor>blog@deployzeroshare.com (ZeroShare Editorial Team)</managingEditor>
    <webMaster>webmaster@deployzeroshare.com (ZeroShare Web Team)</webMaster>
    <category>Technology</category>
    <category>Cybersecurity</category>
    <category>AI Security</category>
    <category>Enterprise Security</category>
    <generator>ZeroShare Feed Generator</generator>
    <docs>https://www.rssboard.org/rss-specification</docs>

    <item>
      <title>How to Prevent PII Leaks When Your Team Uses AI Chatbots</title>
      <link>https://deployzeroshare.com/blog/prevent-pii-leaks-ai-chatbots</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/prevent-pii-leaks-ai-chatbots</guid>
      <pubDate>Tue, 20 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>Sarah Chen</dc:creator>
      <category>Security Best Practices</category>
      <description>New research shows 22% of files uploaded to AI tools contain sensitive data. Learn how to protect your organization from the growing threat of AI-enabled data leaks.</description>
      <content:encoded><![CDATA[<p>New research shows 22% of files uploaded to AI tools contain sensitive data. In Q2 2025, Harmonic Security analyzed over 1 million generative AI prompts and 20,000 uploaded files across 300 AI tools.</p><p><a href="https://deployzeroshare.com/blog/prevent-pii-leaks-ai-chatbots">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>The Complete Guide to AI Security Compliance in 2026</title>
      <link>https://deployzeroshare.com/blog/ai-security-compliance-guide-2026</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-security-compliance-guide-2026</guid>
      <pubDate>Sun, 18 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>Michael Rodriguez</dc:creator>
      <category>Compliance</category>
      <description>From HIPAA modernization to SEC AI disclosure requirements, navigate the new regulatory landscape with this comprehensive compliance guide.</description>
      <content:encoded><![CDATA[<p>2026 marks a turning point in AI regulation. The EU AI Act is in full enforcement. HIPAA Security Rule modernization introduces prescriptive AI requirements.</p><p><a href="https://deployzeroshare.com/blog/ai-security-compliance-guide-2026">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Implementing Zero Trust Architecture for AI Applications</title>
      <link>https://deployzeroshare.com/blog/zero-trust-ai-architecture</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/zero-trust-ai-architecture</guid>
      <pubDate>Thu, 15 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>David Kim</dc:creator>
      <category>Architecture</category>
      <description>Traditional perimeter security fails for AI. Learn how to apply zero trust principles to protect your organization while enabling AI productivity.</description>
      <content:encoded><![CDATA[<p>The traditional enterprise security model assumed a secure perimeter. AI has demolished this assumption entirely. Zero trust provides the framework for securing AI usage.</p><p><a href="https://deployzeroshare.com/blog/zero-trust-ai-architecture">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Stop Secrets from Leaking to AI Code Assistants</title>
      <link>https://deployzeroshare.com/blog/secrets-detection-ai-code-assistants</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/secrets-detection-ai-code-assistants</guid>
      <pubDate>Mon, 12 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>Emily Watson</dc:creator>
      <category>DevSecOps</category>
      <description>Researchers extracted 2,702 real credentials from GitHub Copilot. Your developers are at risk. Here&apos;s how to protect your secrets.</description>
      <content:encoded><![CDATA[<p>Security researchers extracted 2,702 hard-coded credentials from GitHub Copilot and 129 from Amazon CodeWhisperer in controlled studies.</p><p><a href="https://deployzeroshare.com/blog/secrets-detection-ai-code-assistants">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Building an Enterprise AI Governance Framework</title>
      <link>https://deployzeroshare.com/blog/enterprise-ai-governance-framework</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/enterprise-ai-governance-framework</guid>
      <pubDate>Thu, 08 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>Sarah Chen</dc:creator>
      <category>Governance</category>
      <description>With 20% of breaches now involving shadow AI, governance isn&apos;t optional. Learn how to build a framework that enables innovation while managing risk.</description>
      <content:encoded><![CDATA[<p>Twenty percent of data breaches in 2025 involved shadow AI. AI governance has shifted from nice-to-have to business imperative.</p><p><a href="https://deployzeroshare.com/blog/enterprise-ai-governance-framework">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>AI Proxy Gateways Explained: The Security Layer Your AI Stack Needs</title>
      <link>https://deployzeroshare.com/blog/ai-proxy-gateway-explained</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-proxy-gateway-explained</guid>
      <pubDate>Mon, 05 Jan 2026 09:00:00 GMT</pubDate>
      <dc:creator>Michael Rodriguez</dc:creator>
      <category>Technology</category>
      <description>With 72.6% of sensitive AI prompts going to ChatGPT alone, you need a security layer that works across all AI tools. Here&apos;s how AI gateways work.</description>
      <content:encoded><![CDATA[<p>ChatGPT accounts for 72.6% of all sensitive prompts analyzed by security researchers. You need a security layer that works across all AI tools.</p><p><a href="https://deployzeroshare.com/blog/ai-proxy-gateway-explained">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Shadow AI: The $670K Hidden Cost in Every Data Breach</title>
      <link>https://deployzeroshare.com/blog/shadow-ai-670k-breach-cost</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/shadow-ai-670k-breach-cost</guid>
      <pubDate>Sun, 28 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>Sarah Chen</dc:creator>
      <category>Security Best Practices</category>
      <description>98% of organizations have employees using unsanctioned AI tools. New research reveals shadow AI increases breach costs by $670,000 on average.</description>
      <content:encoded><![CDATA[<p>98% of organizations have employees using unsanctioned AI tools. New research reveals shadow AI increases breach costs by $670,000 on average.</p><p><a href="https://deployzeroshare.com/blog/shadow-ai-670k-breach-cost">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>HIPAA\</title>
      <link>https://deployzeroshare.com/blog/hipaa-ai-requirements-2026</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/hipaa-ai-requirements-2026</guid>
      <pubDate>Mon, 22 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>Dr. Amanda Foster</dc:creator>
      <category>Compliance</category>
      <description>The 2026 HIPAA Security Rule modernization introduces prescriptive AI requirements. Here&apos;s what healthcare CISOs need to prepare for.</description>
      <content:encoded><![CDATA[<p>The 2026 HIPAA Security Rule modernization introduces prescriptive AI requirements. Here's what healthcare CISOs need to prepare for.</p><p><a href="https://deployzeroshare.com/blog/hipaa-ai-requirements-2026">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>AI Data Loss Prevention: 5 Architecture Patterns That Work</title>
      <link>https://deployzeroshare.com/blog/ai-dlp-architecture-patterns</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-dlp-architecture-patterns</guid>
      <pubDate>Thu, 18 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>David Kim</dc:creator>
      <category>Architecture</category>
      <description>Not all AI DLP architectures are created equal. We compare proxy, endpoint, API, and hybrid approaches with real performance data.</description>
      <content:encoded><![CDATA[<p>Not all AI DLP architectures are created equal. We compare proxy, endpoint, API, and hybrid approaches with real performance data.</p><p><a href="https://deployzeroshare.com/blog/ai-dlp-architecture-patterns">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Securing Your CI/CD Pipeline When Developers Use AI Assistants</title>
      <link>https://deployzeroshare.com/blog/secure-cicd-ai-assistants</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/secure-cicd-ai-assistants</guid>
      <pubDate>Mon, 15 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>Emily Watson</dc:creator>
      <category>DevSecOps</category>
      <description>AI coding assistants are transforming development workflows. Here&apos;s how to maintain security without killing productivity.</description>
      <content:encoded><![CDATA[<p>AI coding assistants are transforming development workflows. Here's how to maintain security without killing productivity.</p><p><a href="https://deployzeroshare.com/blog/secure-cicd-ai-assistants">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>The Enterprise AI Acceptable Use Policy Template You Can Actually Use</title>
      <link>https://deployzeroshare.com/blog/ai-acceptable-use-policy-template</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-acceptable-use-policy-template</guid>
      <pubDate>Fri, 12 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>Michael Rodriguez</dc:creator>
      <category>Governance</category>
      <description>Most AI policies are either too vague or too restrictive. Download our battle-tested template based on real enterprise deployments.</description>
      <content:encoded><![CDATA[<p>Most AI policies are either too vague or too restrictive. Download our battle-tested template based on real enterprise deployments.</p><p><a href="https://deployzeroshare.com/blog/ai-acceptable-use-policy-template">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>LLM Security Fundamentals Every Security Team Should Know</title>
      <link>https://deployzeroshare.com/blog/llm-security-fundamentals</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/llm-security-fundamentals</guid>
      <pubDate>Mon, 08 Dec 2025 09:00:00 GMT</pubDate>
      <dc:creator>James Park</dc:creator>
      <category>Technology</category>
      <description>From prompt injection to training data extraction, understand the unique security challenges of large language models.</description>
      <content:encoded><![CDATA[<p>From prompt injection to training data extraction, understand the unique security challenges of large language models.</p><p><a href="https://deployzeroshare.com/blog/llm-security-fundamentals">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>ChatGPT Enterprise Security: An Honest Assessment</title>
      <link>https://deployzeroshare.com/blog/chatgpt-enterprise-security-review</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/chatgpt-enterprise-security-review</guid>
      <pubDate>Fri, 28 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>Sarah Chen</dc:creator>
      <category>Security Best Practices</category>
      <description>We put ChatGPT Enterprise through rigorous security testing. Here&apos;s what we found—good and bad.</description>
      <content:encoded><![CDATA[<p>We put ChatGPT Enterprise through rigorous security testing. Here's what we found—good and bad.</p><p><a href="https://deployzeroshare.com/blog/chatgpt-enterprise-security-review">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>SOC 2 Controls for AI: The Auditor\</title>
      <link>https://deployzeroshare.com/blog/soc2-ai-controls-guide</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/soc2-ai-controls-guide</guid>
      <pubDate>Mon, 24 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>Rachel Thompson</dc:creator>
      <category>Compliance</category>
      <description>What do SOC 2 auditors actually look for when assessing AI controls? A former Big 4 auditor shares insights.</description>
      <content:encoded><![CDATA[<p>What do SOC 2 auditors actually look for when assessing AI controls? A former Big 4 auditor shares insights.</p><p><a href="https://deployzeroshare.com/blog/soc2-ai-controls-guide">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Integrating AI Gateways into Microservices Architecture</title>
      <link>https://deployzeroshare.com/blog/microservices-ai-gateway-integration</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/microservices-ai-gateway-integration</guid>
      <pubDate>Thu, 20 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>David Kim</dc:creator>
      <category>Architecture</category>
      <description>Practical patterns for adding AI security controls to your microservices without creating bottlenecks.</description>
      <content:encoded><![CDATA[<p>Practical patterns for adding AI security controls to your microservices without creating bottlenecks.</p><p><a href="https://deployzeroshare.com/blog/microservices-ai-gateway-integration">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Every GitHub Copilot Security Setting Explained</title>
      <link>https://deployzeroshare.com/blog/github-copilot-security-settings</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/github-copilot-security-settings</guid>
      <pubDate>Sat, 15 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>Emily Watson</dc:creator>
      <category>DevSecOps</category>
      <description>A comprehensive walkthrough of GitHub Copilot&apos;s security configurations and what they actually do.</description>
      <content:encoded><![CDATA[<p>A comprehensive walkthrough of GitHub Copilot's security configurations and what they actually do.</p><p><a href="https://deployzeroshare.com/blog/github-copilot-security-settings">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Building Your AI Risk Register: A Practical Framework</title>
      <link>https://deployzeroshare.com/blog/ai-risk-register-template</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-risk-register-template</guid>
      <pubDate>Mon, 10 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>Michael Rodriguez</dc:creator>
      <category>Governance</category>
      <description>Risk registers for AI look different than traditional IT risks. Here&apos;s how to build one that actually helps.</description>
      <content:encoded><![CDATA[<p>Risk registers for AI look different than traditional IT risks. Here's how to build one that actually helps.</p><p><a href="https://deployzeroshare.com/blog/ai-risk-register-template">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>Prompt Injection Attacks: How They Work and How to Defend</title>
      <link>https://deployzeroshare.com/blog/prompt-injection-attacks-explained</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/prompt-injection-attacks-explained</guid>
      <pubDate>Wed, 05 Nov 2025 09:00:00 GMT</pubDate>
      <dc:creator>James Park</dc:creator>
      <category>Technology</category>
      <description>Prompt injection is the SQL injection of the AI era. Deep dive into attack vectors and defense strategies.</description>
      <content:encoded><![CDATA[<p>Prompt injection is the SQL injection of the AI era. Deep dive into attack vectors and defense strategies.</p><p><a href="https://deployzeroshare.com/blog/prompt-injection-attacks-explained">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>How to Justify Your AI Security Budget to the Board</title>
      <link>https://deployzeroshare.com/blog/ai-security-budget-justification</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/ai-security-budget-justification</guid>
      <pubDate>Tue, 28 Oct 2025 09:00:00 GMT</pubDate>
      <dc:creator>Sarah Chen</dc:creator>
      <category>Security Best Practices</category>
      <description>Translate AI security risks into business impact with this framework for executive communication.</description>
      <content:encoded><![CDATA[<p>Translate AI security risks into business impact with this framework for executive communication.</p><p><a href="https://deployzeroshare.com/blog/ai-security-budget-justification">Read the full article →</a></p>]]></content:encoded>
    </item>

    <item>
      <title>GDPR and AI: Data Processing Requirements You\</title>
      <link>https://deployzeroshare.com/blog/gdpr-ai-processing-requirements</link>
      <guid isPermaLink="true">https://deployzeroshare.com/blog/gdpr-ai-processing-requirements</guid>
      <pubDate>Fri, 24 Oct 2025 09:00:00 GMT</pubDate>
      <dc:creator>Dr. Amanda Foster</dc:creator>
      <category>Compliance</category>
      <description>The EDPS released new AI guidance in October 2025. Here&apos;s what changed and what you need to do.</description>
      <content:encoded><![CDATA[<p>The EDPS released new AI guidance in October 2025. Here's what changed and what you need to do.</p><p><a href="https://deployzeroshare.com/blog/gdpr-ai-processing-requirements">Read the full article →</a></p>]]></content:encoded>
    </item>
  </channel>
</rss>
