<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>/gene</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/about/</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/authors</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/contact/</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/elements/</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/tags/</loc>
<lastmod>2026-03-26T22:57:43+00:00</lastmod>
</url>
<url>
<loc>/blog/creating-an-incident-response-plan</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/cybersecurity-laws-your-org-has-already-broken</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/how-to-protect-yourself-from-credential-stuffing-attacks</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/mfa-is-not-the-holy-grail-of-security</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/web-account-securtiy-hygene-tips</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/what-motivates-attackers-to-come-after-you</loc>
<lastmod>2022-11-01T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/raspberry-pi-configuration-notes</loc>
<lastmod>2022-11-04T04:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/navigating-security-in-the-generative-ai-era</loc>
<lastmod>2025-11-15T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/mcp-servers-are-shadow-it</loc>
<lastmod>2026-03-25T11:00:00+00:00</lastmod>
</url>
<url>
<loc>/blog/</loc>
</url>
<url>
<loc>/videos/</loc>
</url>
<url>
<loc>/</loc>
</url>
<url>
<loc>/blog/page/2/</loc>
</url>
</urlset>
