<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/e-book/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #e-Book</title><description>Lifu Technologies - Blog #e-Book</description><link>https://www.lifutechnologies.co.za/blogs/tag/e-book</link><lastBuildDate>Thu, 16 Apr 2026 13:31:24 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[ISO 27001 - NIST - CoBIT - Integrated Framework Model]]></title><link>https://www.lifutechnologies.co.za/blogs/post/ISO-27001-NIST-CoBIT-Integrated-Framework-Model</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/logo_medium_resolution.png"/>amely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jpO1tKuKTTOjhnc9SXJ9iw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2HIZ5DIuSeuoK5XUxnr9eQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ij3dE_uKSPKUEMA2u8vkQQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Executive Summary<br></h2></div>
<div data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:11pt;">The increase in concern among businesses and customers about protecting their information has led to more complex security requirements, many times involving the integration of multiple approaches. </span></p><p><span style="font-size:11pt;">In turn, modern information security implementation projects have become even more challenging, especially information technology processes. </span></p><p><span style="font-size:11pt;">And, when we talk about integrating approaches, it is not a question of simply creating a single list of what each approach requires and implementing them, but rather to coordinate these requirements, through trade-offs between conflicting objectives and alternatives, and by reinforcing the common ones, so that the implemented requirements can meet the expected overall outcomes. </span></p><p><span style="font-size:11pt;">Therefore, before ensuring compliance with requirements, it is paramount to consider a process of integrating security practices into business activities, but strange as it may seem, there are not many readily available materials regarding integrating practices. </span></p><p><span style="font-size:11pt;">Our approach embraces the three areas, namely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added </span></p><p><span style="font-size:11pt;">We will present their similarities and differences, and how they can be used together during an information security implementation project to improve information protection. <br></span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-style:italic;">The Paper is written by <a href="https://www.linkedin.com/in/glenard-o-moore-096a42264/" title="Glenard O'Moore" target="_blank" rel="">Glenard O'Moore</a>, CISO of Lifu Technologies and certified auditor on various standards<br></span></p><p></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%2027001%20NIST%20CoBIT.pdf" download><span class="zpbutton-content">Read the paper</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 10 Jan 2024 12:31:28 +0200</pubDate></item><item><title><![CDATA[Emerging External Cyber Defense Trends]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Emerging-External-Cyber-Defense-Trends</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Confluence General Patch Trends.png"/>all threats from outside of organizations' internal networks, such as those that come from suppliers, vendors, and other third parties, along with threats further outside the wire on the clear, deep, and dark web.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_vNDergEsQo6yoOk6kqMBPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PA_Wmi_iRMWEnXA4QAJjoA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_v1gV55cyQjKIJHiArK_48g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IW9ciIfnQtmv4qwXMqndtQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IW9ciIfnQtmv4qwXMqndtQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:24px;font-weight:700;">Be aware of your external ecosystem </span></p><p></p><p></p><p></p></div>
</div></div></div></h2></div><div data-element-id="elm_KV0WU0G-QcijLjMWZTlUng" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KV0WU0G-QcijLjMWZTlUng"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:9pt;font-weight:300;">In the following report, we have cataloged insights both on increasingly prevalent attack vectors as well as remediation and mitigation advice on relatively straightforward ways<br> to defend against them. For instance, the alarming rate of emerging vulnerability disclosures poses a threat to virtually all organizations, but whose risk can be greatly reduced with the relatively simple fix of patching as quickly as possible. </span></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_kyM_yuYbQzmPA2QW139z8g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_kyM_yuYbQzmPA2QW139z8g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/EmergingExternalCyberDefenseTrendsReport_02-Lifu.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 24 May 2023 13:57:57 +0200</pubDate></item><item><title><![CDATA[Fakebook: How Attackers Use Social Media Impersonation to Scam Bank Customers]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Fakebook</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Fakebook logo.png"/>While social media impersonation is old news to security teams, BlueVoyant cyber threat analysts have identified an advanced campaign targeting banking customers using a new method: spoofed customer service accounts.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zOKdOazhRb-o48tsJq2Dog" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Iy5ECe7zRKe9cWzpeAecXQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aJASnZlFT7adBXjwe-ErlQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_mEy76RKiR42J978hj4_hzg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mEy76RKiR42J978hj4_hzg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Deep dive into the characteristics, scope, and tactics the attackers used to deploy this sophisticated campaign. </span></h2></div>
<div data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width: 789px !important ; height: 260px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } @media (max-width: 767px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Fakebook%20-%20Tactics.png" width="789" height="260" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VwC35bb3RNiwX2UytXDCRw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VwC35bb3RNiwX2UytXDCRw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><strong>Download now to learn:</strong></p><p>How threat actors are able to set up spoofed accounts and target customers</p><p>The methods they use to gain access to sensitive data, like bank account numbers, and dupe users into providing their payment card information or a direct deposit</p><p>Best practices for remediation and recommendations for preventing this type of scam</p></div><p></p></div>
</div><div data-element-id="elm_4-466IAxQhO9pJWiYbgtuA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4-466IAxQhO9pJWiYbgtuA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/HowAttackersUseSocialMediaImpersonationReport.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 May 2023 22:32:39 +0200</pubDate></item><item><title><![CDATA[Reference Guide for the Network and Information Security Directive, Second Version]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Reference-Guide-for-the-Network-and-Information-Security-Directive</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/NIS2 reference pic.png"/>The following guide provides an overview of the key aspects of NIS2, as well as the cyber security capabilities needed to address new requirements for the organisations within the directive’s scope]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_km8xlUccTHm0q4gz17Tixg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kHw1rsIqRZqIuCDAFeT3PA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZtnWup__TzOWRJcYALELiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KkhXrpvQTaSVyu9U3ex8CQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KkhXrpvQTaSVyu9U3ex8CQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:18px;font-weight:300;">It entered into force on 16 January 2023, and Member States now have 21 months, until 17 October 2024, to transpose its measures into national law. </span></p><p></p></div>
</div></div></div></h2></div><div data-element-id="elm_dsAH2rNpSqu240O6xoI4pg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dsAH2rNpSqu240O6xoI4pg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:18px;font-weight:300;">To respond to the growing threats posed with digitalisation and the surge in cyber attacks, the Commission has submitted a proposal to replace the NIS Directive and thereby strengthen the security requirements, address the security of supply chains, streamline reporting obligations, and introduce more stringent supervisory measures and stricter enforcement requirements, including harmonised sanctions across the EU. </span></p><p></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_Vpue6cc_Qd25xQ0I_Z02gA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Vpue6cc_Qd25xQ0I_Z02gA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/NIS2ReferenceGuideReport_05.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 May 2023 08:57:10 +0200</pubDate></item><item><title><![CDATA[The Total Economic Impact Of BlueVoyant Supply Chain Defense]]></title><link>https://www.lifutechnologies.co.za/blogs/post/The-Total-Economic-Impact™-Of-BlueVoyant-Supply-Chain-Defense</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/SCD ROI.png"/>The Total Economic Impact Of BlueVoyant Supply Chain Defense - 292% return on investment (ROI) for a composite client over 3 years, and reduces the number of suppliers exceeding clients’ risk threshold by 70%.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_G9caYDnbQhmCpLGY7l_SIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_U9iLQEL0SRS3Xw7jdx7AKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_odQ4YxuiSk-9Xuzk3loYUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_W2PZ6DRaRZSvyZMOAE4zZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W2PZ6DRaRZSvyZMOAE4zZg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span><span><span style="color:inherit;"><span>Cost Savings And Business Benefits<br><span>Enabled By Supply Chain Defense</span></span></span><br><br><span style="color:inherit;font-size:20px;"><br>BlueVoyant commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to find out. In addition to delivering a nearly 300% return on investment for a composite client organization, the survey highlights how BlueVoyant SCD enabled a 65% efficiency increase in risk monitoring risk, a 70% reduction in suppliers above risk threshold, and 60% reduction in time to remediate critical risks.</span></span></span></h2></div>
<div data-element-id="elm_bSco4sGvT9DgSKV58ycr0A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width: 788px !important ; height: 204px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width:788px ; height:204px ; } } @media (max-width: 767px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width:788px ; height:204px ; } } [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/SCD%20ROI.png" width="788" height="204" loading="lazy" size="original" alt="Financial benefits of SCD from BlueVoyant" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_SICUhkXsSe-1OMSx79Xtqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SICUhkXsSe-1OMSx79Xtqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><h2 style="line-height:1;"><span style="font-size:18px;"><span>Seventy percent of enterprise risk decision-makers agree that third-party risk is a business priority. While some companies are well defended, many are not and are constantly exposed to threats in their supply chains. <br></span></span></h2><h2 style="line-height:1;"><br></h2><h2 style="line-height:1;"><span style="font-size:18px;"><span>BlueVoyant Supply Chain Defense</span><span> provides organizations with a platform and service that identifies, validates, prioritizes, and confirms mitigation of cyber threats and vulnerabilities across supplier ecosystems</span></span></h2><h2></h2><h2></h2></div>
<p></p></div></div><div data-element-id="elm_0bax9ztxS8iPZkGYLZlBGw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0bax9ztxS8iPZkGYLZlBGw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/TEI_Of_BlueVoyant_Supply_Chain_Defense_vF.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 01 May 2023 16:12:09 +0200</pubDate></item><item><title><![CDATA[What Board Members Should Know]]></title><link>https://www.lifutechnologies.co.za/blogs/post/what-board-members-should-know</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/What the board needs to know - SCD.png"/>At the same time, it’s imperative to understand how your organization will be impacted either directly by a cybersecurity breach, or indirectly by vul ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_d4fTtIjORMih7-1HRnKUsg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_53FoAkatRZ6mFF-f42WbnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ITBzwbp4RI61hM5xNvRNow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_ITBzwbp4RI61hM5xNvRNow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ"].zpelem-heading { border-radius:1px; padding:0px; } </style><h1
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><h1><span style="color:inherit;font-size:20px;"><span style="font-weight:300;">While your organization may have its internal network’s security covered, it is critical that you and every other leader at your organization know that your digital attack surface (i.e. all of the points where cyber threat actors can try to breach an IT perimeter) is much larger and more complex than many realize. </span></span></h1><h1></h1><h1></h1></div><p></p></div></div></div></div></h1></div>
<div data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><div><div><div><div><div style="color:inherit;"><div><div><div><p><span style="font-size:10pt;font-weight:300;">At the same time, it’s imperative to understand how your organization will be impacted either directly by a cybersecurity breach, or indirectly by vulnerabilities within your supply chain from a business continuity and trust perspective. </span></p></div>
</div></div></div></div></div></div></div></div><p><span style="font-size:10pt;font-weight:300;"><a href="/files/Lifu%20Branded%20Materials/Lifu%20-%20SupplyChainDefenseWhataBoardNeedstoKnowWhitePaper_watermark-1.pdf" rel="" download="">Download full document here</a><br></span></p><p></p><p></p><p></p></div>
</div></div></div><p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 15:33:21 +0200</pubDate></item></channel></rss>