<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cybersecpods.com/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>hourly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cybersecpods.com/episodes/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>hourly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cybersecpods.com/about/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/</loc>
<lastmod>2026-05-01T16:44:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/</loc>
<lastmod>2025-09-29T23:06:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/</loc>
<lastmod>2026-04-21T18:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/</loc>
<lastmod>2026-04-28T07:05:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/</loc>
<lastmod>2026-05-05T09:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/</loc>
<lastmod>2026-04-30T15:41:54.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/</loc>
<lastmod>2026-04-30T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/</loc>
<lastmod>2025-07-09T07:05:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/</loc>
<lastmod>2026-04-29T09:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/</loc>
<lastmod>2026-05-05T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/</loc>
<lastmod>2026-05-04T20:13:21.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/</loc>
<lastmod>2026-04-29T18:15:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/</loc>
<lastmod>2026-05-02T16:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/</loc>
<lastmod>2024-04-02T03:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/</loc>
<lastmod>2025-08-18T18:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/</loc>
<lastmod>2026-05-04T13:10:32.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/</loc>
<lastmod>2026-05-04T10:00:19.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/</loc>
<lastmod>2026-05-04T20:30:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/</loc>
<lastmod>2022-10-10T13:01:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/</loc>
<lastmod>2026-04-30T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/</loc>
<lastmod>2026-04-22T13:57:04.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/</loc>
<lastmod>2026-05-05T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/</loc>
<lastmod>2026-05-04T09:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/</loc>
<lastmod>2026-05-02T15:58:15.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/</loc>
<lastmod>2026-05-02T03:59:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/</loc>
<lastmod>2026-05-01T19:32:40.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/</loc>
<lastmod>2026-05-04T09:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/</loc>
<lastmod>2026-05-03T15:45:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/</loc>
<lastmod>2024-12-10T11:03:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-healthcare-security-brief/</loc>
<lastmod>2026-04-14T21:06:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/</loc>
<lastmod>2026-04-22T07:05:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/</loc>
<lastmod>2023-08-24T01:06:08.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/</loc>
<lastmod>2026-05-03T04:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/</loc>
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/</loc>
<lastmod>2026-04-30T21:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/</loc>
<lastmod>2021-01-05T08:35:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/</loc>
<lastmod>2026-04-29T07:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/</loc>
<lastmod>2026-05-04T19:45:48.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/</loc>
<lastmod>2026-05-01T00:58:34.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/</loc>
<lastmod>2023-04-26T07:05:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-insider-conversations/</loc>
<lastmod>2026-03-03T10:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/</loc>
<lastmod>2026-04-15T12:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/</loc>
<lastmod>2026-04-29T02:56:38.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/</loc>
<lastmod>2025-07-09T07:05:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/</loc>
<lastmod>2021-07-30T07:05:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/</loc>
<lastmod>2026-04-29T15:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/</loc>
<lastmod>2026-04-29T23:00:59.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/</loc>
<lastmod>2026-04-21T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/</loc>
<lastmod>2026-05-04T15:04:43.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/</loc>
<lastmod>2026-03-16T06:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/</loc>
<lastmod>2026-04-30T06:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/</loc>
<lastmod>2026-05-05T12:30:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/</loc>
<lastmod>2026-05-03T23:37:38.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/blue-team/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/soc/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/threat-intel/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/incident-response/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/vulnerability-management/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/red-team/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/penetration-testing/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/purple-team/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/appsec/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/devsecops/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/api-security/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/cloud-security/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/network-security/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/ot-ics-security/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/identity/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/privacy/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/governance-risk-compliance/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/ai-security/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/leadership/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/career/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/awareness-training/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/news/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/interviews/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/storytelling/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/research/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/categories/emerging-tech/</loc>
<lastmod>2026-05-05T13:02:28.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-720-tales-of-pentest-pwnage-part-84/</loc>
<lastmod>2026-05-01T16:44:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-719-babys-first-openclaw/</loc>
<lastmod>2026-04-24T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-718-fun-professional-and-personal-ai-project-ideas/</loc>
<lastmod>2026-04-17T20:54:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-717-i-gave-up-my-wifes-phi-and-id-do-it-again/</loc>
<lastmod>2026-04-10T23:54:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-716-tales-of-pentest-pwnage-part-83/</loc>
<lastmod>2026-04-03T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-715-tales-of-pentest-pwnage-part-82/</loc>
<lastmod>2026-03-27T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-714-tales-of-pentest-pwnage-part-81/</loc>
<lastmod>2026-03-20T16:43:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-713-how-to-secure-your-community-part-3/</loc>
<lastmod>2026-03-13T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-712-how-to-secure-your-community-part-2/</loc>
<lastmod>2026-03-06T21:34:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-711-how-to-secure-your-community/</loc>
<lastmod>2026-02-27T19:11:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-710-im-taking-a-break/</loc>
<lastmod>2026-01-17T01:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-709-second-impressions-of-twingate/</loc>
<lastmod>2026-01-10T01:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-708-tales-of-pentest-fail-part-6/</loc>
<lastmod>2026-01-02T13:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-707-our-new-pentest-course-has-launched/</loc>
<lastmod>2025-12-26T13:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-706-tales-of-pentest-pwnage-part-80/</loc>
<lastmod>2025-12-19T13:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-705-a-phishing-campaign-fail-tale/</loc>
<lastmod>2025-12-12T19:41:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-704-diy-pentest-dropbox-tips-part-12/</loc>
<lastmod>2025-12-05T13:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-703-tales-of-pentest-pwnage-part-79/</loc>
<lastmod>2025-11-28T13:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-702-should-you-hire-ai-to-run-your-next-pentest/</loc>
<lastmod>2025-11-21T19:11:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-701-what-im-working-on-this-week-part-5/</loc>
<lastmod>2025-11-14T16:40:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-700-pretender/</loc>
<lastmod>2025-11-07T17:06:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-699-pre-travel-security-tips/</loc>
<lastmod>2025-10-31T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-698-babys-first-projectdiscovery/</loc>
<lastmod>2025-10-24T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-697-pwning-ninja-hacker-academy-part-4/</loc>
<lastmod>2025-10-18T00:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/7-minute-security/7ms-696-babys-first-security-ticketing-system/</loc>
<lastmod>2025-10-10T12:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heists-series-7-the-trojan-gift/</loc>
<lastmod>2025-09-29T23:06:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heist-series-6-the-shill/</loc>
<lastmod>2025-09-06T20:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heist-series-5-the-long-con/</loc>
<lastmod>2025-08-11T05:06:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heist-series-4-the-ghost-panic-urgency-and-the-speed-of-deception/</loc>
<lastmod>2025-08-03T23:53:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heists-series-3-the-call-is-coming-from-inside-your-mind/</loc>
<lastmod>2025-07-25T17:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heist-series-2-the-bait-man/</loc>
<lastmod>2025-07-17T22:13:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/cognitive-heists-series-1-the-insider-trust-by-proximity-not-proof/</loc>
<lastmod>2025-07-11T19:26:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/narrative-armor-why-some-stories-become-immune-to-the-truth/</loc>
<lastmod>2025-06-28T20:03:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/repeat-until-real/</loc>
<lastmod>2025-06-24T22:27:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/truth-hurts-so-we-lie/</loc>
<lastmod>2025-06-12T21:13:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-costume-of-truth-why-we-trust-the-logo-the-lab-coat-and-the-lanyard/</loc>
<lastmod>2025-06-09T22:02:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/feel-first-think-never-your-emotions-are-the-exploit/</loc>
<lastmod>2025-05-28T02:54:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/too-easy-to-be-true-the-fluency-trap-and-the-lie-that-slides-right-past-you/</loc>
<lastmod>2025-05-20T18:06:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-plausibility-effect/</loc>
<lastmod>2025-05-14T23:03:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/look-here-why-every-great-deception-starts-with-stolen-attention/</loc>
<lastmod>2025-05-05T13:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/artifacts-of-deception-deceptive-minds-issue-2/</loc>
<lastmod>2025-04-29T02:42:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/deceptive-minds-the-audio-experience-issue-1/</loc>
<lastmod>2025-04-29T02:41:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-faik-files-or-holiday-special-ai-safety-update/</loc>
<lastmod>2024-12-27T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-faik-files-or-the-butcher-will-scam-you-now/</loc>
<lastmod>2024-12-20T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-faik-files-or-ai-gone-wild-worrisome-leaks-misguided-conspiracies-and-more/</loc>
<lastmod>2024-12-13T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-faik-files-or-a-hunch-about-hutch/</loc>
<lastmod>2024-12-06T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/the-faik-files-or-consciousness-scams-and-death-threats/</loc>
<lastmod>2024-11-29T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/faik-miniseries-sneak-peek-or-chapter-3-the-mindset-and-tools-of-a-digital-manip/</loc>
<lastmod>2024-10-07T23:12:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/faik-miniseries-sneak-peek-or-chapter-2-new-frontiers-of-deception-ai-and-synthe/</loc>
<lastmod>2024-09-30T23:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/8th-layer-insights/faik-miniseries-sneak-peek-or-chapter-1-the-eternal-battle-for-the-mind/</loc>
<lastmod>2024-09-30T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-319-vercel-breach-security-vs-compliance-pull-request-flows-w-ai-agents/</loc>
<lastmod>2026-04-21T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-318-slack-impersonation-mythos-vulnerability-research-future/</loc>
<lastmod>2026-04-14T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-317-post-rsacbsidessf-supply-chain-security-future-of-sdlc/</loc>
<lastmod>2026-03-31T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-316-wcoffee-chaos-and-prodsec-agentic-development-lifecycle/</loc>
<lastmod>2026-03-17T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-315-risks-of-ai-native-security-products-rapid-software-development/</loc>
<lastmod>2026-03-03T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-314-llm-appsec-disruption-limitations-of-ai-in-security-appsec-oversight/</loc>
<lastmod>2026-02-24T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-313-appsec-role-evolution-ai-skills-and-risks-phishing-ai-agents/</loc>
<lastmod>2026-02-17T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-312-vibe-coding-risks-burnout-appsec-scorecards/</loc>
<lastmod>2026-02-10T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-311-transformation-of-appsec-ai-skills-development-velocity/</loc>
<lastmod>2026-02-03T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-310-w-mohan-kumar-and-naveen-k-mahavisnu-ai-agent-security/</loc>
<lastmod>2026-01-27T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-309-w-nathan-hunstad-compliance-security-governance/</loc>
<lastmod>2026-01-20T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-308-wavi-douglen-privacy-appsec-conferences-owasp/</loc>
<lastmod>2026-01-13T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-307-2025-retrospective-supply-chain-mcp-and-apis/</loc>
<lastmod>2025-12-23T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-306-w-paul-mccarty-open-source-malware/</loc>
<lastmod>2025-12-02T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-305-career-impact-of-genai-seogeo-more-supply-chain-attacks/</loc>
<lastmod>2025-11-25T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-304-more-owasp-top-10-ai-dynamic-testing/</loc>
<lastmod>2025-11-18T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-303-wprof-brian-glas-owasp-top-10-2025/</loc>
<lastmod>2025-11-10T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-302-owasp-global-appsec-dc-predictions-ai-browser-dangers-mcp-security/</loc>
<lastmod>2025-11-04T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-301-ai-browsers-new-ai-agent-attacks-framework-checklists/</loc>
<lastmod>2025-10-28T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-300-this-is-appsec/</loc>
<lastmod>2025-10-14T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-299-startup-grind-will-security-companies-disappear/</loc>
<lastmod>2025-10-07T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-298-shai-hulud-layered-security-new-commandments-of-security-teams/</loc>
<lastmod>2025-09-16T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-297-truefalse-positives-phishing-package-maintainers/</loc>
<lastmod>2025-09-09T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-296-owasp-top-10-nx-compromise-security-news-sources/</loc>
<lastmod>2025-09-02T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/absolute-appsec/episode-295-def-con-33-recap-crocs-and-socks-and-bots/</loc>
<lastmod>2025-08-26T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/building-resilience-in-a-world-of-constant-threats/</loc>
<lastmod>2026-04-28T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/tony-sager-the-case-for-cyber-hygiene-first/</loc>
<lastmod>2026-04-14T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/cybersecurity-at-sea-protecting-the-global-supply-chain/</loc>
<lastmod>2026-03-31T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/code-war-with-allie-mellen/</loc>
<lastmod>2026-03-17T16:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/why-cybersecurity-fails-without-trust/</loc>
<lastmod>2026-03-03T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/dawn-song-when-ai-becomes-the-hacker-and-the-defender/</loc>
<lastmod>2026-02-17T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/trust-is-patient-well-being-rob-suarez-on-cybersecurity-in-healthcare/</loc>
<lastmod>2026-02-03T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/the-new-reality-of-the-ciso-role/</loc>
<lastmod>2026-01-20T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/the-best-of-afternoon-cyber-tea-2025/</loc>
<lastmod>2026-01-06T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/lorrie-cranor-why-security-fails-real-people/</loc>
<lastmod>2025-12-23T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/inside-data-breaches-and-human-behavior-with-troy-hunt/</loc>
<lastmod>2025-12-09T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/educating-for-resilience-stem-ai-and-the-future-of-cybersecurity/</loc>
<lastmod>2025-11-25T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/how-microsoft-is-redefining-global-cyber-defense/</loc>
<lastmod>2025-11-11T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/the-power-of-converged-security-in-a-connected-world/</loc>
<lastmod>2025-10-28T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/from-silos-to-solutions-building-trust-through-transparent-cybersecurity-communi/</loc>
<lastmod>2025-10-14T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/lessons-from-the-frontlines-of-industrial-security/</loc>
<lastmod>2025-09-30T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/modernizing-cybersecurity-with-matt-rowe/</loc>
<lastmod>2025-09-16T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/from-bottlenecks-to-breakthroughs-aligning-legal-and-security-teams/</loc>
<lastmod>2025-09-02T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/the-psychology-of-speaking-up-with-amy-edmondson/</loc>
<lastmod>2025-08-19T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/nasrin-rezai-on-the-frontlines-of-cybersecurity/</loc>
<lastmod>2025-08-05T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/encore-hugh-thompson-on-building-the-rsa-conference/</loc>
<lastmod>2025-07-29T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/encore-cybercrime-and-storytelling-with-jack-rhysider/</loc>
<lastmod>2025-07-15T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/machine-scale-defense-and-the-future-of-cybersecurity/</loc>
<lastmod>2025-07-01T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/the-human-firewall-people-first-cybersecurity/</loc>
<lastmod>2025-06-17T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/afternoon-cyber-tea/security-and-agentic-ai/</loc>
<lastmod>2025-06-03T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/keeping-up-with-the-owasp-genai-project-scott-clinton-asw-381/</loc>
<lastmod>2026-05-05T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/top-10-web-hacking-techniques-of-2025-and-a-hint-for-2026-james-kettle-asw-380/</loc>
<lastmod>2026-04-28T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/the-human-aspect-of-red-teams-brian-fox-tom-tovar-t-gwyddon-data-owen-asw-379/</loc>
<lastmod>2026-04-21T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/securing-softwares-journey-with-the-owasp-spvs-ido-geffen-rohan-ravindranath-cam/</loc>
<lastmod>2026-04-14T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/appsec-news-roundup-on-claude-code-leak-axios-npm-compromise-secure-design-idan-/</loc>
<lastmod>2026-04-07T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/developing-the-skills-needed-for-modern-software-development-keith-hoodlet-shash/</loc>
<lastmod>2026-03-31T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/why-proactive-security-is-far-better-than-patching-erik-nost-asw-375/</loc>
<lastmod>2026-03-24T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/creating-better-security-guidance-and-code-with-llms-mark-curphey-asw-374/</loc>
<lastmod>2026-03-17T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/making-medical-devices-secure-tamil-mathi-asw-373/</loc>
<lastmod>2026-03-10T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/modern-appsec-that-keeps-pace-with-ai-development-james-wickett-asw-372/</loc>
<lastmod>2026-03-03T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/helping-users-with-practical-advice-to-protect-their-digital-devices-runa-sandvi/</loc>
<lastmod>2026-02-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/conducting-secure-code-analysis-with-llms-asw-370/</loc>
<lastmod>2026-02-17T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/bringing-strong-authentication-and-granular-authorization-for-genai-dan-moore-as/</loc>
<lastmod>2026-02-10T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/focusing-on-proactive-controls-in-the-face-of-llm-assisted-malware-rob-allen-asw/</loc>
<lastmod>2026-02-03T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/building-proactive-defenses-that-reflect-the-true-nature-of-modern-software-risk/</loc>
<lastmod>2026-01-27T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/lessons-from-mongobleed-cwe-top-25-and-secure-coding-benchmarks-asw-366/</loc>
<lastmod>2026-01-20T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/secure-by-design-is-better-than-secure-by-myth-bob-lord-asw-365/</loc>
<lastmod>2026-01-13T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/the-upsides-and-downsides-of-llm-generated-code-chris-wysopal-asw-364/</loc>
<lastmod>2026-01-06T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/ai-era-appsec-transparency-trust-and-risk-beyond-the-firewall-felipe-zipitria-st/</loc>
<lastmod>2025-12-30T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/modern-appsec-owasp-samm-ai-secure-coding-threat-modeling-and-champions-sebastia/</loc>
<lastmod>2025-12-23T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/developing-open-source-skills-for-maintaining-projects-kat-cosgrove-asw-361/</loc>
<lastmod>2025-12-16T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/making-oauth-scale-securely-for-mcps-aaron-parecki-asw-360/</loc>
<lastmod>2025-12-09T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/making-tn-critical-infrastructure-the-most-secure-in-the-nation-t-gwyddon-data-g/</loc>
<lastmod>2025-12-02T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/figuring-out-where-to-start-with-secure-code-asw-358/</loc>
<lastmod>2025-11-25T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/application-security-weekly/secure-coding-as-critical-thinking-instead-of-vulnspotting-matias-madou-asw-357/</loc>
<lastmod>2025-11-18T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-127-threat-intel-update-and-ai/</loc>
<lastmod>2026-04-30T15:41:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-126-microsoft-baseline-security-mode/</loc>
<lastmod>2026-03-21T01:59:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-125-origins-of-mitre-attandck/</loc>
<lastmod>2026-02-27T19:19:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-124-microsoft-security-response-center-for-ai/</loc>
<lastmod>2026-01-30T23:15:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-123-agentic-identity/</loc>
<lastmod>2026-01-21T20:58:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-122-microsoft-ignite-2025-wrap-up/</loc>
<lastmod>2025-12-15T15:48:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-121-new-open-group-security-standards-documentation/</loc>
<lastmod>2025-11-21T20:24:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-120-the-zero-trust-workshop-and-so-much-more/</loc>
<lastmod>2025-10-29T15:58:52.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-119-pedantic-security-wording-and-taxonomies/</loc>
<lastmod>2025-10-09T21:04:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-118-quantum-cryptography-and-quantum-computing-with-mark-russinovich/</loc>
<lastmod>2025-09-19T18:01:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-117-cloud-gaming-security/</loc>
<lastmod>2025-08-29T19:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-116-microsoft-sentinel-data-lake/</loc>
<lastmod>2025-07-31T19:22:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-115-security-in-model-context-protocol-mcp/</loc>
<lastmod>2025-07-10T21:12:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-114-sql-server-2025-security-improvements/</loc>
<lastmod>2025-06-09T17:44:50.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-113-microsoft-red-team/</loc>
<lastmod>2025-05-16T21:03:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-112-security-copilot-agents/</loc>
<lastmod>2025-05-13T19:19:50.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-111-securing-agentic-ai/</loc>
<lastmod>2025-04-17T19:41:02.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-110-securing-genai-applications-with-entra-3-of-4-monitoring-and-more/</loc>
<lastmod>2025-04-01T17:51:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-109-securing-genai-applications-with-entra-2-of-4-overpermissioning/</loc>
<lastmod>2025-02-19T04:15:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-108-securing-genai-applications-with-entra/</loc>
<lastmod>2025-01-20T22:55:45.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-107-secure-by-default-and-copilot-overshare-blueprints/</loc>
<lastmod>2025-01-06T21:17:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-106-microsoft-ignite-security-wrap-up/</loc>
<lastmod>2024-12-10T21:48:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-105-azure-and-entra-id-security-tools/</loc>
<lastmod>2024-11-22T15:03:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-104-the-post-bluehat-wrap-up/</loc>
<lastmod>2024-11-08T22:39:52.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/azure-security-podcast/episode-103-security-conferences-and-bluehat/</loc>
<lastmod>2024-10-17T14:49:53.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/25-years-of-uninterrupted-persistence/</loc>
<lastmod>2026-04-30T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/gravy-glutes-and-the-talos-year-in-review/</loc>
<lastmod>2026-03-23T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/its-the-b-team-matt-olney-returns/</loc>
<lastmod>2026-03-10T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/ranksgiving-returns-the-appetizer-uprising/</loc>
<lastmod>2025-12-04T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/two-marshalls-one-podcast/</loc>
<lastmod>2025-10-16T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/how-to-ruin-an-apts-day-with-sara-mcbroom/</loc>
<lastmod>2025-09-11T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/so-you-wanna-be-an-incident-commander-meet-alex-ryan/</loc>
<lastmod>2025-07-31T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/terms-and-conceptions-may-apply/</loc>
<lastmod>2025-06-27T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/year-in-review-2024/</loc>
<lastmod>2025-03-31T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/the-truth-about-tasmanian-devils-and-getting-into-cybersecurity/</loc>
<lastmod>2025-02-27T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/social-media-bans-live-experiments-cybersecurity-crosswords-and-nine-lives-the-b/</loc>
<lastmod>2025-01-16T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/misadventures-rabbit-holes-and-turkey-lurkey-goes-to-the-movies/</loc>
<lastmod>2024-12-05T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/black-hat-2024-preview/</loc>
<lastmod>2024-08-01T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/stories-from-the-power-grid/</loc>
<lastmod>2024-04-11T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/the-old-people-episode/</loc>
<lastmod>2024-03-21T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/the-reverberations-of-volt-typhoon/</loc>
<lastmod>2024-02-22T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/the-reddit-security-diaries/</loc>
<lastmod>2024-02-14T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/talos-speed-dating-the-episode-we-never-set-out-to-make-but-did-anyway/</loc>
<lastmod>2023-12-20T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/the-turkeylurkey-man-wants-you-to-read-the-talos-2023-year-in-review-report/</loc>
<lastmod>2023-12-06T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/chicken-soup-and-contact-centers/</loc>
<lastmod>2023-11-02T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/who-is-jacques-wagon/</loc>
<lastmod>2023-09-28T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/im-going-to-breach-you-off-not-if-i-breach-you-off-first/</loc>
<lastmod>2023-08-24T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/rachel-tobac-on-social-engineering-expanding-opportunities-for-women-in-cybersec/</loc>
<lastmod>2023-08-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/yarrr-there-be-mercenaries-on-the-high-seas/</loc>
<lastmod>2023-08-01T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/beers-with-talos/oh-hello-susan/</loc>
<lastmod>2023-05-25T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/hunting-variants-finding-the-bugs-behind-the-bug/</loc>
<lastmod>2025-07-09T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/securing-redirections-with-mike-macelletti/</loc>
<lastmod>2025-06-25T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/ignore-ram-shankar-siva-kumars-previous-directions/</loc>
<lastmod>2025-06-11T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/protecting-ai-at-the-edge-with-david-weston/</loc>
<lastmod>2025-05-28T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/hacking-at-the-weeds-with-felix-boulet/</loc>
<lastmod>2025-05-14T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/evolutions-in-hacking-with-marco-ivaldi/</loc>
<lastmod>2025-04-30T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/from-facebook-phished-to-mvr-top-5-with-dhiral-patel/</loc>
<lastmod>2025-04-16T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/ai-and-the-hunt-for-hidden-vulnerabilities-with-tobias-diehl/</loc>
<lastmod>2025-04-02T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/bug-hunting-from-the-beach-with-brad-schlintz/</loc>
<lastmod>2025-03-19T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/pocs-patching-and-zero-day-quest-participation-with-michael-gorelik/</loc>
<lastmod>2025-03-05T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/secret-herbs-spices-and-hacking-copilot-studio/</loc>
<lastmod>2025-02-19T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/automating-dynamic-application-security-testing-at-scale/</loc>
<lastmod>2025-02-05T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/refactoring-the-windows-kernel-with-joe-bialek/</loc>
<lastmod>2025-01-22T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/defending-against-ntlm-relay-attacks-with-rohit-mothe-and-george-hughey/</loc>
<lastmod>2025-01-08T08:20:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/navigating-ai-safety-and-security-challenges-with-yonatan-zunger-encore/</loc>
<lastmod>2024-12-25T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/johann-rehberger-on-researching-ai-and-llm-attacks/</loc>
<lastmod>2024-12-11T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/bluehat-2024-day-2-keynote-amanda-silver-cvp-microsoft-developer-division/</loc>
<lastmod>2024-11-27T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/bluehat-2024-day-1-keynote-chris-wysopal-aka-weld-pond/</loc>
<lastmod>2024-11-13T08:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/from-software-to-security-arjun-gopalakrishnas-journey-at-microsoft/</loc>
<lastmod>2024-10-30T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/host-vs-host-get-to-know-nic-and-wendy/</loc>
<lastmod>2024-10-16T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/behind-the-scenes-and-best-practices-for-submitting-to-msrc-with-jim-hull/</loc>
<lastmod>2024-10-02T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/guy-arazi-on-the-art-and-science-of-variant-hunting/</loc>
<lastmod>2024-09-18T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/ryen-macababbad-on-how-security-can-empower-productivity/</loc>
<lastmod>2024-09-04T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/michael-howard-on-secure-by-design-vs-secure-by-default/</loc>
<lastmod>2024-08-27T22:29:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/bluehat-podcast/navigating-ai-safety-and-security-challenges-with-yonatan-zunger/</loc>
<lastmod>2024-08-07T07:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/the-next-frontier-autonomous-security-and-rsac-interviews-from-quantro-and-sandb/</loc>
<lastmod>2026-04-29T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/from-shame-to-fame-changing-behaviors-and-rsac-interviews-from-tanium-and-illumi/</loc>
<lastmod>2026-04-22T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/not-all-ciso-gigs-are-created-equal-and-rsac-interviews-from-eset-and-mimecast-r/</loc>
<lastmod>2026-04-15T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/zero-trust-readiness-and-two-rsac-2026-interviews-from-fenix24-and-absolute-secu/</loc>
<lastmod>2026-04-08T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/executive-paralysis-and-two-pre-recorded-rsac-2026-interviews-from-digicert-and-/</loc>
<lastmod>2026-04-01T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/say-easy-do-hard-crypto-agility-bsw-440/</loc>
<lastmod>2026-03-25T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/language-of-the-board-as-ciso-board-time-falls-short-and-cisos-struggle-with-ris/</loc>
<lastmod>2026-03-18T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/being-exploitable-while-your-risk-tolerance-changes-and-you-unblock-innovation-m/</loc>
<lastmod>2026-03-11T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/building-trusted-automation-as-leaders-struggle-with-ai-adoption-and-cisos-hire-/</loc>
<lastmod>2026-03-04T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/security-as-a-business-enabler-by-re-envisioning-risk-and-leading-through-uncert/</loc>
<lastmod>2026-02-25T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/security-money-the-index-and-nasdaq-diverge-bsw-435/</loc>
<lastmod>2026-02-18T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/preparing-for-q-day-as-cisos-face-quantum-disruption-and-cyber-resilience-pressu/</loc>
<lastmod>2026-02-11T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/unexamined-leadership-behaviors-as-ceos-and-cisos-balance-cybersecurity-investme/</loc>
<lastmod>2026-02-04T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/cloud-control-as-leaders-at-odds-over-cyber-priorities-but-require-strong-leader/</loc>
<lastmod>2026-01-28T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/internal-audit-focal-points-for-2026-as-ai-impacts-conventional-cybersecurity-ti/</loc>
<lastmod>2026-01-21T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/the-future-of-proactive-security-before-building-an-ai-enabled-enterprise-erik-n/</loc>
<lastmod>2026-01-14T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/ciso-lessons-from-a-childrens-novel-as-cybersecurity-outgrows-it-and-building-ta/</loc>
<lastmod>2026-01-07T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/say-easy-do-hard-preventing-burnout-focusing-on-ciso-health-and-wellness-bsw-428/</loc>
<lastmod>2025-12-31T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/the-ciso-holiday-party-2025-leadership-lessons-from-the-year-that-was-bsw-427/</loc>
<lastmod>2025-12-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/cybersecurity-hiring-trends-as-boards-bridge-confidence-gap-and-build-strategic-/</loc>
<lastmod>2025-12-17T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/salesforce-security-risks-boards-duty-of-care-and-managing-ciso-risks-justin-haz/</loc>
<lastmod>2025-12-10T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/shadow-risks-in-saas-cybersecurity-market-has-lost-its-mind-and-rise-of-the-ctro/</loc>
<lastmod>2025-12-03T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/security-money-the-index-is-back-near-highs-as-ai-leads-the-discussion-bsw-423/</loc>
<lastmod>2025-11-26T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/health-and-wellness-of-the-ciso-as-they-crack-under-pressure-and-need-a-biso-to-/</loc>
<lastmod>2025-11-19T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/business-security-weekly/securing-model-context-protocol-as-companies-plan-to-replace-entry-roles-with-ai/</loc>
<lastmod>2025-11-12T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/ai-confidence-its-a-trap-live-in-san-francisco/</loc>
<lastmod>2026-05-05T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/step-1-deploy-new-ai-tool-step-2-discover-security-flaws-step-3-repeat-live-in-o/</loc>
<lastmod>2026-04-28T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/back-in-my-day-you-could-get-a-cybersecurity-job-at-the-corner-store/</loc>
<lastmod>2026-04-21T14:22:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/our-theoretical-controls-work-great-against-hypothetical-attacks/</loc>
<lastmod>2026-04-14T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/remember-every-underappreciated-risk-is-just-a-crisis-waiting-to-be-discovered/</loc>
<lastmod>2026-04-07T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/do-you-think-these-compliance-boxes-check-themselves-live-in-clearwater-fl/</loc>
<lastmod>2026-03-31T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/why-highlight-diversity-when-we-can-just-hope-you-dont-notice/</loc>
<lastmod>2026-03-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/theyre-less-best-practices-and-more-sounds-good-on-linkedin/</loc>
<lastmod>2026-03-17T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/its-okay-to-put-all-your-eggs-in-one-basket-as-long-as-you-really-trust-the-bask/</loc>
<lastmod>2026-03-10T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/our-security-teams-love-language-is-buying-new-tools/</loc>
<lastmod>2026-03-03T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/if-we-cant-do-better-at-least-do-it-faster/</loc>
<lastmod>2026-02-24T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/we-gave-the-ciso-risk-and-liability-and-now-they-want-authority-the-nerve/</loc>
<lastmod>2026-02-17T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/when-we-see-white-smoke-we-know-we-have-a-new-ciso/</loc>
<lastmod>2026-02-10T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/take-two-factor-authentication-and-call-me-in-the-morning/</loc>
<lastmod>2026-02-03T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/ill-show-you-our-resilience-plan-once-our-cloud-storage-is-back-online/</loc>
<lastmod>2026-01-27T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/ai-is-very-efficient-at-making-us-forget-the-value-of-humans/</loc>
<lastmod>2026-01-20T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/managing-risk-has-been-a-priority-ever-since-you-asked-about-it-live-in-nyc/</loc>
<lastmod>2026-01-13T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/imagine-scaling-mistakes-5x-faster-thank-you-automation-live-in-ny/</loc>
<lastmod>2026-01-06T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/how-much-risk-would-a-ciso-risk-if-a-ciso-could-risk-risk-live-in-boca-raton/</loc>
<lastmod>2025-12-16T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/im-worried-that-were-not-worried-about-the-right-worries-with-ai/</loc>
<lastmod>2025-12-09T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/you-cant-fall-behind-in-ai-if-you-never-start/</loc>
<lastmod>2025-12-02T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/why-architect-for-human-error-when-we-can-make-people-feel-really-bad-about-it/</loc>
<lastmod>2025-11-25T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/are-you-implying-this-line-graph-isnt-a-compelling-cybersecurity-narrative/</loc>
<lastmod>2025-11-18T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/our-ciso-certainly-puts-the-tool-in-multi-tool-live-in-la/</loc>
<lastmod>2025-11-11T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-series-podcast/i-dont-just-guess-about-effectiveness-i-make-educated-guesses/</loc>
<lastmod>2025-11-04T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/282-top-10-agentic-ai-attacks-with-rock-lambros/</loc>
<lastmod>2026-05-04T20:13:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/281-siem-secrets-they-dont-tell-you-with-anton-chuvakin-and-alex-hurtado/</loc>
<lastmod>2026-04-27T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/280-mythos-and-the-future-of-vulnerability-operations-with-gadi-evron/</loc>
<lastmod>2026-04-20T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/279-ai-readiness-with-jp-bourget/</loc>
<lastmod>2026-04-13T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/278-rsac-takeaways-ai-soc-agent-security-and-what-cyber-marketing-gets-wrong/</loc>
<lastmod>2026-04-07T00:27:01.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/277-from-saas-to-ai-agents-gone-in-60-seconds/</loc>
<lastmod>2026-03-30T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/276-how-is-ai-reshaping-fraud-with-brian-long/</loc>
<lastmod>2026-03-23T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/275-how-to-secure-vibe-code-with-shahar-man/</loc>
<lastmod>2026-03-16T12:23:15.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/274-the-state-of-stress-in-cyber-with-steve-shelton/</loc>
<lastmod>2026-03-09T13:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/273-creating-a-wisdom-led-soc-with-oren-saban/</loc>
<lastmod>2026-03-02T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/272-data-centric-platform-play-with-ej-pappas/</loc>
<lastmod>2026-02-23T13:40:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/271-a-life-of-service-with-chris-inglis/</loc>
<lastmod>2026-02-16T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/270-and-what-is-truth/</loc>
<lastmod>2026-02-03T06:37:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/269-changing-third-party-risk-management-with-nate-lee/</loc>
<lastmod>2026-01-26T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/268-zero-trust-isnt-a-product-with-george-finney/</loc>
<lastmod>2026-01-19T14:30:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/267-busy-is-the-new-stupid-with-ross-young/</loc>
<lastmod>2026-01-12T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/266-why-cisos-miss-the-next-big-security-challenge-with-richard-stiennon/</loc>
<lastmod>2026-01-05T13:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/265-12-ciso-templates-with-ross-young/</loc>
<lastmod>2025-12-29T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/264-behavioral-insights-with-dr-dustin-sachs/</loc>
<lastmod>2025-12-22T13:49:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/263-stopping-attacks-to-your-cloud-office-environment-with-rajan-kapoor/</loc>
<lastmod>2025-12-15T14:13:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/262-ai-mastery-for-cisos-what-you-must-know/</loc>
<lastmod>2025-12-08T14:00:53.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/261-vibe-coding-security-with-neatsun-ziv/</loc>
<lastmod>2025-12-01T14:00:45.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/260-mastering-defense-against-configurations-with-yuriy-tsibere/</loc>
<lastmod>2025-11-24T14:00:23.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/259-transforming-security-operations-with-brian-carbaugh-and-william-macmillan/</loc>
<lastmod>2025-11-17T15:36:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/ciso-tradecraft/258-from-invention-to-entrepreneurship-with-jeri-ellsworth/</loc>
<lastmod>2025-11-10T17:31:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/it-didnt-look-like-propaganda/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/access-denied/</loc>
<lastmod>2026-05-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/not-quite-yours/</loc>
<lastmod>2026-04-28T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/rage-against-the-machine/</loc>
<lastmod>2026-04-24T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/the-price-tag-of-you/</loc>
<lastmod>2026-04-21T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/the-space-debris-strikes-back/</loc>
<lastmod>2026-04-17T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/defying-gravity/</loc>
<lastmod>2026-04-14T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/reverse-engineering-us/</loc>
<lastmod>2026-04-10T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/every-breath-you-fake/</loc>
<lastmod>2026-04-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/the-village-that-built-the-internet/</loc>
<lastmod>2026-04-03T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/almost-heaven-no-reception/</loc>
<lastmod>2026-03-31T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/internet-at-the-speed-of-light/</loc>
<lastmod>2026-03-27T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/a-wrinkle-in-time-gps-jamming-in-ukraine/</loc>
<lastmod>2026-03-24T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/the-other-battlefield/</loc>
<lastmod>2026-03-20T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/return-to-code-red-hacking-the-halls-of-medicine/</loc>
<lastmod>2026-03-17T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/the-rise-of-high-tech-despotism/</loc>
<lastmod>2026-03-13T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/smuggling-signals-out-of-iran/</loc>
<lastmod>2026-03-10T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/when-morality-meets-the-machine/</loc>
<lastmod>2026-03-06T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/ais-divine-intervention/</loc>
<lastmod>2026-03-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/dispatches-from-the-ukrainian-front/</loc>
<lastmod>2026-02-27T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/your-data-commodified/</loc>
<lastmod>2026-02-24T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/chasing-shadows-with-the-citizen-lab/</loc>
<lastmod>2026-02-20T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/reading-north-korea/</loc>
<lastmod>2026-02-17T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/miss-lonelyhearts-and-the-money-mules/</loc>
<lastmod>2026-02-13T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/click-here/defying-gravity-2/</loc>
<lastmod>2026-02-10T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/aispm-isnt-enough-how-to-apply-zero-trust-to-ai-agents/</loc>
<lastmod>2026-04-29T18:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/the-rise-of-agentic-cloud-security-code-to-cloud-shrinks-to-3-days/</loc>
<lastmod>2026-04-21T18:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/why-edr-fails-at-ai-security-and-the-rise-of-endpoint-behavior-modeling/</loc>
<lastmod>2026-04-14T18:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/solving-prompt-injection-and-shadow-ai-for-ai-malware/</loc>
<lastmod>2026-04-07T18:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/browser-security-explained-consent-phishing-click-fix-attacks-and-the-limits-of-/</loc>
<lastmod>2026-03-10T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/is-ai-hallucinations-a-myth-and-the-real-threat-from-ai/</loc>
<lastmod>2026-03-06T19:20:36.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/why-ai-infrastructure-is-harder-to-secure-than-cloud/</loc>
<lastmod>2026-02-20T02:28:40.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/how-attackers-bypass-ai-guardrails-with-natural-language/</loc>
<lastmod>2026-02-10T22:10:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/vulnerability-management-vs-exposure-management/</loc>
<lastmod>2026-02-06T19:27:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/is-developer-friendly-ai-security-possible-with-mcp-and-shadow-ai/</loc>
<lastmod>2026-02-05T04:55:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/why-ai-cant-replace-detection-engineers-build-vs-buy-and-the-future-of-soc/</loc>
<lastmod>2026-01-21T19:45:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/ai-vulnerability-management-why-you-cant-patch-a-neural-network/</loc>
<lastmod>2026-01-13T19:45:01.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/why-backups-arent-enough-and-identity-recovery-is-key-against-ransomware/</loc>
<lastmod>2025-12-16T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/how-to-secure-your-ai-agents-a-cisos-journey/</loc>
<lastmod>2025-12-09T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/ai-first-vulnerability-management-should-cisos-build-or-buy/</loc>
<lastmod>2025-12-04T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/siem-vs-data-lake-why-we-ditched-traditional-logging/</loc>
<lastmod>2025-12-02T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/how-to-build-trust-in-an-ai-soc-for-regulated-environments/</loc>
<lastmod>2025-11-18T23:28:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/threat-modeling-the-ai-agent-architecture-threats-and-monitoring/</loc>
<lastmod>2025-11-11T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/ai-is-already-breaking-the-silos-between-appsec-and-cloudsec/</loc>
<lastmod>2025-11-04T19:55:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/ai-agents-for-soc-hype-curve-vs-measurable-roi/</loc>
<lastmod>2025-10-28T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/can-you-build-an-ai-soc-with-claude-code-the-reality-vs-hype/</loc>
<lastmod>2025-10-21T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/incident-response-of-kubernetes-and-how-to-automate-containment/</loc>
<lastmod>2025-10-10T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/the-truth-about-ai-in-the-soc-from-alert-fatigue-to-detection-engineering/</loc>
<lastmod>2025-10-03T17:00:01.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/the-security-gaps-in-aws-bedrock-and-azure-ai-you-need-to-know/</loc>
<lastmod>2025-09-23T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cloud-security-podcast/the-evolution-of-email-security-from-pre-breach-to-post-breach-protection/</loc>
<lastmod>2025-09-16T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/insider-threats-or-when-the-hacker-already-has-a-badge/</loc>
<lastmod>2026-05-02T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/us-secret-service-in-action-exclusive/</loc>
<lastmod>2026-05-01T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/why-hackers-love-when-you-deploy-agentic-ai/</loc>
<lastmod>2026-04-28T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/this-new-rule-can-destroy-your-sales-overnight-cmmcs-wide-reach/</loc>
<lastmod>2026-04-27T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/ransomware-negotiations-exposed-inside-cyber-hostage-deals-with-kurtis-minder/</loc>
<lastmod>2026-04-26T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/ai-in-healthcare-hope-or-hype/</loc>
<lastmod>2026-04-24T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/baby-al-capone-new-wave-of-online-violence-stories/</loc>
<lastmod>2026-04-23T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/new-ways-to-take-control-over-data-privacy-with-kurt-long/</loc>
<lastmod>2026-04-22T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/stop-taking-bad-advice-an-open-letter-to-the-world/</loc>
<lastmod>2026-04-19T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/understanding-ransomware-gangs-key-information/</loc>
<lastmod>2026-04-17T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/chaos-or-cybersecurity-predictions-you-need-to-know-now/</loc>
<lastmod>2026-04-15T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/why-hackers-target-you-dark-web-exposed/</loc>
<lastmod>2026-04-12T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/super-ai-exposed-or-should-humanity-surrender-control/</loc>
<lastmod>2026-04-10T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/can-brett-johnson-help-you-spot-fraud-before-its-too-late/</loc>
<lastmod>2026-04-10T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/ai-exposed-latest-social-engineering-business-cyber-risk/</loc>
<lastmod>2026-04-08T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/biggest-cyber-insurance-mistakes-to-avoid/</loc>
<lastmod>2026-04-05T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/fbi-most-wanted-ruja-ignatova-story-of-onecoin/</loc>
<lastmod>2026-04-03T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/how-business-can-transfer-cyber-risk/</loc>
<lastmod>2026-04-01T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/moving-target-trilogy-released/</loc>
<lastmod>2026-04-01T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/how-to-not-become-a-victim-of-cyber-crime/</loc>
<lastmod>2026-03-29T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/dark-sword-zero-day-leaked-millions-of-iphones-at-risk-today/</loc>
<lastmod>2026-03-29T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/the-aftermath-navigating-reputations-and-protecting-your-brand-image/</loc>
<lastmod>2026-03-29T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/cybersecurity-and-society-or-insights-from-lux-blox-inventor-mike-acerra/</loc>
<lastmod>2026-03-28T20:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/anthem-and-equifax-breaches-whats-actually-happening-part-2/</loc>
<lastmod>2026-03-27T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-crime-junkies/anthem-and-equifax-breaches-whats-actually-happening-part-1/</loc>
<lastmod>2026-03-27T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/empathy-over-ego-why-were-angry-at-the-wrong-people-in-cybersecurity/</loc>
<lastmod>2024-04-02T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/a-hackers-guide-to-changing-the-world/</loc>
<lastmod>2024-03-19T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/who-says-cybersecurity-cant-be-fun-how-humor-bands-us-together/</loc>
<lastmod>2024-03-05T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/a-convincing-case-for-optimism-why-data-privacy-is-coded-into-our-culture/</loc>
<lastmod>2024-02-20T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/the-underrated-role-of-self-awareness-in-cybersecurity-with-alyssa-miller/</loc>
<lastmod>2024-02-06T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/creating-change-through-hacking-teaching-and-leading/</loc>
<lastmod>2024-01-23T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/mission-before-money-refocusing-cybersecurity-on-what-matters/</loc>
<lastmod>2023-12-12T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/from-code-to-compassion-how-to-use-nonviolent-communication-to-elevate-cybersecu/</loc>
<lastmod>2023-11-28T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/cybersecurity-craves-human-connection/</loc>
<lastmod>2023-11-21T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/neurohacking-blending-science-security-and-sound/</loc>
<lastmod>2023-11-14T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/cybertrauma-the-invisible-scars-of-constant-connectivity/</loc>
<lastmod>2023-11-07T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/where-passion-meets-purpose-exploring-security-as-a-universal-value/</loc>
<lastmod>2023-10-31T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/why-being-kind-is-the-harder-thing-to-do/</loc>
<lastmod>2023-10-24T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/why-cybersecurity-thrives-on-authenticity-confidence-deep-empathy/</loc>
<lastmod>2023-10-17T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/the-7-habits-of-highly-empathetic-people/</loc>
<lastmod>2023-10-10T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/facing-fear-and-finding-joy-how-i-put-empathy-to-work/</loc>
<lastmod>2023-10-03T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/ethical-hackers-and-the-legacy-of-the-hacker-manifesto/</loc>
<lastmod>2023-05-23T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/empathy-in-cybersecurity-is-about-picking-a-side/</loc>
<lastmod>2023-05-09T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/how-to-engage-the-human-os-in-cybersecurity-with-the-heart-head-and-hands-method/</loc>
<lastmod>2023-04-25T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/practical-empathy-is-crucial-to-attracting-cybersecurity-talent/</loc>
<lastmod>2023-04-11T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/cybersecurity-is-about-loving-other-people/</loc>
<lastmod>2023-03-28T03:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/creating-psychological-safety-in-cybersecurity/</loc>
<lastmod>2023-03-14T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/why-security-teams-need-an-empathy-filter/</loc>
<lastmod>2023-02-28T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/from-fear-to-friendship-how-positive-language-boosts-cybersecurity-awareness/</loc>
<lastmod>2023-02-14T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-empathy/how-emotions-shape-human-behavior-in-cybersecurity/</loc>
<lastmod>2022-11-01T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/instructure-discloses-breach-digicert-revokes-certificates-silver-fox-targets-in/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/telegram-mini-apps-malware-cpanel-is-sorry-patch-wave-warning/</loc>
<lastmod>2026-05-04T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-github-drama-ai-deletes-production-data-claude-security-b/</loc>
<lastmod>2026-05-01T21:17:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/critical-cpanel-zero-day-swiss-black-axe-arrests-hhs-data-center-questions/</loc>
<lastmod>2026-05-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/roblox-hackers-arrested-microsoft-0-day-falls-short-dubai-scam-takedown/</loc>
<lastmod>2026-04-30T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/agent-payments-russian-phishing-lerobot-rce-flaw/</loc>
<lastmod>2026-04-29T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/phantomrpc-flaw-checkmarx-github-dark-web-data-pypi-package-infostealer/</loc>
<lastmod>2026-04-28T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/adt-data-breach-toronto-sms-blasting-pre-stuxnet-malware-discovery/</loc>
<lastmod>2026-04-27T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-vercel-breach-a-contagious-interview-and-ghost-breaches/</loc>
<lastmod>2026-04-24T20:26:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/rituals-cosmetics-breach-fbi-ios-flaw-fixed-teams-helpdesk-impersonation/</loc>
<lastmod>2026-04-24T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-p/</loc>
<lastmod>2026-04-23T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/cisa-lacks-mythos-lovables-leak-by-design-youtubes-deepfake-detection/</loc>
<lastmod>2026-04-22T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/</loc>
<lastmod>2026-04-21T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/london-hospital-ransomware-legacy-poweroff-takedown-microsoft-redsun-zero-day/</loc>
<lastmod>2026-04-20T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-mythos-mayhem-critical-infrastructure-targeted-nvd-change/</loc>
<lastmod>2026-04-17T21:45:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/cisco-webex-warning-splunks-enterprise-fix-git-spoof-tricks-claude/</loc>
<lastmod>2026-04-17T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/openais-gpt-54-cyber-mcgraw-hill-blames-salesforce-for-breach-signed-adware-disa/</loc>
<lastmod>2026-04-16T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/ransomware-drama-faked-ledger-app-treasury-wants-mythos/</loc>
<lastmod>2026-04-15T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/claude-mythos-previews-capabilities-anodot-breached-companies-face-extortion-wol/</loc>
<lastmod>2026-04-14T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-is-moving-to-fridays/</loc>
<lastmod>2026-04-13T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/adobe-patches-zero-day-marimo-flaw-exploited-venice-flood-threat/</loc>
<lastmod>2026-04-13T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/android-api-exposure-acrobat-reader-zero-day-bitcoin-depot-cyberattack/</loc>
<lastmod>2026-04-10T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/chipsoft-popped-apt28-updates-cia-cyber-espionage-elevation/</loc>
<lastmod>2026-04-09T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/anthropics-project-glasswing-cisa-funding-in-doubt-routers-hijacked-for-password/</loc>
<lastmod>2026-04-08T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-security-headlines/drift-blames-exploit-on-north-korea-github-attacks-target-south-korea-die-linke-/</loc>
<lastmod>2026-04-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/from-stealing-servers-to-saving-lives-working-in-red-teaming-or-jim-broome/</loc>
<lastmod>2025-08-18T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/why-hackers-are-stealing-encrypted-data-now-to-decrypt-later-or-david-close/</loc>
<lastmod>2025-08-11T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/working-in-ransomware-response-investigation-and-recovery-or-john-price/</loc>
<lastmod>2025-07-28T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/from-security-audits-to-privacy-consulting-building-a-grc-practice-or-will-sween/</loc>
<lastmod>2025-07-21T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/from-dead-end-job-to-ceo-building-an-it-consulting-business-or-john-hansman/</loc>
<lastmod>2025-07-14T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/from-fbi-cyber-agent-to-police-tech-innovator-or-andre-mcgregor/</loc>
<lastmod>2025-06-16T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/build-your-own-pentesting-tools-and-master-red-teaming-tactics-or-ed-williams/</loc>
<lastmod>2025-06-02T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/the-future-is-cloud-master-azure-certs-for-cybersecurity-success-or-guest-wilfre/</loc>
<lastmod>2025-05-12T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/cloud-career-roadmap-azure-administrator-vs-security-engineer-certs-or-guest-wil/</loc>
<lastmod>2025-05-05T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/when-ai-goes-rogue-api-security-in-the-age-of-ai-agents-or-guest-sam-chehab/</loc>
<lastmod>2025-04-21T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/why-medical-device-security-needs-transparency-the-sbom-revolution-or-guest-ken-/</loc>
<lastmod>2025-04-14T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/from-cia-to-ciso-ai-security-predictions-and-career-strategies-or-guest-ross-you/</loc>
<lastmod>2025-03-31T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/securing-apple-vs-windows-which-is-harder-or-guest-weldon-dodd/</loc>
<lastmod>2025-03-24T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/using-chatgpt-for-offensive-security-or-guest-robert-morel/</loc>
<lastmod>2025-03-17T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/comptia-network-training-what-to-expect-in-a-boot-camp-or-instructor-tommy-gober/</loc>
<lastmod>2025-03-10T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/understanding-comptia-ceus-how-to-renew-your-network-or-guest-tommy-gober/</loc>
<lastmod>2025-03-04T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/network-practice-questions-tips-to-pass-your-exam-or-guest-tommy-gober/</loc>
<lastmod>2025-02-24T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/comptia-network-is-it-necessary-for-a-cybersecurity-career-or-guest-tommy-gober/</loc>
<lastmod>2025-01-27T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/incident-response-what-i-learned-from-a-hands-on-project-or-guest-gamuchirai-muc/</loc>
<lastmod>2025-01-13T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/how-to-hack-an-api-a-walkthrough-or-guest-katie-paxton-fear/</loc>
<lastmod>2025-01-06T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/comptia-cysa-your-key-to-cybersecurity-analyst-roles-or-guest-james-stanger/</loc>
<lastmod>2024-12-16T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/penetration-testing-careers-101-learning-and-getting-certified-or-cyber-work-hac/</loc>
<lastmod>2024-12-09T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/understanding-dod-8140-and-comptia-certifications-or-cyber-work-hacks/</loc>
<lastmod>2024-12-02T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/certifications-101-why-a-network-and-security-are-game-changers-or-cyber-work-ha/</loc>
<lastmod>2024-11-18T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyber-work/navigating-iso-27001-and-cybersecurity-management-or-guest-gry-evita-sivertsen/</loc>
<lastmod>2024-11-11T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-4-2026-ddos-attack-strikes-linux-os-provider-ubuntu-wcyb/</loc>
<lastmod>2026-05-04T13:10:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-4-2026-no-secrets-in-americas-new-surveillance-dragnet-w/</loc>
<lastmod>2026-05-04T12:52:02.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-2-3-2026-weekend-update-wcyb-digital-radio/</loc>
<lastmod>2026-05-02T05:00:17.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-1-2026-amtrak-data-breach-leaks-millions-of-records-wcyb/</loc>
<lastmod>2026-05-01T13:54:17.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-1-2026-us-troops-get-threats-from-iran-linked-hackers-wc/</loc>
<lastmod>2026-05-01T13:15:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/agentic-ai-powered-digital-executive-protection-matt-polak-founder-and-ceo-vanis/</loc>
<lastmod>2026-04-30T19:43:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/ciso-confidential-disruptive-defense-james-howley-cummins-and-bobby-ford-doppel/</loc>
<lastmod>2026-04-30T18:50:40.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/french-credit-card-hacker-discusses-his-crimes-after-two-decades-a-conversation-/</loc>
<lastmod>2026-04-30T16:15:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/ransomware-minute-mcgraw-hill-hit-135m-records-exposed-scott-schober-wcyb-digita/</loc>
<lastmod>2026-04-30T14:22:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-30-2026-texas-man-gets-23-years-for-dollar1b-crypto-scam/</loc>
<lastmod>2026-04-30T13:48:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-apr-30-2026-breach-hits-the-asian-football-confederation-wcy/</loc>
<lastmod>2026-04-30T13:30:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/convicted-hacker-turned-security-researcher-from-guilty-plea-to-founder-dustin-h/</loc>
<lastmod>2026-04-29T15:09:35.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/public-sector-cyber-brief-visibility-gap-michael-centrella-securityscorecard-and/</loc>
<lastmod>2026-04-29T14:42:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-apr-29-2026-pitney-bowes-hit-by-82m-email-address-leak-wcyb-/</loc>
<lastmod>2026-04-29T14:03:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-29-2026-hackers-impersonate-microsoft-teams-help-desk-wc/</loc>
<lastmod>2026-04-29T13:44:24.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/mastering-cyber-beware-of-money-saving-scams-alissa-dr-jay-abdullah-deputy-cso-m/</loc>
<lastmod>2026-04-29T13:00:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/theresa-caputo-aka-long-island-medium-on-internet-scams-impostors-deepfakes-soci/</loc>
<lastmod>2026-04-28T19:05:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/evolution-of-bug-bounties-a-hackers-perspective-katie-moussouris-founder-and-ceo/</loc>
<lastmod>2026-04-28T15:28:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/securing-the-build-rsac-2026-what-appsec-teams-get-wrong-rami-sass-mendio/</loc>
<lastmod>2026-04-28T14:00:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-apr-28-2026-supply-chain-attack-hit-carnival-data-leaked-wcy/</loc>
<lastmod>2026-04-28T13:52:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-28-2026-russia-suspected-in-signal-phishing-attack-wcyb-/</loc>
<lastmod>2026-04-28T13:29:12.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/virginias-cyber-landscape-an-overview-emily-pochter-virginia-economic-developmen/</loc>
<lastmod>2026-04-27T14:38:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-apr-27-2026-home-security-giant-adt-suffers-a-data-breach-wc/</loc>
<lastmod>2026-04-27T14:00:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-27-2026-sri-lanka-probes-dollar25m-gov-payment-cyber-fra/</loc>
<lastmod>2026-04-27T13:29:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-24-2026-workers-sue-dollar10b-ai-startup-over-data-expos/</loc>
<lastmod>2026-04-24T13:20:22.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-ai-adoption-in-enterprise-infrastructure-has-expanded-the-attack-surface-wit/</loc>
<lastmod>2026-05-04T10:00:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/cybersecurity-is-a-core-leadership-issue-and-opportunity-with-david-chernitzky-f/</loc>
<lastmod>2026-04-29T13:56:15.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/millions-in-crypto-stolen-vercel-breach-mastodon-ddos-attack-north-korean-it-wor/</loc>
<lastmod>2026-04-27T12:45:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/real-examples-of-ai-powered-code-scanning-with-jeff-mcjunkin-from-rogue-valley-i/</loc>
<lastmod>2026-04-27T04:56:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-can-we-improve-global-security-with-j-michael-daniel-from-cyber-threat-allia/</loc>
<lastmod>2026-04-22T13:35:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/china-linked-group-targets-cloud-workflows-russian-cyber-espionage-agentic-ai-sy/</loc>
<lastmod>2026-04-20T13:00:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-do-you-know-your-ai-agents-are-actually-correct-with-dylan-williams-from-spe/</loc>
<lastmod>2026-04-17T13:16:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/understanding-how-attackers-think-and-helping-you-avoid-threats-with-terry-bradl/</loc>
<lastmod>2026-04-15T13:00:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/iran-linked-cyber-attacks-us-critical-infrastructure-flamingchina-nodejs-targete/</loc>
<lastmod>2026-04-13T13:00:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/levelling-up-your-ai-soc-with-joshua-neil-from-alpha-level-defender-fridays-309/</loc>
<lastmod>2026-04-10T13:36:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/why-cyber-analysts-are-crucial-in-protecting-public-infrastructure-with-michael-/</loc>
<lastmod>2026-04-08T13:00:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/irans-irgc-threatens-us-tech-companies-fbi-director-hacked-venom-stealer-and-has/</loc>
<lastmod>2026-04-06T13:00:28.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/malicious-geopolitical-cyber-activity-cyberattacks-tied-to-conflict-in-iran-open/</loc>
<lastmod>2026-03-30T13:00:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/what-makes-a-strong-security-team-with-andrew-cook-from-recon-infosec-defender-f/</loc>
<lastmod>2026-03-27T13:02:56.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/bringing-40-year-old-industrial-security-systems-into-the-21st-century-with-just/</loc>
<lastmod>2026-03-25T16:03:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/is-it-smart-to-have-ai-agents-act-as-employees-with-david-burkett-from-corelight/</loc>
<lastmod>2026-03-20T14:56:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-to-think-long-term-growth-in-an-ai-dominated-industry-with-stel-valavanis-fr/</loc>
<lastmod>2026-03-19T13:00:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/cyber-strategy-for-america-new-targets-in-war-in-iran-camaro-dragon-and-medical-/</loc>
<lastmod>2026-03-17T13:41:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/drones-damage-data-centers-iranian-cyber-retaliation-sloppy-lemming-and-honeywel/</loc>
<lastmod>2026-03-09T12:56:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/learning-how-to-trust-that-ai-is-secure-with-saurabh-shintre-from-realm-labs-def/</loc>
<lastmod>2026-03-09T11:02:48.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/north-korean-malware-interviews-fortigate-firewall-compromised-cisco-zero-day-an/</loc>
<lastmod>2026-03-03T14:57:35.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/ai-red-teaming-with-john-v-from-the-institute-for-security-and-technology-defend/</loc>
<lastmod>2026-02-27T16:23:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-to-strengthen-cyber-resilience-in-an-ai-era-with-chris-cochran-from-sans-ins/</loc>
<lastmod>2026-02-25T14:00:36.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/doppelbrand-targets-fortune-500s-android-malware-keenadu-attackers-expand-ai-ado/</loc>
<lastmod>2026-02-23T14:00:35.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-is-ai-reshaping-app-security-with-farshad-abasi-from-eureka-devsecops-defend/</loc>
<lastmod>2026-02-20T15:30:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/security-without-a-login-screen/</loc>
<lastmod>2026-05-04T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/kayla-williams-not-everything-related-to-cybersecurity-is-a-fire-drill-ciso-care/</loc>
<lastmod>2026-05-03T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/double-edged-threat-research-saturday/</loc>
<lastmod>2026-05-02T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/think-before-you-deploy-the-agent/</loc>
<lastmod>2026-05-01T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/one-copy-too-many/</loc>
<lastmod>2026-04-30T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/a-wake-up-call-on-frontier-ai/</loc>
<lastmod>2026-04-29T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/war-hits-where-it-hurts/</loc>
<lastmod>2026-04-28T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/the-three-layer-strategy-for-autonomous-agent-governance-with-joe-hladik-data-se/</loc>
<lastmod>2026-04-28T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/the-supreme-court-sits-on-the-geofence/</loc>
<lastmod>2026-04-27T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/adam-marre-learning-to-be-a-leader-ciso-career-notes/</loc>
<lastmod>2026-04-26T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/a-qrazy-clever-scam-research-saturday/</loc>
<lastmod>2026-04-25T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/a-digital-battlefield-in-practice/</loc>
<lastmod>2026-04-24T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/your-signal-is-showing/</loc>
<lastmod>2026-04-23T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/the-leak-was-only-a-matter-of-time/</loc>
<lastmod>2026-04-22T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/trust-lags-behind-technology/</loc>
<lastmod>2026-04-21T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/when-one-weak-link-is-enough/</loc>
<lastmod>2026-04-20T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/jaya-baloo-dont-be-afraid-to-bounce-ideas-off-your-teammates-ciso-career-notes/</loc>
<lastmod>2026-04-19T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/a-new-breed-of-rat-research-saturday/</loc>
<lastmod>2026-04-18T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/temporary-fix-for-section-702/</loc>
<lastmod>2026-04-17T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/too-many-flaws-not-enough-time/</loc>
<lastmod>2026-04-16T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/a-heavy-patch-tuesday-lands/</loc>
<lastmod>2026-04-15T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/france-builds-its-own-digital-future/</loc>
<lastmod>2026-04-14T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/w3ll-runs-dry/</loc>
<lastmod>2026-04-13T20:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/mark-logan-march-towards-your-goals-ceo-career-notes/</loc>
<lastmod>2026-04-12T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/cyberwire-daily/walking-through-the-anatomy-of-a-cyberattack-cyberwire-x/</loc>
<lastmod>2026-04-12T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/174-pacific-rim/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/173-tarjeteros/</loc>
<lastmod>2026-04-21T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/172-superbox/</loc>
<lastmod>2026-04-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/171-melody-fraud/</loc>
<lastmod>2026-03-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/170-phrack/</loc>
<lastmod>2026-02-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/169-mod/</loc>
<lastmod>2026-01-20T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/168-lod/</loc>
<lastmod>2026-01-06T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/167-threatlocker/</loc>
<lastmod>2025-12-23T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/166-maxie/</loc>
<lastmod>2025-12-02T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/165-tanya/</loc>
<lastmod>2025-11-04T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/164-oak-cliff-swipers/</loc>
<lastmod>2025-10-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/163-ola/</loc>
<lastmod>2025-09-02T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/162-hieu/</loc>
<lastmod>2025-08-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/161-mg/</loc>
<lastmod>2025-07-15T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/160-greg/</loc>
<lastmod>2025-07-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/159-vastaamo/</loc>
<lastmod>2025-06-03T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/158-malwaretech/</loc>
<lastmod>2025-05-06T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/157-grifter/</loc>
<lastmod>2025-04-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/156-kill-list/</loc>
<lastmod>2025-03-18T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/155-kingpin/</loc>
<lastmod>2025-03-04T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/154-hijacked-line/</loc>
<lastmod>2025-02-04T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/153-bike-index/</loc>
<lastmod>2025-01-07T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/152-stacc-attack/</loc>
<lastmod>2024-12-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/151-chris-rock/</loc>
<lastmod>2024-11-05T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/darknet-diaries/150-mobman-2/</loc>
<lastmod>2024-10-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/microsofts-approach-to-incident-management/</loc>
<lastmod>2022-10-10T13:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/overcoming-the-challenges-of-a-cyber-security-incident/</loc>
<lastmod>2022-09-26T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/threat-containment-and-eradication/</loc>
<lastmod>2022-09-12T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/how-to-detect-and-analyse-threats/</loc>
<lastmod>2022-08-29T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/cyber-security-incident-response-101/</loc>
<lastmod>2022-08-15T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/how-we-manage-cyber-risk-at-microsoft/</loc>
<lastmod>2022-08-01T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/how-to-implement-a-risk-monitoring-program/</loc>
<lastmod>2022-07-18T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/where-does-risk-response-sit-in-your-business/</loc>
<lastmod>2022-07-04T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/practical-approaches-to-evaluating-cyber-risk/</loc>
<lastmod>2022-06-20T14:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/why-your-organisation-should-take-a-risk-based-approach-to-cyber/</loc>
<lastmod>2022-06-07T02:01:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/decoding-security/identifying-cyber-risks-in-your-business/</loc>
<lastmod>2022-06-06T14:02:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-do-you-know-if-your-backups-will-survive-a-ransomware-attack/</loc>
<lastmod>2026-04-30T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/what-makes-a-successful-security-vendor-demo/</loc>
<lastmod>2026-04-23T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/should-you-use-native-or-3rd-party-cloud-management-tools/</loc>
<lastmod>2026-04-16T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-should-we-measure-the-performance-of-a-ciso/</loc>
<lastmod>2026-04-09T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-to-be-less-busy-and-more-effective-in-cyber/</loc>
<lastmod>2026-04-02T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-to-engage-with-a-ciso-when-they-express-interest/</loc>
<lastmod>2026-03-26T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/who-is-responsible-for-the-conflict-between-security-and-developers/</loc>
<lastmod>2026-03-19T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/are-your-security-tools-creating-more-work-for-your-team/</loc>
<lastmod>2026-03-12T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/why-overpromising-is-a-dangerous-sales-tactic/</loc>
<lastmod>2026-03-05T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/should-you-phish-your-employees-or-not/</loc>
<lastmod>2026-02-26T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-much-autonomy-should-you-give-ai-agents-in-your-soc/</loc>
<lastmod>2026-02-19T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/cybersecuritys-broken-hiring-process/</loc>
<lastmod>2026-02-12T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/simple-security-solutions-that-deliver-a-big-impact/</loc>
<lastmod>2026-02-05T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/when-cybersecurity-marketing-fails-to-reach-the-buyer/</loc>
<lastmod>2026-01-29T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-best-to-prepare-your-data-for-your-tools/</loc>
<lastmod>2026-01-22T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/dont-try-to-win-with-technical-expertise-win-by-partnering/</loc>
<lastmod>2026-01-15T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/what-makes-a-successful-ciso/</loc>
<lastmod>2026-01-08T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-should-cisos-talk-to-the-business/</loc>
<lastmod>2025-12-18T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-much-cyber-risk-should-a-ciso-own/</loc>
<lastmod>2025-12-11T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-to-tell-when-a-vendor-is-selling-ai-snake-oil/</loc>
<lastmod>2025-12-04T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/in-the-age-of-identity-is-network-security-dead/</loc>
<lastmod>2025-11-20T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-to-manage-configuration-drift/</loc>
<lastmod>2025-11-13T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/is-least-privilege-dead/</loc>
<lastmod>2025-11-06T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/how-do-we-measure-our-defenses-against-social-engineering-attacks/</loc>
<lastmod>2025-10-30T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defense-in-depth/sales-follow-up-sequences-what-works-best-in-cyber/</loc>
<lastmod>2025-10-23T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-345/</loc>
<lastmod>2026-04-22T13:57:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-344/</loc>
<lastmod>2026-04-14T19:15:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-343/</loc>
<lastmod>2026-04-04T01:20:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-342b/</loc>
<lastmod>2026-03-28T11:50:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-341/</loc>
<lastmod>2026-03-09T00:59:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-340/</loc>
<lastmod>2026-02-24T20:19:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-339/</loc>
<lastmod>2026-02-16T13:43:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-338/</loc>
<lastmod>2026-02-02T01:08:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-337/</loc>
<lastmod>2026-01-26T20:30:28.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-336/</loc>
<lastmod>2026-01-15T21:15:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-335/</loc>
<lastmod>2026-01-07T00:07:18.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-334/</loc>
<lastmod>2025-12-25T03:54:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-333/</loc>
<lastmod>2025-12-20T21:39:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-332/</loc>
<lastmod>2025-12-13T17:30:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-331b/</loc>
<lastmod>2025-12-02T18:14:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-330/</loc>
<lastmod>2025-11-24T16:37:24.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-329/</loc>
<lastmod>2025-11-13T20:58:53.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-328/</loc>
<lastmod>2025-11-03T20:42:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-327/</loc>
<lastmod>2025-10-27T15:29:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-326/</loc>
<lastmod>2025-10-21T15:44:10.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-325/</loc>
<lastmod>2025-10-13T23:35:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-324/</loc>
<lastmod>2025-10-06T14:11:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-323/</loc>
<lastmod>2025-09-29T15:04:37.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-322/</loc>
<lastmod>2025-09-22T16:19:53.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/defensive-security/defensive-security-podcast-episode-321/</loc>
<lastmod>2025-09-15T14:47:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-704-market-saturation-innovation-and-procurement/</loc>
<lastmod>2026-05-05T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-703-the-myth-and-reality-of-mythos/</loc>
<lastmod>2026-04-28T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-702-trust-issues-with-trusted-advisors/</loc>
<lastmod>2026-04-21T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-701-adrian-sanabria-ai-cant-replace-jobs/</loc>
<lastmod>2026-04-14T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-700-an-unreal-milestone/</loc>
<lastmod>2026-04-07T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-699-marcus-hutchins-hot-takes-and-ai/</loc>
<lastmod>2026-03-31T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-698-leadership-in-a-high-stakes-ciso-role/</loc>
<lastmod>2026-03-24T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-697-the-precarious-evolution-of-the-ciso-role/</loc>
<lastmod>2026-03-17T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-696-zero-trust-cybersecurity-shenanigans/</loc>
<lastmod>2026-03-10T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-695-cyber-is-headed-for-a-market-meltdown/</loc>
<lastmod>2026-03-03T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-694-seasonal-martyrdom-and-cyber-burnout/</loc>
<lastmod>2026-02-24T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-693-the-most-important-ai-conversation/</loc>
<lastmod>2026-02-17T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-692-ran-nahmias-the-perpetual-entrepreneur/</loc>
<lastmod>2026-02-10T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-691-how-to-make-external-security-testing-useless/</loc>
<lastmod>2026-02-03T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-690-defenders-of-the-internet-pipes/</loc>
<lastmod>2026-01-27T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-689-off-the-rails-social-media-is-evil/</loc>
<lastmod>2026-01-20T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-688-looking-for-meaning-in-the-signal/</loc>
<lastmod>2026-01-13T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-687-dan-geers-wisdom-from-2014/</loc>
<lastmod>2026-01-06T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-686-an-unexpected-windows-xp-conversation/</loc>
<lastmod>2025-12-30T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-685-weaponized-ai-is-real-now-what-pt-1/</loc>
<lastmod>2025-12-23T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-684-ai-agents-gone-rogue/</loc>
<lastmod>2025-12-16T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-683-sometimes-you-have-to-step-away/</loc>
<lastmod>2025-12-09T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-682-a-third-opinion-on-vulnerability-ranking/</loc>
<lastmod>2025-12-02T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-681-appsec-whack-a-mole/</loc>
<lastmod>2025-11-25T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-680-debating-patching-and-vulnerability-scoring/</loc>
<lastmod>2025-11-18T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/post-quantum-migration-struggles-ai-threats-and-modern-defenses-hd-moore-ramin-f/</loc>
<lastmod>2026-05-04T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/rethinking-security-from-the-os-up-in-the-age-of-ai-and-more-rsac-2026-interview/</loc>
<lastmod>2026-04-27T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/making-ai-actually-work-in-the-enterprise-and-more-rsac-conference-2026-intervie/</loc>
<lastmod>2026-04-20T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/we-catch-up-on-the-news-including-ai-vuln-hunting-also-more-rsac-interviews-john/</loc>
<lastmod>2026-04-13T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/battling-payment-fraud-with-tokenization-and-executive-interviews-from-rsac-2026/</loc>
<lastmod>2026-04-06T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/oops-all-interviews-switching-to-cyber-ciso-reflections-and-the-state-of-tpcrm-a/</loc>
<lastmod>2026-03-30T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/can-ai-help-critical-infrastructure-the-state-of-the-cyber-market-and-weekly-new/</loc>
<lastmod>2026-03-23T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/ai-governance-new-book-code-war-from-allie-mellen-and-the-weekly-news-jeremy-sny/</loc>
<lastmod>2026-03-16T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/breaking-in-with-crashfix-supply-chain-security-and-cmmc-phase-1-david-zendzian-/</loc>
<lastmod>2026-03-09T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/ot-securitybusiness-resilience-lack-of-incentives-for-securing-software-and-the-/</loc>
<lastmod>2026-03-02T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/bringing-intelligence-to-assets-new-white-house-cybersecurity-strategy-and-the-n/</loc>
<lastmod>2026-02-23T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/hardware-level-zero-trust-dont-trust-ai-with-your-employees-and-the-news-j-wolfg/</loc>
<lastmod>2026-02-16T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/clickfixed-zero-trust-world-and-openclaw-is-out-of-control-but-thats-the-point-r/</loc>
<lastmod>2026-02-09T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/initial-entry-to-resilience-understanding-modern-attack-flows-and-this-weeks-new/</loc>
<lastmod>2026-02-02T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/the-future-of-data-control-why-detection-fails-and-the-weekly-news-thyaga-vasude/</loc>
<lastmod>2026-01-26T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/making-vulnerability-management-and-incident-response-actually-work-also-the-new/</loc>
<lastmod>2026-01-19T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/the-state-of-cybersecurity-hiring-2026-content-plans-and-the-weekly-news-esw-441/</loc>
<lastmod>2026-01-12T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/why-are-cybersecurity-predictions-so-bad-esw-440/</loc>
<lastmod>2026-01-05T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/holiday-chat-local-ai-datacenter-activism-ai-cant-substitute-good-taste-and-more/</loc>
<lastmod>2025-12-29T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/internal-threats-are-the-hole-in-cybersecuritys-donut-frank-vukovits-esw-438/</loc>
<lastmod>2025-12-22T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/illuminating-data-blind-spots-topic-enterprise-news-tony-kelly-esw-437/</loc>
<lastmod>2025-12-15T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/fix-your-dumb-misconfigurations-ai-isnt-people-and-the-weekly-news-wendy-nather-/</loc>
<lastmod>2025-12-08T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/from-misconfigurations-to-mission-control-lessons-from-infosec-world-2025-marene/</loc>
<lastmod>2025-12-01T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/aligning-teams-for-effective-remediation-anthropics-latest-report-and-the-news-r/</loc>
<lastmod>2025-11-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/enterprise-security-weekly/year-of-the-clandestine-linux-desktop-topic-and-the-news-rob-allen-esw-433/</loc>
<lastmod>2025-11-17T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/how-to-secure-copilot-agents-azure-devops-and-defender-more-with-maester-21-full/</loc>
<lastmod>2026-05-02T15:58:15.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/what-an-id-governance-consultant-wishes-you-knew-about-entra/</loc>
<lastmod>2026-04-25T12:29:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/stop-leaving-the-door-open-the-entra-id-hardening-checklist-security-experts-act/</loc>
<lastmod>2026-04-18T13:11:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/how-to-design-bullet-proof-conditional-access-policies-in-microsoft-entra-id/</loc>
<lastmod>2026-04-11T14:36:17.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/5-entra-id-updates-you-cant-afford-to-ignore-in-2026-backup-governance-ca-agent-/</loc>
<lastmod>2026-04-04T11:57:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/finding-every-mfa-gap-testing-250-million-conditional-access-combinations-in-und/</loc>
<lastmod>2026-03-28T10:45:12.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/from-fimmim-to-cloud-sync-complete-identity-journey-with-australias-top-identity/</loc>
<lastmod>2026-03-21T11:14:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/how-to-migrate-from-legacy-vpns-to-entra-private-access-real-strategies-from-a-v/</loc>
<lastmod>2026-03-14T07:45:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/passkeys-conditional-access-hard-match-updates-gsa-byod-what-entra-admins-need-t/</loc>
<lastmod>2026-03-07T13:38:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/we-gave-away-our-microsoft-entra-masterclass-labs-full-governance-privileged-acc/</loc>
<lastmod>2026-02-28T12:41:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/they-migrated-40000-devices-to-entra-join-in-9-months/</loc>
<lastmod>2026-02-21T09:47:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/microsoft-is-auto-enabling-passkeys-in-march-2026/</loc>
<lastmod>2026-02-14T09:00:12.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/automating-governance-the-new-standard-for-microsoft-365-tenant-snapshots-and-re/</loc>
<lastmod>2026-02-07T04:49:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/mastering-microsoft-entra-id-real-world-passkey-deployment-tips/</loc>
<lastmod>2026-01-31T12:18:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/entra-agent-registry-the-corporate-yellow-pages-for-ai-agents/</loc>
<lastmod>2026-01-16T16:25:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/global-secure-access-explained-real-world-rollouts-mistakes-and-best-practices/</loc>
<lastmod>2026-01-10T17:33:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/cybersecurity-first-principles-lessons-from-a-20-year-microsoft-mvp/</loc>
<lastmod>2026-01-04T05:04:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/identity-centric-network-security-entra-global-secure-access-architecture-and-be/</loc>
<lastmod>2025-12-28T05:15:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/how-to-kill-sms-mfa-in-entra-id-without-a-single-script/</loc>
<lastmod>2025-12-20T08:16:56.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/extending-microsoft-entra-logic-apps-power-apps-and-the-art-of-tinkering-with-en/</loc>
<lastmod>2025-12-13T20:14:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/inside-microsofts-entra-tenant-the-internal-app-governance-playbook/</loc>
<lastmod>2025-12-06T11:50:48.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/the-secret-sauce-behind-microsofts-new-mcp-server/</loc>
<lastmod>2025-11-29T03:19:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/entra-ignite-recap-synced-passkeys-agent-id-and-the-future-of-identity/</loc>
<lastmod>2025-11-23T02:17:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/zero-trust-assessment-secure-your-tenant/</loc>
<lastmod>2025-11-15T13:50:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/entra-chat/hacking-entra-id-bypassing-applocks-and-creating-immortal-users/</loc>
<lastmod>2025-11-08T13:56:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/wizard-spider/</loc>
<lastmod>2026-05-02T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/revil-redux/</loc>
<lastmod>2026-04-16T03:58:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/birds-of-a-feather-panopticon-together/</loc>
<lastmod>2026-04-02T03:16:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/breaking-the-chain-of-custody/</loc>
<lastmod>2026-03-16T03:19:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-dollar5-wrench-attack/</loc>
<lastmod>2026-03-02T17:16:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/coffee/</loc>
<lastmod>2026-02-16T04:56:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-protege-possibly-the-worst-intelligence-disaster-in-us-history/</loc>
<lastmod>2026-02-02T04:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-charizard-charade/</loc>
<lastmod>2026-01-16T04:56:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/2025-chatty-chat-year-in-review/</loc>
<lastmod>2025-12-31T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/inside-the-smishing-triad/</loc>
<lastmod>2025-12-15T22:48:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-gayborhood/</loc>
<lastmod>2025-12-01T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/how-much-of-facebooks-revenue-is-scam-adsand-other-chat-worthy-questions/</loc>
<lastmod>2025-11-16T17:25:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/badbox-20/</loc>
<lastmod>2025-11-02T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-sim-farm/</loc>
<lastmod>2025-10-16T04:46:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-banxico-heist-and-a-high-wire-act-of-solo-podcasting/</loc>
<lastmod>2025-10-02T02:25:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/will-the-real-velvet-sundown-please-stand-up/</loc>
<lastmod>2025-09-16T06:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/gamescom-2025/</loc>
<lastmod>2025-09-01T16:54:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/from-street-to-state/</loc>
<lastmod>2025-08-16T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-escobar-phone-and-imaginary-flamethrowers/</loc>
<lastmod>2025-08-02T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-mcdonalds-hiring-robot-hack/</loc>
<lastmod>2025-07-16T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/bonus-july-chatty-chat/</loc>
<lastmod>2025-07-04T21:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/the-texas-lottery-courier-app-scandal/</loc>
<lastmod>2025-06-29T06:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/danabot-the-malware-operation-that-infected-itself/</loc>
<lastmod>2025-06-16T03:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/throwback-the-malware-historian/</loc>
<lastmod>2025-06-02T06:59:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacked/hotline-hacked-vol-13/</loc>
<lastmod>2025-05-29T19:32:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/turning-30000-findings-into-50-that-matter-with-dan-pagel-and-brad-hibbert/</loc>
<lastmod>2026-05-01T19:32:40.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/killing-the-playbook-with-agentic-ai-with-allan-alford-and-tom-findling/</loc>
<lastmod>2026-04-24T19:52:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/the-epidemic-of-sameness-is-killing-your-brand-with-don-jeter/</loc>
<lastmod>2026-04-17T19:11:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/minutes-to-meltdown-cyber-recovery-when-it-counts-with-chris-bevil/</loc>
<lastmod>2026-04-07T20:42:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/building-ai-governance-before-the-incidents-hit-with-guru-sethupathy/</loc>
<lastmod>2026-04-01T19:28:50.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/what-happens-when-attackers-collaborate-more-than-defenders-ron-eddings-reportin/</loc>
<lastmod>2026-03-31T16:31:10.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/rsac-2026-show-up-or-fall-behind/</loc>
<lastmod>2026-03-20T23:09:18.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/whats-next-after-building-a-dollar25b-cybersecurity-company-with-dean-sysman/</loc>
<lastmod>2026-03-16T16:05:28.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/can-ai-do-your-cyber-job-post-your-job-req-and-find-out-with-marcus-j-carey/</loc>
<lastmod>2026-03-06T22:20:24.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/why-69percent-of-cisos-are-ready-to-walk-away-with-anthony-johnson/</loc>
<lastmod>2026-03-06T22:19:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/securing-the-workspace-attackers-already-live-in-with-rajan-kapoor/</loc>
<lastmod>2026-02-19T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/beating-checkbox-security-with-continuous-offense-with-sonali-shah/</loc>
<lastmod>2026-02-12T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/turning-agent-chaos-into-a-command-center-with-pedram-amini/</loc>
<lastmod>2026-02-10T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/why-mfa-isnt-the-safety-net-you-think-it-is-with-yaamini-barathi-mohan/</loc>
<lastmod>2026-01-29T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/when-cybercrime-learned-how-to-make-money-and-never-looked-back-with-graham-clul/</loc>
<lastmod>2026-01-25T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/when-automation-outruns-control-with-joshua-bregler/</loc>
<lastmod>2026-01-18T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/the-day-ai-stopped-asking-for-permission-with-marcus-j-carey/</loc>
<lastmod>2026-01-15T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/when-ai-ships-the-code-who-owns-the-risk-with-varun-badhwar-and-henrik-plate/</loc>
<lastmod>2026-01-08T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/think-like-a-hacker-before-the-hack-happens-with-john-hammond/</loc>
<lastmod>2026-01-01T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/breaking-into-banks-and-bypassing-modern-security-with-greg-hatcher-and-john-sti/</loc>
<lastmod>2025-12-18T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/defending-your-cyber-systems-and-your-mental-attack-surface-with-chris-hughes/</loc>
<lastmod>2025-12-11T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/thriving-beyond-human-labor-with-context-powered-ai-with-daniel-miessler/</loc>
<lastmod>2025-12-04T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/building-edr-for-ai-controlling-autonomous-agents-before-they-go-rogue-with-ron-/</loc>
<lastmod>2025-12-02T17:31:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/can-ai-run-your-soc-better-than-you-with-ahmed-achchak/</loc>
<lastmod>2025-11-13T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacker-valley-studio/making-cybersecurity-marketing-creative-and-a-little-sexy-with-maria-velasquez/</loc>
<lastmod>2025-11-06T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/mythbehavior-under-investigation-omitb/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/cirt-noun-word-notes/</loc>
<lastmod>2026-05-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/a-game-of-loans/</loc>
<lastmod>2026-04-30T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/pup-noun-word-notes/</loc>
<lastmod>2026-04-28T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/slam-scam-thank-you-maam/</loc>
<lastmod>2026-04-23T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/ransomware-noun-word-notes/</loc>
<lastmod>2026-04-21T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/who-is-winning-the-scam-game/</loc>
<lastmod>2026-04-16T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/service-set-identifier-ssid-noun-word-notes/</loc>
<lastmod>2026-04-14T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/when-opportunity-knocks-dont-answer/</loc>
<lastmod>2026-04-09T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/advanced-encryption-standard-aes-noun-word-notes/</loc>
<lastmod>2026-04-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/whos-logging-in-omitb/</loc>
<lastmod>2026-04-07T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/the-fine-print-of-fraud/</loc>
<lastmod>2026-04-02T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/the-evolving-face-of-ai-deepfakes/</loc>
<lastmod>2026-03-26T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/when-ai-wears-a-suit-and-tie/</loc>
<lastmod>2026-03-19T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/domain-naming-system-dns-noun-word-notes/</loc>
<lastmod>2026-03-17T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/defending-against-unlimited-penalty-shots-hacking-humans-live/</loc>
<lastmod>2026-03-12T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/pretexting-noun-word-notes/</loc>
<lastmod>2026-03-10T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/identity-theft-gets-a-raise/</loc>
<lastmod>2026-03-05T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/web-application-firewall-noun-word-notes/</loc>
<lastmod>2026-03-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/ai-ate-my-homework/</loc>
<lastmod>2026-02-26T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/cobit-noun-word-notes/</loc>
<lastmod>2026-02-24T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/the-voice-on-the-other-end/</loc>
<lastmod>2026-02-19T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/security-service-edge-sse-noun-word-notes/</loc>
<lastmod>2026-02-17T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/love-was-the-hook/</loc>
<lastmod>2026-02-12T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/hacking-humans/domain-spoofing-noun-word-notes/</loc>
<lastmod>2026-02-10T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/419-identity-management-day-2026-idac-live/</loc>
<lastmod>2026-05-04T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/418-ethical-iam-with-elizabeth-garber/</loc>
<lastmod>2026-04-27T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/417-sponsor-spotlight-elimity/</loc>
<lastmod>2026-04-22T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/416-european-identity-and-cloud-conference-2026-preview-with-warwick-ashford/</loc>
<lastmod>2026-04-20T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/415-identity-management-day-2026-with-jeff-reich/</loc>
<lastmod>2026-04-13T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/414-sponsor-spotlight-evolveum/</loc>
<lastmod>2026-04-08T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/413-standards-ai-agents-and-the-digital-estate-with-heather-flanagan/</loc>
<lastmod>2026-04-06T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/412-idac-failsafe-triggered/</loc>
<lastmod>2026-04-01T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/411-making-iam-a-best-buy-with-greg-handrick/</loc>
<lastmod>2026-03-30T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/410-sponsor-spotlight-strivacity/</loc>
<lastmod>2026-03-25T09:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/409-q1-2026-identity-threat-report-roundup/</loc>
<lastmod>2026-03-23T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/408-ai-vs-ai-with-joseph-carson/</loc>
<lastmod>2026-03-16T09:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/407-sponsor-spotlight-rubrik/</loc>
<lastmod>2026-03-11T09:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/406-idac-mailbag-for-february-2026/</loc>
<lastmod>2026-03-09T09:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/405-rsm-2026-attack-vectors-report/</loc>
<lastmod>2026-03-02T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/404-sponsor-spotlight-bravura-security/</loc>
<lastmod>2026-02-25T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/403-strategic-identity-security-with-simon-moffatt/</loc>
<lastmod>2026-02-23T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/402-an-update-on-ssf-and-caep-with-atul-tulshibagwale/</loc>
<lastmod>2026-02-16T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/401-sponsor-spotlight-plainid/</loc>
<lastmod>2026-02-11T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/400-celebrating-400-episodes-of-idac/</loc>
<lastmod>2026-02-09T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/399-navigating-identity-security-in-the-age-of-ai-with-jeff-margolies/</loc>
<lastmod>2026-02-05T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/398-solving-the-ai-identity-challenge-with-martin-kuppinger/</loc>
<lastmod>2026-02-02T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/397-rsm-and-idac-present-the-intersection-of-resiliency-recovery-and-iam/</loc>
<lastmod>2026-01-26T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/396-gartner-iam-summit-majority-rules/</loc>
<lastmod>2026-01-19T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/identity-at-the-center/395-sponsor-spotlight-redblock/</loc>
<lastmod>2026-01-14T10:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/cyberattacks-are-raising-your-prices-feat-eva-velasquez/</loc>
<lastmod>2026-05-03T15:45:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/big-tech-can-stop-scams-they-just-dont-feat-marti-deliema/</loc>
<lastmod>2026-04-19T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/killer-robots-are-here-now-what-feat-peter-asaro/</loc>
<lastmod>2026-04-05T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/this-is-all-it-takes-to-stop-a-train-feat-rachel-swan/</loc>
<lastmod>2026-03-22T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/wont-you-see-my-neighbor-feat-matt-guariglia/</loc>
<lastmod>2026-03-08T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/what-cant-you-say-on-tiktok/</loc>
<lastmod>2026-02-22T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/is-your-phone-listening-to-you-feat-lena-cohen-re-air/</loc>
<lastmod>2026-02-08T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/one-privacy-change-for-2026/</loc>
<lastmod>2026-01-25T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/enshittification-is-ruining-everything-online-feat-cory-doctorow/</loc>
<lastmod>2026-01-11T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/alprs-are-recording-your-daily-drive-feat-will-freeman/</loc>
<lastmod>2025-12-28T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/pig-butchering-is-the-next-humanitarian-global-crisis-feat-erin-west/</loc>
<lastmod>2025-12-14T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/air-fryer-app-caught-asking-for-voice-data-re-air/</loc>
<lastmod>2025-11-30T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/your-coworker-is-tired-of-ai-workslop-feat-dr-kristina-rapuano/</loc>
<lastmod>2025-11-16T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/would-you-sext-chatgpt-feat-deb-donig/</loc>
<lastmod>2025-11-02T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/what-does-google-know-about-me/</loc>
<lastmod>2025-10-19T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/whats-there-to-save-about-social-media-feat-rabble/</loc>
<lastmod>2025-10-05T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/can-you-disappear-online-feat-peter-dolanjski/</loc>
<lastmod>2025-09-21T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/this-insidious-police-tech-claims-to-predict-crime-feat-emily-galvin-almanza/</loc>
<lastmod>2025-09-07T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/how-a-scam-hunter-got-scammed-feat-julie-anne-kearns/</loc>
<lastmod>2025-08-24T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/the-worst-thing-for-online-rights-an-age-restricted-grey-web-feat-jason-kelley/</loc>
<lastmod>2025-08-10T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/how-the-fbi-got-everything-it-wanted-re-air-feat-joseph-cox/</loc>
<lastmod>2025-07-27T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/is-ai-healthy-to-use/</loc>
<lastmod>2025-07-13T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/corpse-eating-selfies-and-other-ways-to-trick-scammers-feat-becky-holmes/</loc>
<lastmod>2025-06-29T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/the-data-on-denying-social-media-for-kids-feat-dr-jean-twenge-re-air/</loc>
<lastmod>2025-06-15T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/lock-and-code/what-does-facebook-know-about-me/</loc>
<lastmod>2025-06-01T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/weev-part-2/</loc>
<lastmod>2024-12-10T11:03:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/weev-part-1/</loc>
<lastmod>2024-11-27T11:40:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/cuckoo-spear-b-side/</loc>
<lastmod>2024-11-20T06:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-man-who-went-to-war-with-anonymous-and-lost/</loc>
<lastmod>2024-11-13T10:31:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/what-can-organizations-learn-from-grim-beeper-b-side/</loc>
<lastmod>2024-11-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-fappeningcelebgate/</loc>
<lastmod>2024-10-29T15:20:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/operation-snow-white-part-2/</loc>
<lastmod>2024-10-15T14:36:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/operation-snow-white-part-1/</loc>
<lastmod>2024-10-01T14:46:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/caught-in-the-crossfire-infighting-and-treason-in-russias-cyber-world/</loc>
<lastmod>2024-09-17T12:35:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/snap-fraud-getting-rich-by-stealing-from-the-poor/</loc>
<lastmod>2024-09-03T13:50:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-hollywood-con-queen-part-2/</loc>
<lastmod>2024-08-20T14:45:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-hollywood-con-queen-part-1/</loc>
<lastmod>2024-08-07T07:26:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-doomed-queens-secret-ciphers/</loc>
<lastmod>2024-07-23T19:07:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/why-did-people-write-viruses-in-the-80s-and-90s/</loc>
<lastmod>2024-07-09T13:49:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/section-230-the-law-that-makes-social-media-great-and-terrible/</loc>
<lastmod>2024-06-25T10:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/what-happened-at-uber/</loc>
<lastmod>2024-06-11T09:34:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-nigerian-prince/</loc>
<lastmod>2024-05-28T07:14:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/unmasking-secrets-the-rise-of-open-source-intelligence/</loc>
<lastmod>2024-05-14T08:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-source-code-of-malicious-life/</loc>
<lastmod>2024-04-30T07:37:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-y2k-bug-part-2/</loc>
<lastmod>2024-04-16T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/the-y2k-bug-part-1/</loc>
<lastmod>2024-03-31T09:31:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/can-you-bomb-a-hacker/</loc>
<lastmod>2024-03-19T14:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/kevin-mitnick-part-2/</loc>
<lastmod>2024-03-04T13:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/kevin-mitnick-part-1/</loc>
<lastmod>2024-02-19T10:03:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/malicious-life/sim-registration-security-or-surveillance/</loc>
<lastmod>2024-02-05T10:40:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-healthcare-security-brief/ey/</loc>
<lastmod>2026-04-14T21:06:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-healthcare-security-brief/series-introduction/</loc>
<lastmod>2026-04-14T20:38:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/the-cybercrime-shift-from-opportunistic-attacks-to-marketplace-driven-ecosystem/</loc>
<lastmod>2026-04-22T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/ransomware-from-isolated-attacks-to-global-criminal-ecosystem/</loc>
<lastmod>2026-04-08T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/winter-shield-closing-the-security-control-gap/</loc>
<lastmod>2026-03-25T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/ai-as-tradecraft-how-threat-actors-are-operationalizing-ai/</loc>
<lastmod>2026-03-11T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/ai-recommendation-poisoning-when-optimization-becomes-manipulation/</loc>
<lastmod>2026-02-26T15:11:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/unpacking-the-latest-threats-targeting-the-financial-services-industry/</loc>
<lastmod>2026-02-11T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/fact-vs-hype-how-threat-actors-are-really-using-ai-right-now/</loc>
<lastmod>2026-01-28T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/open-sesameop-abusing-trusted-ai-platforms-to-host-a-c2-server/</loc>
<lastmod>2026-01-14T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/whisper-leak-how-threat-actors-can-see-what-you-talk-to-ai-about/</loc>
<lastmod>2025-12-17T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/the-grid-a-digital-frontier-e-isac-on-securing-the-power-grid/</loc>
<lastmod>2025-12-03T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/ahoy-a-tale-of-payroll-pirates-who-target-universities/</loc>
<lastmod>2025-11-19T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/beyond-ai-for-security-hype-what-really-matters-in-cyber-defense/</loc>
<lastmod>2025-11-05T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/the-new-frontlines-of-cybersecurity-lessons-from-the-2025-digital-defense-report/</loc>
<lastmod>2025-10-22T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/threat-landscape-update-ransomware-as-a-service-and-advanced-modular-malware/</loc>
<lastmod>2025-10-08T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/stopping-domain-impersonation-with-ai/</loc>
<lastmod>2025-09-24T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/click-call-compromise-inside-the-latest-loader-campaigns/</loc>
<lastmod>2025-09-10T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/live-from-black-hat-ransomware-responsible-disclosure-and-the-rise-of-ai/</loc>
<lastmod>2025-08-27T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/how-microsoft-stays-ahead-of-the-worlds-most-dangerous-hackers/</loc>
<lastmod>2025-08-07T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/inside-microsofts-global-operation-to-disrupt-lumma-stealers-2300-domain-malware/</loc>
<lastmod>2025-07-23T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/tips-from-grifter-and-lintile-for-attending-hacker-summer-camp/</loc>
<lastmod>2025-07-09T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/the-art-and-science-of-microsofts-red-team/</loc>
<lastmod>2025-06-25T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/a-peek-inside-microsofts-global-fight-against-cyber-threats/</loc>
<lastmod>2025-06-11T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/call-of-the-cyber-duty-a-global-cyber-challenge/</loc>
<lastmod>2025-05-28T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/badpilot-inside-seashell-blizzards-aka-sandworm-global-cyber-espionage-campaign/</loc>
<lastmod>2025-05-14T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/microsoft-threat-intelligence/inside-thor-collective-a-dispersed-team-delivering-open-source-research/</loc>
<lastmod>2025-04-30T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep149-how-many-cryptographers-does-it-take-to-change-a-light-bulb/</loc>
<lastmod>2023-08-24T01:06:08.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep148-remembering-crypto-heroes/</loc>
<lastmod>2023-08-17T12:20:22.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep147-what-if-you-type-in-your-password-during-a-meeting/</loc>
<lastmod>2023-08-09T23:43:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep146-tell-us-about-that-breach-if-you-want-to/</loc>
<lastmod>2023-08-03T16:32:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep145-bugs-with-impressive-names/</loc>
<lastmod>2023-07-27T14:38:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep144-when-threat-hunting-goes-down-a-rabbit-hole/</loc>
<lastmod>2023-07-20T13:05:24.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep143-supercookie-surveillance-shenanigans/</loc>
<lastmod>2023-07-13T14:16:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep142-putting-the-x-in-x-ops/</loc>
<lastmod>2023-07-06T15:28:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep141-what-was-steve-jobss-first-job/</loc>
<lastmod>2023-06-29T14:29:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep140-so-you-think-you-know-ransomware/</loc>
<lastmod>2023-06-22T13:56:38.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep139-are-password-rules-like-running-through-rain/</loc>
<lastmod>2023-06-15T13:41:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep138-i-like-to-moveit-moveit/</loc>
<lastmod>2023-06-08T12:58:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep137-16th-century-crypto-skullduggery/</loc>
<lastmod>2023-06-01T11:39:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep136-navigating-a-manic-malware-maelstrom/</loc>
<lastmod>2023-05-25T11:15:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep135-sysadmin-by-day-extortionist-by-night/</loc>
<lastmod>2023-05-18T12:51:12.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep134-its-a-private-key-the-hint-is-in-the-name/</loc>
<lastmod>2023-05-11T12:21:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep133-apple-takes-tight-lipped-to-a-whole-new-level/</loc>
<lastmod>2023-05-04T13:59:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep132-proof-of-concept-lets-anyone-hack-at-will/</loc>
<lastmod>2023-04-27T14:27:39.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep131-can-you-really-have-fun-with-fortran/</loc>
<lastmod>2023-04-20T14:35:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep130-open-the-garage-bay-doors-hal/</loc>
<lastmod>2023-04-13T14:15:15.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep129-when-spyware-arrives-from-someone-you-trust/</loc>
<lastmod>2023-04-06T12:53:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep128-so-you-want-to-be-a-cybercriminal/</loc>
<lastmod>2023-03-30T13:45:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep127-when-you-chop-someone-out-of-a-photo-but-there-they-are-anyway/</loc>
<lastmod>2023-03-23T16:05:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep126-the-price-of-fast-fashion-and-feature-creep/</loc>
<lastmod>2023-03-16T17:36:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/naked-security/s3-ep125-when-security-hardware-has-security-holes/</loc>
<lastmod>2023-03-09T17:25:17.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/rob-king-on-ot-asset-exposures-mitigations/</loc>
<lastmod>2026-05-03T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/samir-boussarhane-on-new-mitre-caldera-for-ot-attack-simulators/</loc>
<lastmod>2026-04-26T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/jim-labonty-on-data-center-manufacturing-cybersecurity/</loc>
<lastmod>2026-04-23T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/tiffany-wilson-on-the-security-crisis-of-consumer-tech-in-healthcare/</loc>
<lastmod>2026-04-19T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/joe-slowik-on-exposed-internet-facing-ot/</loc>
<lastmod>2026-04-12T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/phil-englert-on-medical-device-cybersecurity/</loc>
<lastmod>2026-04-05T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/raphael-arakelian-on-operation-grim-beeper/</loc>
<lastmod>2026-03-29T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/adm-michael-rogers-on-his-time-as-nsa-director/</loc>
<lastmod>2026-03-24T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/michael-pyle-on-securing-internet-facing-ot-and-ics-assets/</loc>
<lastmod>2026-03-22T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/gus-serino-on-a-massachusetts-water-cybersecurity-collaborative/</loc>
<lastmod>2026-03-15T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/dan-ricci-on-four-years-of-the-ics-advisory-project/</loc>
<lastmod>2026-03-08T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/dan-gunter-on-creating-malicious-ot-test-data-to-train-security-tools/</loc>
<lastmod>2026-03-01T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/mike-holcomb-on-the-intersection-of-hacktivists-state-actors/</loc>
<lastmod>2026-02-25T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/cisas-matthew-rogers-on-secure-ot-protocol-communication/</loc>
<lastmod>2026-02-15T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/jay-catherine-on-securing-logistics-ot-in-retail/</loc>
<lastmod>2025-12-18T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/greg-garcia-on-the-sector-mapping-and-risk-toolkit-for-healthcare/</loc>
<lastmod>2025-11-23T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/christopher-frenz-on-evidence-based-security/</loc>
<lastmod>2025-11-16T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/adm-michael-rogers-on-deterrence-in-cyberspace/</loc>
<lastmod>2025-10-01T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/bob-maley-on-resource-challenges-in-cybersecurity/</loc>
<lastmod>2025-09-14T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/pankaj-goyal-on-cyber-insurance-coverage-for-ot-environments/</loc>
<lastmod>2025-09-01T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/rui-ataide-on-navigating-ransomware-negotiations/</loc>
<lastmod>2025-08-25T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/salvatore-gariuolo-on-safe-ev-charging/</loc>
<lastmod>2025-08-17T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/noam-moshe-on-hacking-video-surveillance/</loc>
<lastmod>2025-08-07T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/dan-berte-on-solar-grid-and-iot-vulnerabilities/</loc>
<lastmod>2025-07-28T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/nexus-claroty/vivek-ponnada-on-the-ongoing-maturity-of-ot-security/</loc>
<lastmod>2025-07-21T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/how-to-actually-test-a-disaster-plan-with-david-bernstein/</loc>
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/open-source-pledge-with-vlad-stefan-harbuz/</loc>
<lastmod>2026-04-27T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/building-a-plan-for-disaster-with-david-bernstein/</loc>
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/open-source-malware-with-paul-mccarty/</loc>
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/package-management-challenges-with-andrew-nesbitt/</loc>
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/open-source-security-at-scale-with-michael-winser/</loc>
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/2026-state-of-the-software-supply-chain-with-brian-fox/</loc>
<lastmod>2026-03-23T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/mcp-and-agent-security-with-luke-hinds/</loc>
<lastmod>2026-03-16T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/the-state-of-openssl-for-pycacryptography-with-alex-gaynor-and-paul-kehrer/</loc>
<lastmod>2026-03-09T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/rust-coreutils-with-sylvestre-ledru/</loc>
<lastmod>2026-03-02T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/goose-and-the-agentic-ai-foundation-with-brad-axen/</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/the-global-vulnerability-intelligence-platform-with-olle-e-johansson/</loc>
<lastmod>2026-02-16T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/digital-sovereignty-and-nextcloud-with-frank-karlitschek/</loc>
<lastmod>2026-02-09T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/the-art-of-crisis-management-with-david-bernstein/</loc>
<lastmod>2026-02-02T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/wtf-is-a-passkey-with-william-brown/</loc>
<lastmod>2026-01-26T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/all-about-suricata-with-victor-julien/</loc>
<lastmod>2026-01-19T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/iocaine-poisons-bots-with-gergely-nagy/</loc>
<lastmod>2026-01-12T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/anubis-with-xe-iaso/</loc>
<lastmod>2026-01-05T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/rustls-with-dirkjan-and-joe/</loc>
<lastmod>2025-12-29T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/daniel-thompson-answers-does-the-cra-apply-to-santa/</loc>
<lastmod>2025-12-22T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/linux-foundation-europe-with-gabriele-columbro/</loc>
<lastmod>2025-12-15T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/updating-open-source-dependencies-with-jamie-tanna/</loc>
<lastmod>2025-12-08T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/tarmageddon-with-alex-zenla/</loc>
<lastmod>2025-12-01T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/python-security-with-seth-larson/</loc>
<lastmod>2025-11-24T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/open-source-security/linux-vendor-firmware-service-with-richard-hughes/</loc>
<lastmod>2025-11-17T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/firestarter-psw-924/</loc>
<lastmod>2026-04-30T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/back-to-or-start-fundamentals-rajesh-khazanchi-psw-923/</loc>
<lastmod>2026-04-23T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/the-ai-vulnpocolypse-is-real-psw-922/</loc>
<lastmod>2026-04-16T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/ai-makes-all-bug-shallow-psw-921/</loc>
<lastmod>2026-04-09T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/what-is-a-router-and-all-things-ai-psw-920/</loc>
<lastmod>2026-04-02T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/scanning-the-internet-with-linux-tools-psw-919/</loc>
<lastmod>2026-03-26T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/hacking-ip-kvms-and-reversing-with-radare2-sergi-alvarez-psw-918/</loc>
<lastmod>2026-03-19T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/vulnerability-mis-management-psw-917/</loc>
<lastmod>2026-03-12T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/airsnitch-claude-hacking-firewalls-psw-916/</loc>
<lastmod>2026-03-05T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/ai-is-taking-over-cybersecurity-psw-915/</loc>
<lastmod>2026-02-26T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/firmware-backdoors-be-spying-on-you-psw-914/</loc>
<lastmod>2026-02-19T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/ai-vulnerability-hunting-psw-913/</loc>
<lastmod>2026-02-12T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/ai-no-one-is-safe-psw-912/</loc>
<lastmod>2026-02-05T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/to-curmudgeon-or-not-to-curmudgeon-that-is-the-question-psw-911/</loc>
<lastmod>2026-01-29T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/we-left-it-vulnerable-on-purpose-rob-allen-psw-910/</loc>
<lastmod>2026-01-22T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/digging-for-vulnerability-gold-psw-909/</loc>
<lastmod>2026-01-15T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/no-flipperzeros-allowed-psw-908/</loc>
<lastmod>2026-01-08T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/breaking-into-cybersecurity-psw-907/</loc>
<lastmod>2026-01-01T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/building-a-hacking-lab-in-2025-psw-906/</loc>
<lastmod>2025-12-25T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/with-ai-nothing-is-safe-psw-905/</loc>
<lastmod>2025-12-18T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/tech-segment-mitm-automation-security-news-josh-bressers-psw-904/</loc>
<lastmod>2025-12-11T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/holiday-hack-challenge-ai-internet-of-trash-ed-skoudis-psw-903/</loc>
<lastmod>2025-12-04T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/vibe-coding-for-success-and-failure-psw-902/</loc>
<lastmod>2025-11-27T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/give-me-liberty-or-linux-badge-hacking-interview-bryce-owen-psw-901/</loc>
<lastmod>2025-11-20T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/paul-s-security-weekly/going-around-edr-psw-900/</loc>
<lastmod>2025-11-13T22:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/special-episode-elitecast-episode-1/</loc>
<lastmod>2021-01-05T08:35:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-71-a-casual-conversation-with-the-cyber-mentor/</loc>
<lastmod>2020-03-08T14:13:48.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-70-mul-tea-factor-with-kat-sweet/</loc>
<lastmod>2020-02-23T14:35:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-69-2020-show-update/</loc>
<lastmod>2020-02-09T15:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-68-all-about-the-diana-initiative-with-circuit-swan/</loc>
<lastmod>2020-01-20T02:34:27.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-67-a-casual-conversation-with-snow/</loc>
<lastmod>2019-12-15T15:31:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-66-fireside-chat-with-adrian-cheek/</loc>
<lastmod>2019-12-01T16:35:23.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-65-fireside-chat-with-the-gibson/</loc>
<lastmod>2019-11-17T15:21:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-64-fireside-chat-with-tanya-janca/</loc>
<lastmod>2019-11-03T15:16:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-63-backdoors-and-breaches-with-john-strand/</loc>
<lastmod>2019-10-20T14:08:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-62-ginfosec-with-infosecsherpa-empathy-as-a-service/</loc>
<lastmod>2019-10-06T14:52:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-61-anniversaries-and-updates/</loc>
<lastmod>2019-09-22T14:43:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-60-tabletop-dandd-with-ken-johnson-and-seth-law-from-absolute-appsec/</loc>
<lastmod>2019-09-01T13:35:46.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-58-malware-analysis-with-kyle-andrus/</loc>
<lastmod>2019-06-23T15:12:52.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-57-tinker-after-dark-tinker-tales-by-the-fire/</loc>
<lastmod>2019-06-09T14:45:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-56-john-reads-choose-your-own-red-team-adventure/</loc>
<lastmod>2019-05-26T14:10:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-55-talking-privacy-with-matt-beland/</loc>
<lastmod>2019-05-12T14:11:52.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-54-tribe-of-hackers-with-marcus-j-carey/</loc>
<lastmod>2019-04-28T13:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-53-ginfosec-with-infosecsherpa-all-about-cons/</loc>
<lastmod>2019-04-14T14:57:01.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-52-john-the-generalist/</loc>
<lastmod>2019-03-31T13:30:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-51-fireside-chat-with-chris-foulon/</loc>
<lastmod>2019-03-10T14:19:23.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-50-tabletop-dandd-with-tim-de-block-ed-rojas-daniel-ebbutt-and-kyle-andr/</loc>
<lastmod>2019-02-17T14:24:39.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-49-the-red-team-life-with-curtis-brazzell/</loc>
<lastmod>2019-02-03T14:29:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-48-all-about-magecart-with-yonathan-klijnsma/</loc>
<lastmod>2019-01-20T16:28:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/purple-squad-security/episode-47-happy-new-year-show-updates-and-other-news/</loc>
<lastmod>2019-01-06T14:08:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/containment-or-catastrophe-ep-199/</loc>
<lastmod>2026-04-29T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/2026-cyber-threat-report-msps-edition-198/</loc>
<lastmod>2026-04-22T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/nasa-and-cybersecurity-in-space-197/</loc>
<lastmod>2026-04-15T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/they-didnt-hack-you-they-logged-in-196/</loc>
<lastmod>2026-04-08T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/the-quiet-collapse-of-trust-in-identity-195/</loc>
<lastmod>2026-04-01T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/luck-is-not-a-strategy-194/</loc>
<lastmod>2026-03-25T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/fighting-the-water-hackers-193/</loc>
<lastmod>2026-03-18T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/ai-security-and-the-future-of-the-soc-192/</loc>
<lastmod>2026-03-11T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/inside-the-momentum-cyber-almanac-191/</loc>
<lastmod>2026-03-04T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/agentic-ai-from-chokepoint-to-crisis-190/</loc>
<lastmod>2026-02-25T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/doras-first-year-what-happened-189/</loc>
<lastmod>2026-02-18T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/agentic-ai-and-the-new-security-choke-point-188/</loc>
<lastmod>2026-02-11T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/ai-regulation-what-security-teams-need-to-know-187/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/when-good-enough-isnt-enough-186/</loc>
<lastmod>2026-01-28T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/cyber-resilience-in-2026-leadership-risk-and-reality-ep-185/</loc>
<lastmod>2026-01-21T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/new-attacks-show-hackers-are-taking-it-easy-ep-184/</loc>
<lastmod>2026-01-14T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/quantum-is-coming-are-you-ready-ep-183/</loc>
<lastmod>2026-01-07T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/the-human-side-of-cybersecurity-2025-in-review-ep-182/</loc>
<lastmod>2025-12-31T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/ai-deepfakes-and-legacy-systems-2025-in-review-ep-181/</loc>
<lastmod>2025-12-23T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/the-malware-behind-holiday-scams-ep-180/</loc>
<lastmod>2025-12-17T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/ai-compliance-new-rules-but-are-you-ready/</loc>
<lastmod>2025-12-10T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/cybercrime-reset-life-after-operation-endgame-ep-178/</loc>
<lastmod>2025-12-03T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/ai-in-ot-a-wake-up-call-ep-177/</loc>
<lastmod>2025-11-26T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/beware-the-christmas-shopping-cyber-scams-ep-176/</loc>
<lastmod>2025-11-18T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/reimagining-cyber/the-sensors-are-listening-ep-175/</loc>
<lastmod>2025-11-12T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-the-wild-wild-west/</loc>
<lastmod>2026-05-04T19:45:48.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-digicert-hacked-with-a-malicious-screensaver-file/</loc>
<lastmod>2026-05-04T05:10:33.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/sponsored-james-kettle-built-an-ai-hacker/</loc>
<lastmod>2026-05-03T21:16:46.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-cpanel-auth-bypass-exploited-in-wild/</loc>
<lastmod>2026-05-01T05:07:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/srsly-risky-biz-us-vows-to-fight-distillation-attacks/</loc>
<lastmod>2026-04-30T03:03:07.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-ukrainians-hacked-russian-satellite-comms-platform/</loc>
<lastmod>2026-04-29T02:04:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-hackers-from-the-future/</loc>
<lastmod>2026-04-27T20:49:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-new-fingerprinting-technique-can-track-tor-users/</loc>
<lastmod>2026-04-27T02:54:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/sponsored-runzero-accidentally-got-good-at-ot/</loc>
<lastmod>2026-04-26T22:30:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-sean-plankey-withdraws-cisa-nomination/</loc>
<lastmod>2026-04-24T04:53:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/srsly-risky-biz-musk-snubs-french-authorities/</loc>
<lastmod>2026-04-23T03:40:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-former-fbi-official-calls-for-terrorism-designations-for-ransomwa/</loc>
<lastmod>2026-04-22T06:00:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-ai-as-the-mythical-10x-hacker/</loc>
<lastmod>2026-04-20T20:34:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-shinyhunters-claim-credit-for-vercel-hack/</loc>
<lastmod>2026-04-20T04:54:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/sponsored-nebulock-on-hunting-shadow-ai/</loc>
<lastmod>2026-04-19T20:08:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-nist-gives-up-enriching-most-cves/</loc>
<lastmod>2026-04-17T04:04:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/srsly-risky-biz-time-to-ban-sale-of-precise-geolocation-data/</loc>
<lastmod>2026-04-16T04:18:11.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-malicious-llm-proxy-routers-found-in-the-wild/</loc>
<lastmod>2026-04-15T05:03:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-how-ai-will-upset-state-cyber-competition/</loc>
<lastmod>2026-04-13T20:29:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-france-takes-first-steps-to-ditch-windows-for-linux/</loc>
<lastmod>2026-04-13T03:51:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/sponsored-corelight-agentic-triage-helps-defenders-stay-ahead/</loc>
<lastmod>2026-04-12T19:44:35.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-fbi-extracted-signal-chats-from-iphone-notifications-logs/</loc>
<lastmod>2026-04-10T05:09:41.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/srsly-risky-biz-american-diplomats-to-fight-foreign-propaganda-on-x/</loc>
<lastmod>2026-04-09T01:34:40.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-cybercrime-losses-passed-dollar20-billion-last-year/</loc>
<lastmod>2026-04-08T05:19:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-make-cyber-not-war/</loc>
<lastmod>2026-04-06T20:10:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/snake-oilers-ent-ai-spacewalk-and-mondoo/</loc>
<lastmod>2026-05-01T00:58:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-835-why-the-fast16-malware-is-badass/</loc>
<lastmod>2026-04-29T04:43:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-834-vercel-gets-owned-mozilla-dumps-hundreds-of-mythos-bugs/</loc>
<lastmod>2026-04-22T09:11:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-833-the-great-mythos-freakout-of-2026/</loc>
<lastmod>2026-04-15T03:34:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/snake-oilers-burp-ai-sondera-and-truffle-security/</loc>
<lastmod>2026-04-09T21:33:35.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-832-anthropic-unveils-magical-0day-computer-god/</loc>
<lastmod>2026-04-08T04:59:38.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/how-the-world-got-owned-episode-2-the-1990s-part-one/</loc>
<lastmod>2026-04-03T00:35:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-831-the-ai-bugpocalypse-begins/</loc>
<lastmod>2026-04-01T03:50:51.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/soap-box-red-teaming-ai-systems-with-specterops/</loc>
<lastmod>2026-03-27T01:07:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-830-litellm-and-security-scanner-supply-chains-compromised/</loc>
<lastmod>2026-03-25T04:13:36.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-829-sneaky-lobsters-why-ai-is-the-new-insider-threat/</loc>
<lastmod>2026-03-18T03:39:30.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-biz-soap-box-it-took-a-decade-but-allowlisting-is-cool-again/</loc>
<lastmod>2026-03-12T23:12:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-828-the-coruna-exploits-are-truly-exquisite/</loc>
<lastmod>2026-03-11T04:31:39.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-827-iranian-cyber-threat-actors-are-down-but-not-out/</loc>
<lastmod>2026-03-04T04:29:15.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-826-a-week-of-ai-mishaps-and-skulduggery/</loc>
<lastmod>2026-02-25T03:49:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-biz-soap-box-the-lethal-trifecta-of-ai-risks/</loc>
<lastmod>2026-02-19T23:33:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-825-palo-alto-networks-blames-it-on-the-boogie/</loc>
<lastmod>2026-02-18T03:49:36.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-824-microsofts-secure-future-is-looking-a-bit-wobbly/</loc>
<lastmod>2026-02-11T03:50:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-823-humans-impersonate-clawdbots-impersonating-humans/</loc>
<lastmod>2026-02-04T03:13:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-822-france-will-ditch-american-tech-over-security-risks/</loc>
<lastmod>2026-01-28T03:35:47.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-821-wiz-researchers-could-have-owned-every-aws-customer/</loc>
<lastmod>2026-01-21T04:28:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-820-asian-fraud-kingpin-will-face-chinese-justice-pew-pew/</loc>
<lastmod>2026-01-14T01:42:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/how-the-world-got-owned-episode-1-the-1980s/</loc>
<lastmod>2026-01-06T20:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-business-819-venezuela-credibly-blames-usa-for-wiper-attack/</loc>
<lastmod>2025-12-17T02:13:10.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/risky-business/risky-biz-soap-box-graph-the-planet/</loc>
<lastmod>2025-12-11T19:26:18.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/building-a-more-diverse-workforce-with-naria-santa-lucia/</loc>
<lastmod>2023-04-26T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/the-world-of-threat-intelligence-with-emily-hacker/</loc>
<lastmod>2023-04-05T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/career-moves-with-cybersecurity-girl/</loc>
<lastmod>2023-03-29T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/creating-pathways-for-the-underrepresented-with-lauren-buitta/</loc>
<lastmod>2023-03-15T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/breaking-down-the-cybersecurity-industry-with-stephanie-ilana-and-evan/</loc>
<lastmod>2023-03-15T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/secure-the-job/trailer/</loc>
<lastmod>2023-03-08T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-insider-conversations/modern-threats-demand-modern-discipline/</loc>
<lastmod>2026-03-03T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-insider-conversations/operationalizing-security-lessons-from-the-secure-future-initiative/</loc>
<lastmod>2026-02-27T14:30:30.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-insider-conversations/secure-by-design-in-practice/</loc>
<lastmod>2026-01-30T16:02:33.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-insider-conversations/the-10-security-decisions-that-matter-most-in-2026/</loc>
<lastmod>2026-01-27T21:37:20.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-slimmere-security-met-microsoft-sentinel-se/</loc>
<lastmod>2026-04-15T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-s2-episode-5/</loc>
<lastmod>2026-03-12T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-s2-episode-4/</loc>
<lastmod>2026-02-06T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-presents-winter-special/</loc>
<lastmod>2025-12-22T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-de-ignite-security-updates/</loc>
<lastmod>2025-12-17T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-ediscovery-made-easy/</loc>
<lastmod>2025-12-16T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-november-2025-security-update/</loc>
<lastmod>2025-11-14T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-seizoen-4-starter-october-security-update/</loc>
<lastmod>2025-10-07T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-datalekken-seizoen-2-afleveri/</loc>
<lastmod>2025-09-29T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-presents-summer-special-1/</loc>
<lastmod>2025-08-28T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-de-podcast-serie-over-het-ont/</loc>
<lastmod>2025-07-16T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-maand-update-mei-en-juni-2025/</loc>
<lastmod>2025-06-10T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-de-podcast-serie-over-het-ont-2/</loc>
<lastmod>2025-06-01T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-aflevering-5-incident-response-de-ehbo-kit-/</loc>
<lastmod>2025-05-26T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-maand-update-april-2025/</loc>
<lastmod>2025-04-14T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-de-podcast-serie-over-het-ont-3/</loc>
<lastmod>2025-04-13T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-de-podcast-serie-over-het-ont-4/</loc>
<lastmod>2025-03-18T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-verhoog-je-digitale-weerbaarheid-met-een-se/</loc>
<lastmod>2025-03-13T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-maand-update-februari-2025/</loc>
<lastmod>2025-03-05T14:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-sentinel-data-inname-and-retentie-mogelijkh/</loc>
<lastmod>2025-03-03T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-episode-2/</loc>
<lastmod>2025-02-25T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hybride-siem-sub-optimaal-of-de-gulden-midd/</loc>
<lastmod>2025-02-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-siem-the-basics/</loc>
<lastmod>2025-02-17T08:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-hack-the-hoax-episode-1/</loc>
<lastmod>2025-02-03T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-life-hacks/microsoft-securitylifehacks-presents-the-2025-january-update/</loc>
<lastmod>2025-01-16T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1076-fast16sys-unmasking-the-nsas-most-diabolical-digital-sabotage/</loc>
<lastmod>2026-04-29T02:56:38.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1075-yes-exactly-the-zero-day-ticking-clock/</loc>
<lastmod>2026-04-22T02:25:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1074-what-mythos-means-marketing-or-mayhem/</loc>
<lastmod>2026-04-15T02:27:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1073-the-fcc-bans-new-consumer-routers-linkedins-javascript-bombshell/</loc>
<lastmod>2026-04-08T02:38:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1072-litellm-click-fix-attacks-surge/</loc>
<lastmod>2026-04-01T02:23:56.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1071-bucketsquatting-meta-and-tiktoks-tracking-pixels/</loc>
<lastmod>2026-03-25T00:59:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1070-cisas-free-internet-scanning-malware-disguised-as-a-vpn/</loc>
<lastmod>2026-03-18T02:22:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1069-you-cant-hide-from-llms-was-your-smart-tv-a-stealth-proxy/</loc>
<lastmod>2026-03-11T02:10:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1068-the-call-is-coming-from-inside-the-house-live-from-zero-trust-world-2026/</loc>
<lastmod>2026-03-05T18:25:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-now/sn-1067-kongtukes-crashfix-click-paste-pwned/</loc>
<lastmod>2026-03-03T23:28:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/hunting-variants-finding-the-bugs-behind-the-bug/</loc>
<lastmod>2025-07-09T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/securing-redirections-with-mike-macelletti/</loc>
<lastmod>2025-06-25T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/ignore-ram-shankar-siva-kumars-previous-directions/</loc>
<lastmod>2025-06-11T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/protecting-ai-at-the-edge-with-david-weston/</loc>
<lastmod>2025-05-28T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/hacking-at-the-weeds-with-felix-boulet/</loc>
<lastmod>2025-05-14T10:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/evolutions-in-hacking-with-marco-ivaldi/</loc>
<lastmod>2025-04-30T19:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/from-facebook-phished-to-mvr-top-5-with-dhiral-patel/</loc>
<lastmod>2025-04-16T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/ai-and-the-hunt-for-hidden-vulnerabilities-with-tobias-diehl/</loc>
<lastmod>2025-04-02T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/cryptojacking-and-farewell-for-now/</loc>
<lastmod>2022-02-16T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/a-look-at-cybercrime-in-2021/</loc>
<lastmod>2022-02-02T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/whats-a-biso/</loc>
<lastmod>2022-01-19T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/disinformation-in-the-enterprise/</loc>
<lastmod>2022-01-05T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/i-am-shroot-less/</loc>
<lastmod>2021-12-22T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/decoding-nobelium/</loc>
<lastmod>2021-12-08T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/trusting-your-hybrid-workforce/</loc>
<lastmod>2021-11-24T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/when-privacy-meets-security/</loc>
<lastmod>2021-11-10T08:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/securing-modern-software/</loc>
<lastmod>2021-10-27T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/the-2021-microsoft-digital-defense-report/</loc>
<lastmod>2021-10-20T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/mobile-4n6-101/</loc>
<lastmod>2021-10-13T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/untangling-botnets/</loc>
<lastmod>2021-10-06T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/what-the-fuzz/</loc>
<lastmod>2021-09-29T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/the-three-es-of-scam-disruption/</loc>
<lastmod>2021-09-22T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/entering-the-virtual-battlefield/</loc>
<lastmod>2021-09-15T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/battling-bazacall-buzzkill/</loc>
<lastmod>2021-09-01T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked/turning-to-the-purple-side/</loc>
<lastmod>2021-08-25T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/developing-influential-security-leaders-roland-cloutier-tiktok/</loc>
<lastmod>2021-07-30T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/building-a-stronger-security-team-geoff-belknap-linkedin/</loc>
<lastmod>2021-07-07T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/leading-an-inclusive-workforce-emma-smith-vodafone/</loc>
<lastmod>2021-06-23T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/the-human-side-of-hybrid-work-with-amy-coleman/</loc>
<lastmod>2021-06-09T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/securing-hybrid-work-venki-krishnababu-lululemon/</loc>
<lastmod>2021-05-26T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/security-unlocked-ciso-series/securing-the-cloud-with-mark-russinovich/</loc>
<lastmod>2021-05-12T07:05:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/what-happened-to-black-bastas-playbook-the-automated-teams-phishing-threat-hitti/</loc>
<lastmod>2026-04-29T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/did-shinyhunters-compromise-vercel-every-cisos-cloud-security-visibility-problem/</loc>
<lastmod>2026-04-22T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/what-claude-mythos-means-for-organizations/</loc>
<lastmod>2026-04-15T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/axios-and-trivy-supply-chain-gaps-organizations-must-fix/</loc>
<lastmod>2026-04-08T20:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/faster-smarter-and-already-escalated-what-it-takes-to-defend-against-the-modern-/</loc>
<lastmod>2026-04-01T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/the-invisible-attack-surface-iran-aligned-threat-actors-and-corporate-blind-spot/</loc>
<lastmod>2026-03-25T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/the-2026-annual-threat-report-breakdown-part-3-the-long-game-nation-state-threat/</loc>
<lastmod>2026-03-18T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/the-2026-annual-threat-report-breakdown-part-2-once-theyre-in-post-compromise-ta/</loc>
<lastmod>2026-03-11T20:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/the-2026-annual-threat-report-breakdown-part-1-how-ai-contributes-to-attacker-sp/</loc>
<lastmod>2026-03-04T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/malware-isnt-requiredhow-ransomware-groups-turn-legitimate-rmms-into-a-weapon/</loc>
<lastmod>2026-02-25T16:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/ransomware-vs-exfiltration-onlythe-extortion-model-showdown/</loc>
<lastmod>2026-02-18T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/patch-management-is-losingthe-case-for-predictive-vulnerability-defense/</loc>
<lastmod>2026-02-11T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/beyond-phishing-emailssocial-engineering-drives-initial-access/</loc>
<lastmod>2026-02-04T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/malicious-aithe-new-face-of-cyber-threats/</loc>
<lastmod>2026-01-28T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/maintainer-compromise-the-next-supply-chain-attack-vector-in-2026/</loc>
<lastmod>2026-01-21T18:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/kicking-off-2026-with-ransomware-insights-and-defense-strategies/</loc>
<lastmod>2026-01-14T23:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/react2shell-attacks-evolve-clickfix-attacks-and-holiday-season-threats/</loc>
<lastmod>2025-12-17T19:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/react2shell-exploits-cisas-brickstorm-warning-shadypandas-browser-weaponization/</loc>
<lastmod>2025-12-10T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/scattered-lapsusdollar-hunters-silverfoxs-valleyrat-campaign-and-more/</loc>
<lastmod>2025-12-03T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/are-cyber-predictions-worth-it-plus-chinese-ai-attacks-iot-takeovers/</loc>
<lastmod>2025-11-26T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/fortinet-flaw-exposed-and-exploited-plus-threat-hunter-hacks-seo-hits-hard/</loc>
<lastmod>2025-11-19T21:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/gootloaders-return-landfall-android-spyware-sector-by-sector-cyber-trends/</loc>
<lastmod>2025-11-12T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/why-cloud-threats-are-escalating-identity-risks-automation-flaws-and-legacy-vuln/</loc>
<lastmod>2025-11-05T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/why-cyber-threats-surge-20percent-during-manda-plus-the-latest-on-qilin-and-laza/</loc>
<lastmod>2025-10-29T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/shadowtalk/automate-to-defend-a-former-fbi-agents-ransomware-guide-for-cisos/</loc>
<lastmod>2025-10-22T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/this-developer-wanted-to-cheat-at-roblox-it-cost-millions/</loc>
<lastmod>2026-04-29T23:00:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/rockstar-got-hacked-the-data-was-junk-the-secrets-it-revealed-were-not/</loc>
<lastmod>2026-04-22T22:00:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/this-ai-company-leaked-its-own-code-its-also-built-something-terrifying/</loc>
<lastmod>2026-04-15T23:00:54.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/linkedin-is-spying-on-you-and-you-agreed-to-nothing/</loc>
<lastmod>2026-04-08T23:00:45.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/this-man-hid-dollar400-million-in-a-fishing-rod-then-it-vanished/</loc>
<lastmod>2026-04-01T23:00:13.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/never-knock-on-the-door-of-a-nuclear-submarine-base-and-ask-for-a-selfie/</loc>
<lastmod>2026-03-26T00:00:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/this-clever-scam-nearly-hijacked-a-tech-ceos-apple-id/</loc>
<lastmod>2026-03-19T00:00:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/how-not-to-steal-dollar46-million-from-the-us-government/</loc>
<lastmod>2026-03-12T00:00:02.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/how-a-cybersecurity-boss-framed-his-own-employee/</loc>
<lastmod>2026-03-05T00:00:58.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/how-to-lose-friends-and-ddos-people/</loc>
<lastmod>2026-02-26T00:00:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/face-off-metas-glasses-and-americas-internet-kill-switch/</loc>
<lastmod>2026-02-19T00:00:33.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/ai-was-not-plotting-humanitys-demise-humans-were/</loc>
<lastmod>2026-02-12T00:00:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/the-epstein-files-didnt-hide-this-hacker-very-well/</loc>
<lastmod>2026-02-05T00:00:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/the-dark-webs-worst-assassins-and-pegasus-in-the-dock/</loc>
<lastmod>2026-01-29T00:00:28.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/i-hacked-the-government-and-your-headphones-are-next/</loc>
<lastmod>2026-01-22T00:00:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/from-instagram-panic-to-grok-gone-wild/</loc>
<lastmod>2026-01-15T00:00:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/how-to-scam-someone-in-seven-days/</loc>
<lastmod>2026-01-08T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/the-kindle-that-got-pwned/</loc>
<lastmod>2025-12-18T00:00:59.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/grok-the-stalker-the-louvre-heist-and-microsoft-365-mayhem/</loc>
<lastmod>2025-12-11T00:00:18.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/a-hacker-doxxes-himself-and-social-engineering-as-a-service/</loc>
<lastmod>2025-12-04T00:00:06.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/the-hack-that-brought-back-the-zombie-apocalypse/</loc>
<lastmod>2025-11-27T00:00:34.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/were-sorry-wait-did-a-company-actually-say-that/</loc>
<lastmod>2025-11-20T00:00:31.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/tinders-camera-roll-and-the-buffett-deepfake/</loc>
<lastmod>2025-11-13T00:00:28.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/the-hack-that-messed-with-time-and-rogue-ransomware-negotiators/</loc>
<lastmod>2025-11-06T00:00:22.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/smashing-security/inside-the-mobs-million-dollar-poker-hack-and-a-formula-1-fumble/</loc>
<lastmod>2025-10-30T00:00:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/its-not-you-its-your-printer-state-sponsored-and-phishing-threats-in-2025/</loc>
<lastmod>2026-04-21T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/2025s-ransomware-trends-and-zombie-vulnerabilities/</loc>
<lastmod>2026-04-07T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/cybersecuritys-double-header-2025-insights-from-talos-and-splunk/</loc>
<lastmod>2026-03-26T12:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/modernizing-your-threat-hunt/</loc>
<lastmod>2026-03-12T13:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/holding-the-line-service-provider-security/</loc>
<lastmod>2026-02-26T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/ir-trends-q4-2025-ransomware-chills-and-phishing-heats-up/</loc>
<lastmod>2026-02-12T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/cracking-the-code-what-encryption-can-and-cant-do-for-you/</loc>
<lastmod>2026-01-28T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/cybersecurity-certifications-and-you/</loc>
<lastmod>2026-01-15T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/2015-vs-2025-what-the-last-decade-of-threats-taught-us/</loc>
<lastmod>2025-12-18T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/when-youre-told-no-budget-the-blueprint-for-staying-secure/</loc>
<lastmod>2025-11-25T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/how-attackers-use-your-own-tools-against-you-ir-trends-q3-2025/</loc>
<lastmod>2025-11-13T11:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/passwordless-security-debunking-the-biggest-myths/</loc>
<lastmod>2025-10-24T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/you-cant-patch-burnout-when-cybersecurity-takes-a-toll/</loc>
<lastmod>2025-10-02T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/tampered-chef-when-malvertising-serves-up-infostealers/</loc>
<lastmod>2025-09-18T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/inside-the-black-hat-noc-lessons-in-securing-one-of-the-wildest-networks/</loc>
<lastmod>2025-09-03T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/breaking-down-chaos-tactics-and-origins-of-a-new-raas-operation/</loc>
<lastmod>2025-08-01T10:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/why-attackers-love-your-remote-access-tools/</loc>
<lastmod>2025-07-17T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/teaching-llms-to-spot-malicious-powershell-scripts/</loc>
<lastmod>2025-06-26T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/how-cybercriminals-are-camouflaging-threats-as-fake-ai-tool-installers/</loc>
<lastmod>2025-06-05T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/inside-the-attack-chain-a-new-methodology-for-tracking-compartmentalized-threats/</loc>
<lastmod>2025-05-22T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/follow-the-motive-rethinking-defense-against-initial-access-groups/</loc>
<lastmod>2025-05-15T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/year-in-review-special-pt-4-how-ai-is-influencing-the-threat-landscape/</loc>
<lastmod>2025-05-01T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/year-in-review-special-part-3-identity-and-mfa-attacks/</loc>
<lastmod>2025-04-24T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/year-in-review-special-part-2-the-biggest-ransomware-trends/</loc>
<lastmod>2025-04-17T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/talos-takes/year-in-review-special-part-1-vulnerabilities-email-threats-and-adversary-toolin/</loc>
<lastmod>2025-04-10T09:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/you-wouldnt-download-a-shipment-the-443-podcast-episode-369/</loc>
<lastmod>2026-05-04T15:04:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/cybersecurity-in-latam-smb-risks-ai-and-regional-realities-with-paul-harris-the-/</loc>
<lastmod>2026-04-28T19:07:44.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/a-redsun-rises-the-443-podcast-episode-367/</loc>
<lastmod>2026-04-20T15:46:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/project-glasswing-the-443-podcast-episode-366/</loc>
<lastmod>2026-04-15T15:53:10.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/claude-code-accidently-goes-open-source-the-443-podcast-episode-365/</loc>
<lastmod>2026-04-07T15:29:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/the-us-ban-on-foreign-routers-the-443-podcast-episode-364/</loc>
<lastmod>2026-03-30T15:54:04.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/cybersecurity-analyst-and-investigations-lead-kristen-yang-the-443-podcast-episo/</loc>
<lastmod>2026-03-23T17:14:16.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/strykers-network-disruption-the-443-podcast-episode-362/</loc>
<lastmod>2026-03-16T16:45:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/hackerbot-claw-crosses-the-line-the-443-podcast-episode-361/</loc>
<lastmod>2026-03-09T18:10:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/ciscos-sd-wan-0-day-the-443-podcast-episode-360/</loc>
<lastmod>2026-03-02T19:40:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/watchguards-internet-security-report-2025-h2-the-443-podcast-episode-359/</loc>
<lastmod>2026-02-23T17:26:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/openclaw-as-a-security-threat/</loc>
<lastmod>2026-02-17T22:30:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/moltbook-data-exposure/</loc>
<lastmod>2026-02-09T19:43:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/chatgpt-oopsies-series-of-information/</loc>
<lastmod>2026-02-03T20:37:49.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/uncovering-a-mass-vpn-phishing-campaign-the-443-podcast-episode-355/</loc>
<lastmod>2026-01-20T20:51:32.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/react2shell-the-443-podcast-episode-352/</loc>
<lastmod>2026-01-12T19:18:46.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/the-botnet-that-topped-cloudlfares-domain-charts-the-443-podcast-episode-354/</loc>
<lastmod>2026-01-12T18:59:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/2025-ends-with-a-bang-the-443-podcast-episode-353/</loc>
<lastmod>2025-12-22T18:49:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/watchguards-2026-cybersecurity-predictions-the-443-podcast-episode-351/</loc>
<lastmod>2025-12-08T21:44:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/owasp-top-10-2025-edition-the-443-podcast-episode-350/</loc>
<lastmod>2025-11-24T18:38:39.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/2025-security-predictions-recap-443-podcast-episode-349/</loc>
<lastmod>2025-11-18T19:54:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/october-ransomware-update-the-443-podcast-episode-348/</loc>
<lastmod>2025-10-30T17:47:41.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/whats-going-on-at-salesforce-the-443-podcast-episode-347/</loc>
<lastmod>2025-10-13T17:33:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/an-aiml-deep-dive-with-luke-wolcott-the-443-podcast-episode-346/</loc>
<lastmod>2025-10-06T16:03:53.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-443/how-github-plans-to-fix-the-supply-chain-the-443-podcast-episode-345/</loc>
<lastmod>2025-09-29T15:16:30.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-343-the-human-element-series-spark-your-mental-fitness-with-todd-bertsch/</loc>
<lastmod>2026-03-16T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-342-the-doctor-is-in-series-how-does-decision-fatigue-affect-you/</loc>
<lastmod>2026-03-02T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-341-the-security-awareness-series-cognitive-bias-in-infosec-with-josten-pena/</loc>
<lastmod>2026-02-16T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-340-the-human-element-series-is-ai-changing-human-behavior-with-jacob-ward/</loc>
<lastmod>2026-02-09T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-339-the-doctor-is-in-series-are-you-an-imposter/</loc>
<lastmod>2026-02-02T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-338-the-4th-monday-series-playing-chess-with-your-taxes/</loc>
<lastmod>2026-01-26T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-337-security-awareness-series-using-social-engineering-on-yourself-with-rosa-/</loc>
<lastmod>2026-01-19T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-336-human-element-series-helping-successful-leaders-with-mitchell-osmond/</loc>
<lastmod>2026-01-12T17:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-335-the-doctor-is-in-series-is-that-person-really-a-psychopath/</loc>
<lastmod>2026-01-05T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-334-the-4th-monday-series-travel-hacks-and-tips-with-christie-hudson/</loc>
<lastmod>2025-12-22T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-333-security-awareness-series-disc-and-pivoting-with-shelby-dacko/</loc>
<lastmod>2025-12-15T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-332-human-element-series-health-fitness-and-mindset-with-toby-wright/</loc>
<lastmod>2025-12-08T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-331-the-doctor-is-in-series-what-is-cognitive-dissonance/</loc>
<lastmod>2025-12-01T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-330-the-4th-monday-series-is-your-pet-in-pain-with-dr-liz-moses/</loc>
<lastmod>2025-11-24T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-329-security-awareness-series-mistakes-ai-and-empathy-being-a-powerful-leader/</loc>
<lastmod>2025-11-17T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-328-human-element-series-empathy-communication-and-storytelling-with-tanya-va/</loc>
<lastmod>2025-11-10T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-327-the-doctor-is-in-series-healthy-vs-obsessive-ambition/</loc>
<lastmod>2025-11-03T05:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-326-the-4th-monday-series-back-from-the-dead-with-carrie-hatton/</loc>
<lastmod>2025-10-27T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-325-security-awareness-series-a-crystal-ball-for-mitigating-threats-with-chri/</loc>
<lastmod>2025-10-20T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-324-human-element-series-it-cant-be-about-me-with-jay-izso/</loc>
<lastmod>2025-10-13T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-323-the-doctor-is-in-series-dreams-placebo-and-deja-vu/</loc>
<lastmod>2025-10-06T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-296-human-element-series-the-imagination-dilemma-with-dr-lydia-kostopoulos-re/</loc>
<lastmod>2025-09-29T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-322-the-4th-monday-series-is-your-vintage-game-worth-30000-with-ryan-rosenzwe/</loc>
<lastmod>2025-09-22T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-321-security-awareness-series-trust-but-verify-even-under-abnormal-circumstan/</loc>
<lastmod>2025-09-15T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/the-social-engineer-podcast/ep-320-human-element-series-using-gestures-to-enhanced-communications-with-laure/</loc>
<lastmod>2025-09-08T04:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/operation-winter-shield-what-the-fbi-wants-industry-to-do-now/</loc>
<lastmod>2026-04-30T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/breach-school/</loc>
<lastmod>2026-04-23T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/how-nations-hack-spy-and-win/</loc>
<lastmod>2026-04-16T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/attackers-have-agents-do-you/</loc>
<lastmod>2026-04-09T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/39-seconds-to-breach/</loc>
<lastmod>2026-04-02T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/the-four-horsemen-of-agentic-risk/</loc>
<lastmod>2026-03-26T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/inside-ransomware-negotiations-trust-criminals-or-walk-away/</loc>
<lastmod>2026-03-19T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/who-holds-power-when-ai-compresses-decision-time/</loc>
<lastmod>2026-03-12T06:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/zero-trust-without-the-hype/</loc>
<lastmod>2026-03-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/unit-42s-iran-threat-brief-what-were-seeing/</loc>
<lastmod>2026-03-04T21:10:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/the-billion-dollar-hiring-scam-funding-north-korea/</loc>
<lastmod>2026-02-26T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/inside-750-breaches-with-unit-42/</loc>
<lastmod>2026-02-19T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/when-security-friction-becomes-the-backdoor/</loc>
<lastmod>2026-02-12T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/security-success-stories-you-havent-heard/</loc>
<lastmod>2026-02-05T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/is-your-ai-well-engineered-enough-to-be-trusted/</loc>
<lastmod>2026-01-29T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/the-kill-switch-for-ai-agents/</loc>
<lastmod>2026-01-22T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/securing-ai-without-slowing-business/</loc>
<lastmod>2026-01-15T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/securing-the-ai-supply-chain/</loc>
<lastmod>2026-01-08T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/encore-confronting-chinas-expanding-cyber-threats/</loc>
<lastmod>2026-01-01T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/encore-what-happened-to-hacker-culture/</loc>
<lastmod>2025-12-25T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/lessons-from-the-underground/</loc>
<lastmod>2025-12-18T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/the-adversarial-hacker-mindset/</loc>
<lastmod>2025-12-11T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/securing-the-modern-workforce-lessons-from-medallias-ciso/</loc>
<lastmod>2025-12-04T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/hacker-movies-then-vs-now/</loc>
<lastmod>2025-11-27T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/threat-vector/inside-jingle-thief-cloud-fraud-unwrapped/</loc>
<lastmod>2025-11-21T07:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/modern-soc-struggles-ai-data-fragmentation-and-human-limitations-with-monzy-merz/</loc>
<lastmod>2026-05-05T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-ai-risks-and-resilience-in-cybersecurity-with-rick-hemsley/</loc>
<lastmod>2026-04-28T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/enhancing-cyber-posture-leadership-zero-trust-and-ai-adoption-in-government-with/</loc>
<lastmod>2026-04-14T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/replay-cloud-war-games-building-disaster-muscle-memory-and-collaborative-resilie/</loc>
<lastmod>2026-03-31T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/from-passwords-to-quantum-threats-securing-remote-access-in-a-rapidly-changing-w/</loc>
<lastmod>2026-03-17T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/the-human-price-for-data-and-privacy-protection-with-rob-mcdonald/</loc>
<lastmod>2026-03-03T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-ai-ethics-human-centered-design-regulation-and-the-price-of-innovatio/</loc>
<lastmod>2026-02-24T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/cybersecurity-in-2026-ai-steganography-and-securing-legacy-systems-with-jacob-an/</loc>
<lastmod>2026-02-17T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-borderless-networks-and-data-security-with-yasir-ali-rerun/</loc>
<lastmod>2026-02-10T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/stepping-beyond-checkbox-compliance-building-real-security-and-meeting-legal-dem/</loc>
<lastmod>2026-02-03T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/beyond-passwords-modern-identity-defense-in-practice-with-jasson-casey-and-josh-/</loc>
<lastmod>2026-01-27T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/beyond-passwords-identity-security-as-hospitalitys-frontline-defense-with-jasson/</loc>
<lastmod>2026-01-20T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/the-war-on-data-cyberspies-and-ai-with-eric-oneill-part-2/</loc>
<lastmod>2026-01-13T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/the-war-on-data-cyberspies-and-ai-with-eric-oneill/</loc>
<lastmod>2026-01-06T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/the-merging-worlds-of-ai-cybersecurity-and-physical-threats-with-david-saunders-/</loc>
<lastmod>2025-12-30T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/the-merging-worlds-of-ai-cybersecurity-and-physical-threats-with-david-saunders/</loc>
<lastmod>2025-12-23T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/cloud-war-games-building-disaster-muscle-memory-and-collaborative-resilience-in-/</loc>
<lastmod>2025-12-16T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/understanding-cyber-threats-in-elections-and-infrastructure-with-maggie-miller/</loc>
<lastmod>2025-12-09T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-legacy-cybersecurity-and-quantum-threats-with-damien-fortune/</loc>
<lastmod>2025-12-02T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/how-cybersecurity-impacts-patient-care-in-hospitals-with-christian-dameff-part-2/</loc>
<lastmod>2025-11-25T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/how-cybersecurity-impacts-patient-care-in-hospitals-with-christian-dameff/</loc>
<lastmod>2025-11-18T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-ai-policy-challenges-in-privacy-governance-and-regulation-with-shane-/</loc>
<lastmod>2025-11-11T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/navigating-ai-policy-challenges-in-privacy-governance-and-regulation-with-shane--2/</loc>
<lastmod>2025-11-04T13:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/coaching-the-us-cyber-team-building-cybersecurity-talent-hands-on-forensics-and-/</loc>
<lastmod>2025-10-28T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/to-the-point-cybersecurity/bridging-academia-and-industry-josh-bruntys-approach-to-cybersecurity-training-a/</loc>
<lastmod>2025-10-21T12:30:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/most-companies-arent-anywhere-near-ready-for-ai/</loc>
<lastmod>2026-05-03T23:37:38.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/were-all-building-a-single-digital-assistant/</loc>
<lastmod>2026-04-15T23:41:03.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/why-ai-will-replace-knowledge-workers/</loc>
<lastmod>2026-03-21T18:23:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/why-i-believe-in-sota-models-over-custom-ones/</loc>
<lastmod>2026-03-11T20:50:30.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ai-quality-inversion/</loc>
<lastmod>2026-03-06T16:08:55.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/the-great-transition/</loc>
<lastmod>2026-02-28T00:43:19.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/starting-2026/</loc>
<lastmod>2026-01-30T22:29:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/judge-ai-based-on-output-not-mechanism/</loc>
<lastmod>2025-11-22T21:45:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/humans-need-entropy/</loc>
<lastmod>2025-11-16T16:15:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/why-i-think-karpathy-is-wrong-on-the-agi-timeline/</loc>
<lastmod>2025-10-20T14:29:08.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/novelty-exploration-vs-pattern-exploitation/</loc>
<lastmod>2025-10-15T21:37:08.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/magnifying-time/</loc>
<lastmod>2025-10-14T20:39:43.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/a-conversation-with-harry-wetherald-co-founder-and-ceo-at-maze/</loc>
<lastmod>2025-09-22T18:56:26.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/a-conversation-with-grant-lee-co-founder-and-ceo-at-gamma/</loc>
<lastmod>2025-09-18T22:59:09.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-497-standard-edition-or-more-npm-shenanigans-i-open-sourced-kai-blood-work/</loc>
<lastmod>2025-09-10T16:55:52.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-496-standard-edition-or-new-video-on-building-my-personal-ai-system-anthro/</loc>
<lastmod>2025-09-05T21:49:05.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/a-conversation-with-michael-brown-about-designing-ai-systems/</loc>
<lastmod>2025-08-22T19:28:18.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-494-standard-edition-or-ai-finds-a-p1-i-missed-chartbeat-so-i-made-my-own-/</loc>
<lastmod>2025-08-21T15:30:14.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/a-conversation-with-sarit-tager-from-prisma-cloud/</loc>
<lastmod>2025-07-29T15:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-489-standard-edition-or-my-personal-toolchain-updates-google-tracking-thro/</loc>
<lastmod>2025-07-17T07:18:29.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-488-standard-edition-or-google-granting-confusing-access-to-gemini-a-new-f/</loc>
<lastmod>2025-07-10T20:14:57.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-487-standard-edition-iranian-critical-infra-attacks-insane-recent-producti/</loc>
<lastmod>2025-07-02T17:36:42.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/an-ai-debate-with-marcus-hutchins/</loc>
<lastmod>2025-06-26T16:33:46.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-486-standard-edition-fully-automated-ai-malware-binary-and-web-my-debate-w/</loc>
<lastmod>2025-06-26T16:23:21.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cybersecpods.com/podcasts/unsupervised-learning/ul-no-485-standard-edition-netflix-rce-my-current-ai-stack-all-in-on-claude-code/</loc>
<lastmod>2025-06-19T00:29:25.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
</urlset>
