<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>News and Press</title>
    <link>https://blog.acceptto.com/news-and-press</link>
    <description>Latest news mentions of Acceptto in the press and media</description>
    <language>en-us</language>
    <pubDate>Wed, 25 Mar 2020 21:28:04 GMT</pubDate>
    <dc:date>2020-03-25T21:28:04Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>Security Magazine: Major Mobile Carriers Are Teaming Up to Eliminate Passwords</title>
      <link>https://blog.acceptto.com/news-and-press/mobile-carriers-to-eliminate-passwords</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/mobile-carriers-to-eliminate-passwords" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/SecurityWeek20-Zenkey-Social.png" alt="Security Magazine: Major Mobile Carriers Are Teaming Up to Eliminate Passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Insights from Acceptto CEO Shahrokh Shahidzadeh.&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/mobile-carriers-to-eliminate-passwords" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/SecurityWeek20-Zenkey-Social.png" alt="Security Magazine: Major Mobile Carriers Are Teaming Up to Eliminate Passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Insights from Acceptto CEO Shahrokh Shahidzadeh.&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fmobile-carriers-to-eliminate-passwords&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>passwordless continuous authentication</category>
      <category>mobile carriers</category>
      <category>eliminate passwords</category>
      <pubDate>Wed, 25 Mar 2020 21:28:04 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/mobile-carriers-to-eliminate-passwords</guid>
      <dc:date>2020-03-25T21:28:04Z</dc:date>
    </item>
    <item>
      <title>TheStreet: 15 Coronavirus Online Scams to Watch Out For</title>
      <link>https://blog.acceptto.com/news-and-press/coronavirus-online-scams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/coronavirus-online-scams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/TheStreet20-Corona-Social.png" alt="TheStreet: 15 Coronavirus Online Scams to Watch Out For" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our Principal Architect, Fausto Oliveira&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/coronavirus-online-scams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/TheStreet20-Corona-Social.png" alt="TheStreet: 15 Coronavirus Online Scams to Watch Out For" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our Principal Architect, Fausto Oliveira&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fcoronavirus-online-scams&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>coronavirus scams</category>
      <pubDate>Mon, 23 Mar 2020 21:38:15 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/coronavirus-online-scams</guid>
      <dc:date>2020-03-23T21:38:15Z</dc:date>
    </item>
    <item>
      <title>Security Magazine:Open Exchange Rates Data Breach Leaks Passwords and User Information</title>
      <link>https://blog.acceptto.com/news-and-press/data-breach-open-exchange-rates</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/data-breach-open-exchange-rates" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-Leak-Social.png" alt="Security Magazine:Open Exchange Rates Data Breach Leaks Passwords and User Information" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/data-breach-open-exchange-rates" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-Leak-Social.png" alt="Security Magazine:Open Exchange Rates Data Breach Leaks Passwords and User Information" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fdata-breach-open-exchange-rates&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>identity authentication</category>
      <category>cybersecurity</category>
      <category>data leak</category>
      <category>open exchange rates</category>
      <pubDate>Wed, 18 Mar 2020 22:22:40 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/data-breach-open-exchange-rates</guid>
      <dc:date>2020-03-18T22:22:40Z</dc:date>
    </item>
    <item>
      <title>Security Magazine: What’s Driving Identity Access Management in 2020?</title>
      <link>https://blog.acceptto.com/news-and-press/iam-2020-predictions</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/iam-2020-predictions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-IDM-Social.png" alt="Security Magazine: What’s Driving Identity Access Management in 2020?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/iam-2020-predictions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-IDM-Social.png" alt="Security Magazine: What’s Driving Identity Access Management in 2020?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fiam-2020-predictions&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI</category>
      <category>identity authentication</category>
      <category>cybersecurity</category>
      <category>passwordless authentication</category>
      <category>iam solutions</category>
      <pubDate>Tue, 10 Mar 2020 22:57:09 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/iam-2020-predictions</guid>
      <dc:date>2020-03-10T22:57:09Z</dc:date>
    </item>
    <item>
      <title>Journal of Cyber Policy: Seeking The Root Causes of Cyber Insecurity Part III: People</title>
      <link>https://blog.acceptto.com/news-and-press/seeking-the-root</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/seeking-the-root" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Journal20-CyberInsecurity-Social.png" alt="Journal of Cyber Policy: Seeking The Root Causes of Cyber Insecurity Part III: People" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/seeking-the-root" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Journal20-CyberInsecurity-Social.png" alt="Journal of Cyber Policy: Seeking The Root Causes of Cyber Insecurity Part III: People" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Perspective from our CEO, Shahrokh Shahidzadeh&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fseeking-the-root&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>passwordless authentication</category>
      <category>iam solutions</category>
      <pubDate>Fri, 06 Mar 2020 17:51:00 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/seeking-the-root</guid>
      <dc:date>2020-03-06T17:51:00Z</dc:date>
    </item>
    <item>
      <title>Security: Walgreens Announces its Mobile App Leaks Personal Data</title>
      <link>https://blog.acceptto.com/news-and-press/walgreens-app-leaks-personal-data</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/walgreens-app-leaks-personal-data" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-Walgreens-Social.png" alt="Security: Walgreens Announces its Mobile App Leaks Personal Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Perspective from our Fausto&lt;/span&gt;&lt;span style="background-color: transparent; font-family: 'Open Sans', sans-serif;"&gt; Oliveira, principal security architect &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/walgreens-app-leaks-personal-data" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Security20-Walgreens-Social.png" alt="Security: Walgreens Announces its Mobile App Leaks Personal Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Perspective from our Fausto&lt;/span&gt;&lt;span style="background-color: transparent; font-family: 'Open Sans', sans-serif;"&gt; Oliveira, principal security architect &lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fwalgreens-app-leaks-personal-data&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>data leak</category>
      <category>walgreens</category>
      <category>personal data</category>
      <pubDate>Mon, 02 Mar 2020 18:25:00 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/walgreens-app-leaks-personal-data</guid>
      <dc:date>2020-03-02T18:25:00Z</dc:date>
    </item>
    <item>
      <title>threatpost: Walgreens Mobile App Leaks Prescription Data</title>
      <link>https://blog.acceptto.com/news-and-press/walgreens-app-leaks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/walgreens-app-leaks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Threatpost20-Walgreens-Social.png" alt="threatpost: Walgreens Mobile App Leaks Prescription Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Perspective from our Fausto&lt;/span&gt;&lt;span style="background-color: transparent; font-family: 'Open Sans', sans-serif;"&gt; Oliveira, principal security architect &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/walgreens-app-leaks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Threatpost20-Walgreens-Social.png" alt="threatpost: Walgreens Mobile App Leaks Prescription Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;Perspective from our Fausto&lt;/span&gt;&lt;span style="background-color: transparent; font-family: 'Open Sans', sans-serif;"&gt; Oliveira, principal security architect &lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fwalgreens-app-leaks&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>data leak</category>
      <category>walgreens</category>
      <pubDate>Mon, 02 Mar 2020 18:22:00 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/walgreens-app-leaks</guid>
      <dc:date>2020-03-02T18:22:00Z</dc:date>
    </item>
    <item>
      <title>DARKReading: Truth about disinformation campaigns</title>
      <link>https://blog.acceptto.com/news-and-press/darkreading-fake-news</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/darkreading-fake-news" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/DarkReading20-FakeNews-Social%20%281%29.png" alt="DARKReading: Truth about disinformation campaigns" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="line-height: 16.45pt; background: white; margin: 12.0pt 0in 12.0pt 0in;"&gt;&lt;a href="https://www.linkedin.com/in/faustoo/"&gt;Fausto Oliveira&lt;/a&gt;, principal security architect at Acceptto, shared with DARKReading his view points.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/darkreading-fake-news" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/DarkReading20-FakeNews-Social%20%281%29.png" alt="DARKReading: Truth about disinformation campaigns" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="line-height: 16.45pt; background: white; margin: 12.0pt 0in 12.0pt 0in;"&gt;&lt;a href="https://www.linkedin.com/in/faustoo/"&gt;Fausto Oliveira&lt;/a&gt;, principal security architect at Acceptto, shared with DARKReading his view points.&lt;br&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fdarkreading-fake-news&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>DarkReading</category>
      <category>fake news</category>
      <pubDate>Fri, 28 Feb 2020 19:33:00 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/darkreading-fake-news</guid>
      <dc:date>2020-02-28T19:33:00Z</dc:date>
    </item>
    <item>
      <title>Press Release: Acceptto Wins 4 Cybersecurity Excellence Awards</title>
      <link>https://blog.acceptto.com/news-and-press/wins-cybersecurity-excellence-awards</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/wins-cybersecurity-excellence-awards" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Cyber20-Winner-Social.png" alt="Press Release: Acceptto Wins 4 Cybersecurity Excellence Awards" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;i&gt;Acceptto Shines Bright in Four Categories of the 2020 Cybersecurity Excellence Awards&lt;/i&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/wins-cybersecurity-excellence-awards" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/Cyber20-Winner-Social.png" alt="Press Release: Acceptto Wins 4 Cybersecurity Excellence Awards" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;i&gt;Acceptto Shines Bright in Four Categories of the 2020 Cybersecurity Excellence Awards&lt;/i&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fwins-cybersecurity-excellence-awards&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>press release</category>
      <category>Cybersecurity Excellence Awards</category>
      <pubDate>Thu, 27 Feb 2020 17:48:52 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/wins-cybersecurity-excellence-awards</guid>
      <dc:date>2020-02-27T17:48:52Z</dc:date>
    </item>
    <item>
      <title>VMBlog: Q&amp;A with Acceptto at 2020 RSA Conference</title>
      <link>https://blog.acceptto.com/news-and-press/vmblog-rsa-2020</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/vmblog-rsa-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/RSA20-VmBlog-Social%20%281%29.png" alt="VMBlog: Q&amp;amp;A with Acceptto at 2020 RSA Conference" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Are you at the RSA Conference this week?&amp;nbsp;&lt;/span&gt; 
&lt;br&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.acceptto.com/news-and-press/vmblog-rsa-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.acceptto.com/hubfs/RSA20-VmBlog-Social%20%281%29.png" alt="VMBlog: Q&amp;amp;A with Acceptto at 2020 RSA Conference" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span&gt;Are you at the RSA Conference this week?&amp;nbsp;&lt;/span&gt; 
&lt;br&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4977541&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.acceptto.com%2Fnews-and-press%2Fvmblog-rsa-2020&amp;amp;bu=https%253A%252F%252Fblog.acceptto.com%252Fnews-and-press&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>IAM</category>
      <category>RSA</category>
      <category>cybersecurity</category>
      <category>iam solutions</category>
      <category>2020</category>
      <category>RSA2020</category>
      <pubDate>Wed, 26 Feb 2020 23:16:26 GMT</pubDate>
      <author>adement@gmail.com (Anna Dement)</author>
      <guid>https://blog.acceptto.com/news-and-press/vmblog-rsa-2020</guid>
      <dc:date>2020-02-26T23:16:26Z</dc:date>
    </item>
  </channel>
</rss>
