<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cybersecurity Compliance on Blog - Comfidentia</title><link>https://blog.comfidentia.cl/en/tags/cybersecurity-compliance/</link><description>Recent content in Cybersecurity Compliance on Blog - Comfidentia</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.comfidentia.cl/en/tags/cybersecurity-compliance/index.xml" rel="self" type="application/rss+xml"/><item><title>Shadow AI: How Unauthorized AI Tool Usage Increases Cyber Risk in Your Chilean Company</title><link>https://blog.comfidentia.cl/en/2026/04/14/vulnerabilidades-ia-no-autorizada-ciberseguridad-empresarial-chile/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.comfidentia.cl/en/2026/04/14/vulnerabilidades-ia-no-autorizada-ciberseguridad-empresarial-chile/</guid><description>Discover how Shadow AI impacts corporate cybersecurity in Chile. We analyze data risks, compliance under the Cybersecurity Framework Law, and strategies for secure management.</description></item></channel></rss>