<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://me.itsecurity.network/tags/ai-security/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/claude-code/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/coding-agents/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/docker/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/docker-sandboxes-enterprise-security-for-ai-coding-agents/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/enterprise-security/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/microvm/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/sandboxing/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/zero-trust/</loc><lastmod>2026-03-13T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/agent-skills/</loc><lastmod>2026-03-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/agent-skills-the-new-supply-chain-attack-vector/</loc><lastmod>2026-03-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cybersecurity/</loc><lastmod>2026-03-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/prompt-injection/</loc><lastmod>2026-03-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/supply-chain-attacks/</loc><lastmod>2026-03-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/api/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ci/cd/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cloudflare-workers/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/doaas/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/open-source/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/typescript/</loc><lastmod>2026-02-17T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/building_workforce_security_guardrails/</loc><lastmod>2026-02-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cloud-security/</loc><lastmod>2026-02-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/identity/</loc><lastmod>2026-02-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/infosec/</loc><lastmod>2026-02-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/workforce-security/</loc><lastmod>2026-02-01T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/devops/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/mcp/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/mcp-ssh-orchestrator/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/orchestration/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/python/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ssh/</loc><lastmod>2025-11-24T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/bash/</loc><lastmod>2025-10-10T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ebook/</loc><lastmod>2025-10-10T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/education/</loc><lastmod>2025-10-10T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/macos/</loc><lastmod>2025-10-10T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/secure-bash-macos-ebook/</loc><lastmod>2025-10-10T00:00:00-05:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/aws/</loc><lastmod>2025-09-28T20:14:39-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cloud/</loc><lastmod>2025-09-28T20:14:39-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/credentials/</loc><lastmod>2025-09-28T20:14:39-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-fatal-env-files-breachv1/</loc><lastmod>2025-09-28T20:14:39-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/detection-engineering/</loc><lastmod>2025-09-21T07:01:23-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/mitre-attck/</loc><lastmod>2025-09-21T07:01:23-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/siem/</loc><lastmod>2025-09-21T07:01:23-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/sigma-rules-decoded/</loc><lastmod>2025-09-21T07:01:23-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/sigma-rules/</loc><lastmod>2025-09-21T07:01:23-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cdm/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/continuous-monitoring/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/from-blind-spots-to-insights-the-cdm-revolution/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/nist/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/risk-management/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-assessment/</loc><lastmod>2025-09-19T07:00:46-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/appsec/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cissp/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/code-review/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/software-development/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-secret-weapon-of-security-code-reviews/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/vulnerability-management/</loc><lastmod>2025-09-03T07:00:33-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-architecture/</loc><lastmod>2025-08-26T07:00:41-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/software-security/</loc><lastmod>2025-08-26T07:00:41-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/solarwinds-supply-chain-trust-betrayal/</loc><lastmod>2025-08-26T07:00:41-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/supply-chain/</loc><lastmod>2025-08-26T07:00:41-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/threat-analysis/</loc><lastmod>2025-08-26T07:00:41-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/business-alignment/</loc><lastmod>2025-08-25T07:00:32-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/career-growth/</loc><lastmod>2025-08-25T07:00:32-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/from-engineer-to-business-security-partner/</loc><lastmod>2025-08-25T07:00:32-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/leadership/</loc><lastmod>2025-08-25T07:00:32-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-strategy/</loc><lastmod>2025-08-25T07:00:32-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/asset-security/</loc><lastmod>2025-08-24T11:31:50-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/data-classification/</loc><lastmod>2025-08-24T11:31:50-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/dlp/</loc><lastmod>2025-08-24T11:31:50-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-hidden-cost-of-bad-data-classification/</loc><lastmod>2025-08-24T11:31:50-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/data-breach/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/incident-response/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/insider-threat/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ir/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/playbook/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ransomware/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-operations/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/soc/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-15-minute-incident-response-playbook/</loc><lastmod>2025-08-20T07:01:12-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/architecture/</loc><lastmod>2025-08-19T21:29:27-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/microsoft/</loc><lastmod>2025-08-19T21:29:27-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/paw/</loc><lastmod>2025-08-19T21:29:27-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-paw-architecture-blueprint/</loc><lastmod>2025-08-19T21:29:27-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/zerotrust/</loc><lastmod>2025-08-19T21:29:27-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/api-security/</loc><lastmod>2025-08-15T08:37:37-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/owasp/</loc><lastmod>2025-08-15T08:37:37-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-duolingo-api-security-blunder/</loc><lastmod>2025-08-15T08:37:37-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/change-healthcare-ransomware-breakdown/</loc><lastmod>2025-08-13T22:14:31-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/healthcare/</loc><lastmod>2025-08-13T22:14:31-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/mfa/</loc><lastmod>2025-08-13T22:14:31-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/microsoft-zero-trust-transformation/</loc><lastmod>2025-08-11T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/attck/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/blueteam/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/d3fend/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/defensivestrategy/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/mitre/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/mitre-d3fend-bridging-attack-and-defense/</loc><lastmod>2025-08-11T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cryptography/</loc><lastmod>2025-08-09T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/key-management/</loc><lastmod>2025-08-09T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/kms/</loc><lastmod>2025-08-09T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-engineering/</loc><lastmod>2025-08-09T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-silent-crypto-crisis/</loc><lastmod>2025-08-09T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/microsegmentation/</loc><lastmod>2025-08-07T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/networking/</loc><lastmod>2025-08-07T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/the-microsegmentation-imperative/</loc><lastmod>2025-08-07T00:00:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/ai/</loc><lastmod>2025-08-06T00:28:54-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/ai-security-snake-oil/</loc><lastmod>2025-08-06T00:28:54-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/aiwashing/</loc><lastmod>2025-08-06T00:28:54-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/security-leadership/</loc><lastmod>2025-08-06T00:28:54-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/csf/</loc><lastmod>2025-08-06T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/governance/</loc><lastmod>2025-08-06T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/grc/</loc><lastmod>2025-08-06T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/nist-csf-2-0-architectural-revolution/</loc><lastmod>2025-08-06T00:24:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cis/</loc><lastmod>2025-08-01T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/compliance/</loc><lastmod>2025-08-01T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/enterprise/</loc><lastmod>2025-08-01T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/macos-security-hardening-for-enterprise/</loc><lastmod>2025-08-01T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/mscp/</loc><lastmod>2025-08-01T00:56:53-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/authentication/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/fido2/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/passkeys/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/passwordless/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/passwordless-auth-worth-the-effort/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/webauthn/</loc><lastmod>2025-07-28T13:02:35-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/cloudflare/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/github/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/blog/how-i-built-my-site/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/hugo/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/portfolio/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/static-site/</loc><lastmod>2025-05-15T23:19:24-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/data-security/</loc><lastmod>2025-03-14T23:30:20-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/dspm/</loc><lastmod>2025-03-14T23:30:20-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/synthetic-data/</loc><lastmod>2025-03-14T23:30:20-04:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/synthetic-data-hub/</loc><lastmod>2025-03-14T23:30:20-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/games/</loc><lastmod>2025-03-14T23:01:47-04:00</lastmod></url><url><loc>https://me.itsecurity.network/projects/kid-friendly-bash-games/</loc><lastmod>2025-03-14T23:01:47-04:00</lastmod></url><url><loc>https://me.itsecurity.network/tags/kids/</loc><lastmod>2025-03-14T23:01:47-04:00</lastmod></url><url><loc>https://me.itsecurity.network/about/</loc></url><url><loc>https://me.itsecurity.network/archives/</loc></url><url><loc>https://me.itsecurity.network/categories/</loc></url><url><loc>https://me.itsecurity.network/search/</loc></url></urlset>