<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Rodika Tollefson</title>
	<atom:link href="https://seattletechnologywriter.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://seattletechnologywriter.com/</link>
	<description>Freelance technology &#38; cybersecurity writer</description>
	<lastBuildDate>Tue, 21 Apr 2026 13:02:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Email</title>
		<link>https://seattletechnologywriter.com/work/email.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 13:02:28 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2694</guid>

					<description><![CDATA[<p> Email copy from a nurture campaign &#124; DASHLANE</p>
<p>The post <a href="https://seattletechnologywriter.com/work/email.html/">Email</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Dashlane: The Downer Group</title>
		<link>https://seattletechnologywriter.com/work/dashlane-the-downer-group.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 12:14:07 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2687</guid>

					<description><![CDATA[<p>The leading provider of integrated infrastructure services across Australia and New Zealand reduces risk with real-time credential threat mitigation.</p>
<p>The post <a href="https://seattletechnologywriter.com/work/dashlane-the-downer-group.html/">Dashlane: The Downer Group</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Solution Brief</title>
		<link>https://seattletechnologywriter.com/work/solution-brief.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 14:08:18 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2680</guid>

					<description><![CDATA[<p>Join solution for enhanced cloud security &#124; EXABEAM</p>
<p>The post <a href="https://seattletechnologywriter.com/work/solution-brief.html/">Solution Brief</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Website</title>
		<link>https://seattletechnologywriter.com/work/website.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 14:02:56 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2678</guid>

					<description><![CDATA[<p>Global provider of network APIs &#124; ADUNA</p>
<p>The post <a href="https://seattletechnologywriter.com/work/website.html/">Website</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Malware Is Making Its Mark on the Darknet</title>
		<link>https://seattletechnologywriter.com/work/malware-is-making-its-mark-on-the-darknet.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 08:44:08 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2671</guid>

					<description><![CDATA[<p>Identity exposure research shows the latest cybercrime trends and tactics used my malicious actors, and shows the evolution of infostealers. &#124; SPYCLOUD</p>
<p>The post <a href="https://seattletechnologywriter.com/work/malware-is-making-its-mark-on-the-darknet.html/">Malware Is Making Its Mark on the Darknet</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Building organizational readiness for post-quantum cryptography</title>
		<link>https://seattletechnologywriter.com/work/building-organizational-readiness-for-post-quantum-cryptography.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 15:24:24 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2661</guid>

					<description><![CDATA[<p>Quantum computers capable of breaking current cryptography could emerge in just a few years, and the window to migrate to post-quantum cryptography is closing fast. &#124; PALO ALTO NETWORKS/CIO DIVE</p>
<p>The post <a href="https://seattletechnologywriter.com/work/building-organizational-readiness-for-post-quantum-cryptography.html/">Building organizational readiness for post-quantum cryptography</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Why securing GenAI use starts in the browser</title>
		<link>https://seattletechnologywriter.com/work/why-securing-genai-use-starts-in-the-browser.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 15:15:16 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2659</guid>

					<description><![CDATA[<p>As enterprises adopt GenAI, the perimeter is moving to the browser, requiring a new approach to security. &#124; PALO ALTO NETWORKS/CIO DIVE</p>
<p>The post <a href="https://seattletechnologywriter.com/work/why-securing-genai-use-starts-in-the-browser.html/">Why securing GenAI use starts in the browser</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Navigating the Quantum Shift</title>
		<link>https://seattletechnologywriter.com/work/navigating-the-quantum-shift.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:15:31 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2653</guid>

					<description><![CDATA[<p>This playbook provides a strategic roadmap for post-quantum migration as the window to prepare is closing fast. &#124; PALO ALTO NETWORKS</p>
<p>The post <a href="https://seattletechnologywriter.com/work/navigating-the-quantum-shift.html/">Navigating the Quantum Shift</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Why Identity and AI Are Perfect Partners</title>
		<link>https://seattletechnologywriter.com/work/why-identity-and-ai-are-perfect-partners.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:13:48 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2643</guid>

					<description><![CDATA[<p>Artificial intelligence is set to transform how product and development teams innovate, but integrating AI into workflows and digital products requires balancing design, functionality, security, and scalability. &#124; AUTH</p>
<p>The post <a href="https://seattletechnologywriter.com/work/why-identity-and-ai-are-perfect-partners.html/">Why Identity and AI Are Perfect Partners</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>WHITE PAPER: Strategies on How to Advance Cybersecurity and Achieve Zero Trust Maturity</title>
		<link>https://seattletechnologywriter.com/work/white-paper-strategies-on-how-to-advance-cybersecurity-and-achieve-zero-trust-maturity-dell-technologies.html/</link>
		
		<dc:creator><![CDATA[rizza]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:10:11 +0000</pubDate>
				<guid isPermaLink="false">https://seattletechnologywriter.com/?post_type=cpt_portfolio&#038;p=2375</guid>

					<description><![CDATA[<p>Data drives modern businesses, but businesses must navigate security risks associated with this data. Secure data analysis solutions ensure organizations can innovate fearlessly with data while maintaining security. &#124; DELL TECHNOLOGIES</p>
<p>The post <a href="https://seattletechnologywriter.com/work/white-paper-strategies-on-how-to-advance-cybersecurity-and-achieve-zero-trust-maturity-dell-technologies.html/">WHITE PAPER: Strategies on How to Advance Cybersecurity and Achieve Zero Trust Maturity</a> appeared first on <a href="https://seattletechnologywriter.com">Rodika Tollefson</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
