<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://consortium.net/blog</link>
    <description>Blog</description>
    <language>en</language>
    <pubDate>Wed, 04 Feb 2026 00:23:52 GMT</pubDate>
    <dc:date>2026-02-04T00:23:52Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Security Advisory: OpenClaw/Moltbot AI Agents</title>
      <link>https://consortium.net/blog/security-advisory-openclaw-moltbot-ai-agents</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/security-advisory-openclaw-moltbot-ai-agents" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20sleek%20modern%20digital%20workspace%20filled%20with%20vibrant%20colors%20and%20hightech%20elements%20In%20the%20foreground%20a%20computer%20screen%20displays%20a%20com-1.png" alt="Security Advisory: OpenClaw/Moltbot AI Agents" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;February 2026&lt;/span&gt; —&amp;nbsp;&lt;span&gt;OpenClaw is an open-source AI coding agent that runs locally and interacts with your system through natural language. It can read and write files, execute shell commands, browse the web, and integrate with services like email, Slack, Jira, and GitHub. Moltbot extends this with a social layer — agent scan communicate with each other, share context, and coordinate tasks across installations.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/security-advisory-openclaw-moltbot-ai-agents" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20sleek%20modern%20digital%20workspace%20filled%20with%20vibrant%20colors%20and%20hightech%20elements%20In%20the%20foreground%20a%20computer%20screen%20displays%20a%20com-1.png" alt="Security Advisory: OpenClaw/Moltbot AI Agents" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;February 2026&lt;/span&gt; —&amp;nbsp;&lt;span&gt;OpenClaw is an open-source AI coding agent that runs locally and interacts with your system through natural language. It can read and write files, execute shell commands, browse the web, and integrate with services like email, Slack, Jira, and GitHub. Moltbot extends this with a social layer — agent scan communicate with each other, share context, and coordinate tasks across installations.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fsecurity-advisory-openclaw-moltbot-ai-agents&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI</category>
      <category>Security Advisory</category>
      <category>Threat Intelligence</category>
      <pubDate>Tue, 03 Feb 2026 16:22:16 GMT</pubDate>
      <author>max.kovalsky@consortium.net (Max Kovalsky)</author>
      <guid>https://consortium.net/blog/security-advisory-openclaw-moltbot-ai-agents</guid>
      <dc:date>2026-02-03T16:22:16Z</dc:date>
    </item>
    <item>
      <title>Consortium Completes SOC 2 Type II Audit, Underscoring Deep Commitment to Client Security</title>
      <link>https://consortium.net/blog/consortium-achieves-soc-2-type-ii-certification-underscoring-deep-commitment-to-client-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-achieves-soc-2-type-ii-certification-underscoring-deep-commitment-to-client-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/A%20modern%20futuristic%20cybersecurity%20company%20celebrating%20SOC%202%20Type%20II%20certification%20Visualize%20trust%20security%20and%20data%20protection%20%20metallic%20shields%20glowi-1.png" alt="Consortium Completes SOC 2 Type II Audit, Underscoring Deep Commitment to Client Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Consortium, a next-generation value-added reseller delivering tailored cybersecurity solutions and expert advisory services, today announced the successful completion of its SOC 2 Type II audit. This milestone reaffirms the company’s deep commitment to safeguarding client data and maintaining the highest standards of security and operational excellence throughout Consortium and Metrics that Matter®.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-achieves-soc-2-type-ii-certification-underscoring-deep-commitment-to-client-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/A%20modern%20futuristic%20cybersecurity%20company%20celebrating%20SOC%202%20Type%20II%20certification%20Visualize%20trust%20security%20and%20data%20protection%20%20metallic%20shields%20glowi-1.png" alt="Consortium Completes SOC 2 Type II Audit, Underscoring Deep Commitment to Client Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Consortium, a next-generation value-added reseller delivering tailored cybersecurity solutions and expert advisory services, today announced the successful completion of its SOC 2 Type II audit. This milestone reaffirms the company’s deep commitment to safeguarding client data and maintaining the highest standards of security and operational excellence throughout Consortium and Metrics that Matter®.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fconsortium-achieves-soc-2-type-ii-certification-underscoring-deep-commitment-to-client-security&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cyber Security</category>
      <category>Compliance</category>
      <category>SOC</category>
      <pubDate>Mon, 01 Dec 2025 21:24:17 GMT</pubDate>
      <guid>https://consortium.net/blog/consortium-achieves-soc-2-type-ii-certification-underscoring-deep-commitment-to-client-security</guid>
      <dc:date>2025-12-01T21:24:17Z</dc:date>
      <dc:creator>Consortium</dc:creator>
    </item>
    <item>
      <title>Navigating Generative AI Risks</title>
      <link>https://consortium.net/blog/navigating-generative-ai-risks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/navigating-generative-ai-risks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Screenshot%202025-10-29%20at%207.59.54%20AM.png" alt="Navigating Generative AI Risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Introduction&lt;/span&gt;&lt;br&gt;Generative AI is no longer a futuristic concept—it’s here, reshaping how organizations innovate, automate, and deliver value. In cybersecurity, AI plays two distinct roles that frame how we think about its impact: AI for Security acts as a force multiplier, enabling faster decision-making and a more agile, responsive defense posture. It helps security teams scale, automate repetitive tasks, and gain deeper insights from complex data. Security for AI focuses on addressing novel and amplified risks introduced by AI adoption, such as model reliability, data leakage, and identity challenges. It’s about building guardrails and governance to ensure AI systems remain safe, trustworthy, and secure.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/navigating-generative-ai-risks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Screenshot%202025-10-29%20at%207.59.54%20AM.png" alt="Navigating Generative AI Risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Introduction&lt;/span&gt;&lt;br&gt;Generative AI is no longer a futuristic concept—it’s here, reshaping how organizations innovate, automate, and deliver value. In cybersecurity, AI plays two distinct roles that frame how we think about its impact: AI for Security acts as a force multiplier, enabling faster decision-making and a more agile, responsive defense posture. It helps security teams scale, automate repetitive tasks, and gain deeper insights from complex data. Security for AI focuses on addressing novel and amplified risks introduced by AI adoption, such as model reliability, data leakage, and identity challenges. It’s about building guardrails and governance to ensure AI systems remain safe, trustworthy, and secure.&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fnavigating-generative-ai-risks&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cyber Security</category>
      <category>blog</category>
      <category>AI</category>
      <pubDate>Fri, 14 Nov 2025 14:28:32 GMT</pubDate>
      <guid>https://consortium.net/blog/navigating-generative-ai-risks</guid>
      <dc:date>2025-11-14T14:28:32Z</dc:date>
      <dc:creator>Maxim Kovalsky</dc:creator>
    </item>
    <item>
      <title>Pig-Butchering Scams are on the Rise - Here's how to Protect Your Organization</title>
      <link>https://consortium.net/blog/pig-butchering-scams-are-on-the-rise-heres-how-to-protect-your-organization</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/pig-butchering-scams-are-on-the-rise-heres-how-to-protect-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Pig%20butchering.png" alt="Pig-Butchering Scams are on the Rise - Here's how to Protect Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;span style="font-weight: bold;"&gt;The Hidden Danger Behind a "Wrong Number" Text&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Have you ever gotten a text from an unknown number asking if you’d like to grab coffee, reconnect, or maybe even step outside for a smoke? It might seem harmless — even a little funny — but that message could be the start of something far more sinister. These casual “wrong number” texts are the first move in a sophisticated social-engineering scheme known as a &lt;/span&gt;&lt;i&gt;&lt;span&gt;pig-butchering scam. &lt;/span&gt;&lt;/i&gt;&lt;span&gt;The term originated in China, where &lt;/span&gt;&lt;i&gt;&lt;span&gt;shā zhū pán&lt;/span&gt;&lt;/i&gt;&lt;span&gt; (&lt;/span&gt;&lt;span&gt;杀猪盘&lt;/span&gt;&lt;span&gt;) literally means “to fatten the pig before slaughter.” It’s a chilling metaphor for how scammers operate: they build trust over time, convincing their targets that they’re forming a genuine relationship — a friendship, romance, or business connection — before coaxing them into fake investment opportunities. Once the victim is “fat enough,” the scammer drains every cent and disappears. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;While the tactic isn’t new, the sophistication is. Advances in AI, deepfakes, and language models have made these scams more convincing than ever, allowing fraudsters to automate &lt;/span&gt;&lt;span&gt;realistic conversations and create fake trading dashboards or social media personas at scale. Think of it as a modern blend of phishing and catfishing — except instead of pretending to be your boss or a relative, scammers pose as charming strangers. Victims are lured through social media or “wrong number” outreach, groomed through weeks or months of friendly chatter, and eventually persuaded to invest in cryptocurrency or business “opportunities.” What starts as a friendly hello can end in financial ruin.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;The Rising Tide of Global Fraud&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;In recent years, the “fatten-then-slaughter” model behind pig-butchering scams has stormed into the American landscape with alarming intensity. According to a July 2025 report by the U.S.–China Economic and Security Review Commission (USCC), U.S. losses from China-linked fraud operations — including classic “pig-butchering” investment schemes — likely exceeded $5 billion in 2024, marking a more than 40% increase from the prior year. The escalating threat has prompted a strong federal response. In October, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) and Financial Crimes Enforcement Network (FinCEN), in coordination with the United Kingdom’s Foreign, Commonwealth, and Development Office (FCDO), imposed sanctions on the Prince Group Transnational Criminal Organization (Prince Group TCO) — a network of over 100 members known for orchestrating large-scale financial scams based on these very schemes. “The rapid rise of transnational fraud has cost American citizens billions of dollars, with life savings wiped out in minutes,” said Secretary of the Treasury Scott Bessent. “Treasury is taking action to protect Americans by cracking down on foreign scammers. Working in close coordination with federal law enforcement and international partners like the United Kingdom, Treasury will continue to lead efforts to safeguard Americans from predatory criminals.”&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Pig-butchering scams may start by targeting individuals, but their ripple effects can reach far beyond personal bank accounts. In a corporate setting, a single compromised employee — especially one with access to sensitive financial systems or executive credentials — can become the entry point for catastrophic losses. The reputational damage alone can be staggering; imagine the fallout if a senior employee at a trusted financial firm were publicly deceived by such a scheme. As these scams grow increasingly sophisticated through AI-driven manipulation and realistic fake identities, organizations can no longer afford to see them as personal problems. A recent Investopedia article (Oct 2025) underscores just how advanced these tactics have become, describing how scammers now use AI-generated personas, deepfake images, and long-game social engineering via dating apps, social media, and messaging platforms to lure victims into fraudulent cryptocurrency “investments.”&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;From Awareness to Action&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;All of this said, what was once considered a problem far away from American soil is now firmly a domestic concern. Financial institutions, fintechs, and cyber-fraud teams across the U.S. are beginning to confront the fact that pig-butchering isn’t just knocking — it’s already inside the door. At the heart of every pig-butchering scam lies a single vulnerability: human trust. That’s why education remains the strongest first line of defense. Employees who understand how these scams work — how that “wrong number” text can evolve into a full-scale investment con — are far less likely to fall victim. Regular awareness training, clear communication protocols, and simulated social-engineering exercises can drastically reduce exposure.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p style="font-weight: bold;"&gt;Solutions That Matter&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;At Consortium, we help organizations identify and implement the tools that make this possible. Whether it’s company-wide phishing and social-engineering simulations through platforms like KnowBe4, or advanced behavioral detection and CrowdStrike threat hunting to uncover early indicators of compromise, we work with our clients to build a layered, human-centric defense. The reality is that scams like pig-butchering aren’t going away — they’re evolving. But with the right combination of education, technology, and proactive threat visibility, organizations can turn their employees from potential targets into active defenders. If you’re ready to strengthen your human firewall, Consortium can help you find the right mix of training and technology to stay one step ahead.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;Information gathered from the following sources: &amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;em&gt;Internet Crime Complaint Center. (2022, October 3). Cryptocurrency investment schemes (Alert I-100322-PSA). FBI / IC3. https://www.ic3.gov/PSA/2022/psa221003&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Newman, L. H., &amp;amp; Burgess, M. (2024, December 17). Stop calling online scams “pig butchering,” INTERPOL warns. WIRED. https://www.wired.com/story/interpol-pig-butchering-scams-rename/&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Hayes, A. (2025, October 15). Pig butchering scams: What they are and the red flags you must spot early. Investopedia. https://www.investopedia.com/pig-butchering-scams-explained-11830383&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;U.S. Department of the Treasury. (n.d.). U.S. and U.K. take largest action ever targeting cybercriminal networks in Southeast Asia (Press Release SB-0278). https://home.treasury.gov/news/press-releases/sb0278&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Reddan, N. (2025, July 18). China-linked scam centers are increasingly targeting Americans. The Washington Post. https://www.washingtonpost.com/national-security/2025/07/18/china-scam-pig-butchering-congress/&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;TRM Labs. (n.d.). Unmasking pig butchering scams: The $4 billion crypto scheme preying on vulnerable investors. https://www.trmlabs.com/resources/blog/unmasking-pig-butchering-scams-the-4-billion-crypto-scheme-preying-on-vulnerable-investors&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;U.S.–China Economic and Security Review Commission. (n.d.). China’s exploitation of scam centers in Southeast Asia. https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/pig-butchering-scams-are-on-the-rise-heres-how-to-protect-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Pig%20butchering.png" alt="Pig-Butchering Scams are on the Rise - Here's how to Protect Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;span style="font-weight: bold;"&gt;The Hidden Danger Behind a "Wrong Number" Text&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Have you ever gotten a text from an unknown number asking if you’d like to grab coffee, reconnect, or maybe even step outside for a smoke? It might seem harmless — even a little funny — but that message could be the start of something far more sinister. These casual “wrong number” texts are the first move in a sophisticated social-engineering scheme known as a &lt;/span&gt;&lt;i&gt;&lt;span&gt;pig-butchering scam. &lt;/span&gt;&lt;/i&gt;&lt;span&gt;The term originated in China, where &lt;/span&gt;&lt;i&gt;&lt;span&gt;shā zhū pán&lt;/span&gt;&lt;/i&gt;&lt;span&gt; (&lt;/span&gt;&lt;span&gt;杀猪盘&lt;/span&gt;&lt;span&gt;) literally means “to fatten the pig before slaughter.” It’s a chilling metaphor for how scammers operate: they build trust over time, convincing their targets that they’re forming a genuine relationship — a friendship, romance, or business connection — before coaxing them into fake investment opportunities. Once the victim is “fat enough,” the scammer drains every cent and disappears. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;While the tactic isn’t new, the sophistication is. Advances in AI, deepfakes, and language models have made these scams more convincing than ever, allowing fraudsters to automate &lt;/span&gt;&lt;span&gt;realistic conversations and create fake trading dashboards or social media personas at scale. Think of it as a modern blend of phishing and catfishing — except instead of pretending to be your boss or a relative, scammers pose as charming strangers. Victims are lured through social media or “wrong number” outreach, groomed through weeks or months of friendly chatter, and eventually persuaded to invest in cryptocurrency or business “opportunities.” What starts as a friendly hello can end in financial ruin.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;The Rising Tide of Global Fraud&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;In recent years, the “fatten-then-slaughter” model behind pig-butchering scams has stormed into the American landscape with alarming intensity. According to a July 2025 report by the U.S.–China Economic and Security Review Commission (USCC), U.S. losses from China-linked fraud operations — including classic “pig-butchering” investment schemes — likely exceeded $5 billion in 2024, marking a more than 40% increase from the prior year. The escalating threat has prompted a strong federal response. In October, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) and Financial Crimes Enforcement Network (FinCEN), in coordination with the United Kingdom’s Foreign, Commonwealth, and Development Office (FCDO), imposed sanctions on the Prince Group Transnational Criminal Organization (Prince Group TCO) — a network of over 100 members known for orchestrating large-scale financial scams based on these very schemes. “The rapid rise of transnational fraud has cost American citizens billions of dollars, with life savings wiped out in minutes,” said Secretary of the Treasury Scott Bessent. “Treasury is taking action to protect Americans by cracking down on foreign scammers. Working in close coordination with federal law enforcement and international partners like the United Kingdom, Treasury will continue to lead efforts to safeguard Americans from predatory criminals.”&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;Pig-butchering scams may start by targeting individuals, but their ripple effects can reach far beyond personal bank accounts. In a corporate setting, a single compromised employee — especially one with access to sensitive financial systems or executive credentials — can become the entry point for catastrophic losses. The reputational damage alone can be staggering; imagine the fallout if a senior employee at a trusted financial firm were publicly deceived by such a scheme. As these scams grow increasingly sophisticated through AI-driven manipulation and realistic fake identities, organizations can no longer afford to see them as personal problems. A recent Investopedia article (Oct 2025) underscores just how advanced these tactics have become, describing how scammers now use AI-generated personas, deepfake images, and long-game social engineering via dating apps, social media, and messaging platforms to lure victims into fraudulent cryptocurrency “investments.”&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;From Awareness to Action&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;All of this said, what was once considered a problem far away from American soil is now firmly a domestic concern. Financial institutions, fintechs, and cyber-fraud teams across the U.S. are beginning to confront the fact that pig-butchering isn’t just knocking — it’s already inside the door. At the heart of every pig-butchering scam lies a single vulnerability: human trust. That’s why education remains the strongest first line of defense. Employees who understand how these scams work — how that “wrong number” text can evolve into a full-scale investment con — are far less likely to fall victim. Regular awareness training, clear communication protocols, and simulated social-engineering exercises can drastically reduce exposure.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p style="font-weight: bold;"&gt;Solutions That Matter&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;At Consortium, we help organizations identify and implement the tools that make this possible. Whether it’s company-wide phishing and social-engineering simulations through platforms like KnowBe4, or advanced behavioral detection and CrowdStrike threat hunting to uncover early indicators of compromise, we work with our clients to build a layered, human-centric defense. The reality is that scams like pig-butchering aren’t going away — they’re evolving. But with the right combination of education, technology, and proactive threat visibility, organizations can turn their employees from potential targets into active defenders. If you’re ready to strengthen your human firewall, Consortium can help you find the right mix of training and technology to stay one step ahead.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;Information gathered from the following sources: &amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;em&gt;Internet Crime Complaint Center. (2022, October 3). Cryptocurrency investment schemes (Alert I-100322-PSA). FBI / IC3. https://www.ic3.gov/PSA/2022/psa221003&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Newman, L. H., &amp;amp; Burgess, M. (2024, December 17). Stop calling online scams “pig butchering,” INTERPOL warns. WIRED. https://www.wired.com/story/interpol-pig-butchering-scams-rename/&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Hayes, A. (2025, October 15). Pig butchering scams: What they are and the red flags you must spot early. Investopedia. https://www.investopedia.com/pig-butchering-scams-explained-11830383&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;U.S. Department of the Treasury. (n.d.). U.S. and U.K. take largest action ever targeting cybercriminal networks in Southeast Asia (Press Release SB-0278). https://home.treasury.gov/news/press-releases/sb0278&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;Reddan, N. (2025, July 18). China-linked scam centers are increasingly targeting Americans. The Washington Post. https://www.washingtonpost.com/national-security/2025/07/18/china-scam-pig-butchering-congress/&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;TRM Labs. (n.d.). Unmasking pig butchering scams: The $4 billion crypto scheme preying on vulnerable investors. https://www.trmlabs.com/resources/blog/unmasking-pig-butchering-scams-the-4-billion-crypto-scheme-preying-on-vulnerable-investors&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;U.S.–China Economic and Security Review Commission. (n.d.). China’s exploitation of scam centers in Southeast Asia. https://www.uscc.gov/research/chinas-exploitation-scam-centers-southeast-asia&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fpig-butchering-scams-are-on-the-rise-heres-how-to-protect-your-organization&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>China</category>
      <category>News</category>
      <pubDate>Fri, 24 Oct 2025 17:08:39 GMT</pubDate>
      <guid>https://consortium.net/blog/pig-butchering-scams-are-on-the-rise-heres-how-to-protect-your-organization</guid>
      <dc:date>2025-10-24T17:08:39Z</dc:date>
      <dc:creator>Caroline Grace Parisher</dc:creator>
    </item>
    <item>
      <title>MCP Security: Why Your Standard Vendor Questionnaire Won't Cut It</title>
      <link>https://consortium.net/blog/mcp-security-why-your-standard-vendor-questionnaire-wont-cut-it</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/mcp-security-why-your-standard-vendor-questionnaire-wont-cut-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20modern%20office%20environment%20with%20a%20sleek%20hightech%20aesthetic%20In%20the%20foreground%20a%20diverse%20group%20of%20professionals%20is%20gathered%20around%20a-1.png" alt="MCP Security: Why Your Standard Vendor Questionnaire Won't Cut It" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/mcp-security-why-your-standard-vendor-questionnaire-wont-cut-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20modern%20office%20environment%20with%20a%20sleek%20hightech%20aesthetic%20In%20the%20foreground%20a%20diverse%20group%20of%20professionals%20is%20gathered%20around%20a-1.png" alt="MCP Security: Why Your Standard Vendor Questionnaire Won't Cut It" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fmcp-security-why-your-standard-vendor-questionnaire-wont-cut-it&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <pubDate>Thu, 16 Oct 2025 16:54:56 GMT</pubDate>
      <guid>https://consortium.net/blog/mcp-security-why-your-standard-vendor-questionnaire-wont-cut-it</guid>
      <dc:date>2025-10-16T16:54:56Z</dc:date>
      <dc:creator>Maxim Kovalsky</dc:creator>
    </item>
    <item>
      <title>Fal.Con 2025: AI, Cloud and the Agentic SOC - Consortium's Key Takeways</title>
      <link>https://consortium.net/blog/fal.con-2025-ai-cloud-and-the-agentic-soc-consortiums-key-takeways</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/fal.con-2025-ai-cloud-and-the-agentic-soc-consortiums-key-takeways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Image%20from%20iOS%20(1).jpg" alt="Fal.Con 2025: AI, Cloud and the Agentic SOC - Consortium's Key Takeways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="margin-top: 12pt; margin-right: 0in; margin-bottom: 12pt; padding-left: 0in;"&gt;&lt;span&gt;CrowdStrike’s annual &lt;strong&gt;Fal.Con 2025&lt;/strong&gt; conference in Las Vegas showcased a bold vision for cybersecurity’s future. As a Platinum Sponsor (and freshly awarded &lt;em&gt;Global Technical Champion of the Year&lt;/em&gt;), &lt;strong&gt;Consortium&lt;/strong&gt; had a front-row seat and even led four expert sessions on SOC transformation, IT deployment, AI-powered app development, and next-gen SIEM. For security leaders who couldn’t attend, we’ve distilled the most critical takeaways focusing on what matters for decision-makers evaluating CrowdStrike: the evolution of the Falcon platform, cloud security advancements, next-gen SIEM (Onum), and the rise of the AI-driven &lt;em&gt;Agentic SOC&lt;/em&gt;.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/fal.con-2025-ai-cloud-and-the-agentic-soc-consortiums-key-takeways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Image%20from%20iOS%20(1).jpg" alt="Fal.Con 2025: AI, Cloud and the Agentic SOC - Consortium's Key Takeways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="margin-top: 12pt; margin-right: 0in; margin-bottom: 12pt; padding-left: 0in;"&gt;&lt;span&gt;CrowdStrike’s annual &lt;strong&gt;Fal.Con 2025&lt;/strong&gt; conference in Las Vegas showcased a bold vision for cybersecurity’s future. As a Platinum Sponsor (and freshly awarded &lt;em&gt;Global Technical Champion of the Year&lt;/em&gt;), &lt;strong&gt;Consortium&lt;/strong&gt; had a front-row seat and even led four expert sessions on SOC transformation, IT deployment, AI-powered app development, and next-gen SIEM. For security leaders who couldn’t attend, we’ve distilled the most critical takeaways focusing on what matters for decision-makers evaluating CrowdStrike: the evolution of the Falcon platform, cloud security advancements, next-gen SIEM (Onum), and the rise of the AI-driven &lt;em&gt;Agentic SOC&lt;/em&gt;.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Ffal.con-2025-ai-cloud-and-the-agentic-soc-consortiums-key-takeways&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>News &amp; Events</category>
      <category>blog</category>
      <pubDate>Wed, 24 Sep 2025 15:22:38 GMT</pubDate>
      <guid>https://consortium.net/blog/fal.con-2025-ai-cloud-and-the-agentic-soc-consortiums-key-takeways</guid>
      <dc:date>2025-09-24T15:22:38Z</dc:date>
      <dc:creator>Consortium</dc:creator>
    </item>
    <item>
      <title>From Threat Detection to Risk Reduction</title>
      <link>https://consortium.net/blog/from-threat-detection-to-risk-reduction-consortium-and-crowdstrike-empower-leaders-to-quantify-and-act-on-cyber-risk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/from-threat-detection-to-risk-reduction-consortium-and-crowdstrike-empower-leaders-to-quantify-and-act-on-cyber-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Image-1.png" alt="From Threat Detection to Risk Reduction" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3 style="text-align: center;"&gt;&lt;span&gt;Consortium and CrowdStrike Empower Leaders to Quantify and Act on Cyber Risk&lt;/span&gt;&lt;/h3&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/from-threat-detection-to-risk-reduction-consortium-and-crowdstrike-empower-leaders-to-quantify-and-act-on-cyber-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Image-1.png" alt="From Threat Detection to Risk Reduction" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3 style="text-align: center;"&gt;&lt;span&gt;Consortium and CrowdStrike Empower Leaders to Quantify and Act on Cyber Risk&lt;/span&gt;&lt;/h3&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Ffrom-threat-detection-to-risk-reduction-consortium-and-crowdstrike-empower-leaders-to-quantify-and-act-on-cyber-risk&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Press Release</category>
      <pubDate>Mon, 22 Sep 2025 16:40:08 GMT</pubDate>
      <guid>https://consortium.net/blog/from-threat-detection-to-risk-reduction-consortium-and-crowdstrike-empower-leaders-to-quantify-and-act-on-cyber-risk</guid>
      <dc:date>2025-09-22T16:40:08Z</dc:date>
      <dc:creator>Consortium</dc:creator>
    </item>
    <item>
      <title>From Insight to Improvement: How Consortium and Corelight Strengthened Suricata Alert Visibility in CrowdStrike Next-Gen SIEM</title>
      <link>https://consortium.net/blog/from-insight-to-improvement-how-consortium-and-corelight-strengthened-suricata-alert-visibility-in-crowdstrike-next-gen-siem</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/from-insight-to-improvement-how-consortium-and-corelight-strengthened-suricata-alert-visibility-in-crowdstrike-next-gen-siem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Corelight%20Parser%20Blog%20Graphic@2x-1.jpg" alt="From Insight to Improvement: How Consortium and Corelight Strengthened Suricata Alert Visibility in CrowdStrike Next-Gen SIEM" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In cybersecurity, no single tool delivers complete protection in isolation—success is built on interoperability, insight, and collaboration. That belief is at the heart of the upcoming &lt;span style="font-weight: bold;"&gt;C4 initiative&lt;/span&gt; (Consortium, Corelight, Cribl, and CrowdStrike) on June 12th, 2025, which showcases how these platforms combine to deliver exceptional detection outcomes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/from-insight-to-improvement-how-consortium-and-corelight-strengthened-suricata-alert-visibility-in-crowdstrike-next-gen-siem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/Corelight%20Parser%20Blog%20Graphic@2x-1.jpg" alt="From Insight to Improvement: How Consortium and Corelight Strengthened Suricata Alert Visibility in CrowdStrike Next-Gen SIEM" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In cybersecurity, no single tool delivers complete protection in isolation—success is built on interoperability, insight, and collaboration. That belief is at the heart of the upcoming &lt;span style="font-weight: bold;"&gt;C4 initiative&lt;/span&gt; (Consortium, Corelight, Cribl, and CrowdStrike) on June 12th, 2025, which showcases how these platforms combine to deliver exceptional detection outcomes.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Ffrom-insight-to-improvement-how-consortium-and-corelight-strengthened-suricata-alert-visibility-in-crowdstrike-next-gen-siem&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>blog</category>
      <pubDate>Mon, 22 Sep 2025 15:41:18 GMT</pubDate>
      <author>jeffrey.serio@consortium.net (Jeffrey Serio)</author>
      <guid>https://consortium.net/blog/from-insight-to-improvement-how-consortium-and-corelight-strengthened-suricata-alert-visibility-in-crowdstrike-next-gen-siem</guid>
      <dc:date>2025-09-22T15:41:18Z</dc:date>
    </item>
    <item>
      <title>Consortium Wins 2025 CrowdStrike Global Technical Champion of the Year Award!</title>
      <link>https://consortium.net/blog/consortium-wins-2025-crowdstrike-global-technical-champion-of-the-year-award</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-wins-2025-crowdstrike-global-technical-champion-of-the-year-award" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/save%20(2).png" alt="Consortium Wins 2025 CrowdStrike Global Technical Champion of the Year Award!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: center;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Consortium Wins 2025 CrowdStrike Global Technical Champion of the Year Award!&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-wins-2025-crowdstrike-global-technical-champion-of-the-year-award" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/save%20(2).png" alt="Consortium Wins 2025 CrowdStrike Global Technical Champion of the Year Award!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: center;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Consortium Wins 2025 CrowdStrike Global Technical Champion of the Year Award!&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fconsortium-wins-2025-crowdstrike-global-technical-champion-of-the-year-award&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Award</category>
      <category>Press Release</category>
      <pubDate>Thu, 18 Sep 2025 02:26:06 GMT</pubDate>
      <guid>https://consortium.net/blog/consortium-wins-2025-crowdstrike-global-technical-champion-of-the-year-award</guid>
      <dc:date>2025-09-18T02:26:06Z</dc:date>
      <dc:creator>Consortium</dc:creator>
    </item>
    <item>
      <title>Resetting the Standard for Integrated, Outcome-Driven Security</title>
      <link>https://consortium.net/blog/consortium-crowdstrike-corelight-and-cribl-deliver-cybersecurity-synthesis-resetting-the-standard-for-integrated-outcome-driven-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-crowdstrike-corelight-and-cribl-deliver-cybersecurity-synthesis-resetting-the-standard-for-integrated-outcome-driven-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20modern%20office%20environment%20featuring%20a%20sleek%20openplan%20workspace%20adorned%20with%20hightech%20security%20equipment%20and%20large%20digital%20displays%20In%20the%20foreground%20a%20diverse%20team%20of%20cybersecurity%20professionals%20collaborates%20around%20a%20central%20table.png" alt="Resetting the Standard for Integrated, Outcome-Driven Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;em&gt;From identifying a critical detection gap to delivering a fully integrated, MITRE-aligned defense — Consortium advances SOC modernization and moves clients from insight to improvement.&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://consortium.net/blog/consortium-crowdstrike-corelight-and-cribl-deliver-cybersecurity-synthesis-resetting-the-standard-for-integrated-outcome-driven-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://consortium.net/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20modern%20office%20environment%20featuring%20a%20sleek%20openplan%20workspace%20adorned%20with%20hightech%20security%20equipment%20and%20large%20digital%20displays%20In%20the%20foreground%20a%20diverse%20team%20of%20cybersecurity%20professionals%20collaborates%20around%20a%20central%20table.png" alt="Resetting the Standard for Integrated, Outcome-Driven Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;em&gt;From identifying a critical detection gap to delivering a fully integrated, MITRE-aligned defense — Consortium advances SOC modernization and moves clients from insight to improvement.&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=48409505&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fconsortium.net%2Fblog%2Fconsortium-crowdstrike-corelight-and-cribl-deliver-cybersecurity-synthesis-resetting-the-standard-for-integrated-outcome-driven-security&amp;amp;bu=https%253A%252F%252Fconsortium.net%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Press Release</category>
      <category>blog</category>
      <pubDate>Wed, 17 Sep 2025 22:21:30 GMT</pubDate>
      <guid>https://consortium.net/blog/consortium-crowdstrike-corelight-and-cribl-deliver-cybersecurity-synthesis-resetting-the-standard-for-integrated-outcome-driven-security</guid>
      <dc:date>2025-09-17T22:21:30Z</dc:date>
      <dc:creator>Consortium</dc:creator>
    </item>
  </channel>
</rss>
