<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybrsecmediatest.ghost.io/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://cybrsecmediatest.ghost.io/hippocampus-killing-you-here-are-some-great-resources-for-cybersecurity-pros/</loc><lastmod>2026-05-12T18:40:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/30117181-9dc8-4a01-b4f5-fa88c3c11be8.png</image:loc><image:caption>30117181-9dc8-4a01-b4f5-fa88c3c11be8.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-threat-intel-to-vulnops-why-level-1-soc-as-we-know-it-is-heading-to-extinction/</loc><lastmod>2026-05-12T18:40:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/e6da8fed-cbf5-4ab4-97c6-0335b86a7f48.png</image:loc><image:caption>e6da8fed-cbf5-4ab4-97c6-0335b86a7f48.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-hak-cast-episode-14-tim-medin/</loc><lastmod>2026-05-12T13:47:41.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/Tim-Medin.png</image:loc><image:caption>Tim-Medin.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/hack-the-defenders-tim-medin-on-why-blue-teams-need-an-offensive-mindset/</loc><lastmod>2026-05-12T11:35:39.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/b08303a0-10f3-42f3-8fa9-f17630590490.png</image:loc><image:caption>b08303a0-10f3-42f3-8fa9-f17630590490.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/agentic-ai-security-risks-are-growing-faster-than-state-and-local-defenses/</loc><lastmod>2026-05-12T11:35:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/3f77a0f0-c438-424b-a965-0ee47f5ef943.png</image:loc><image:caption>3f77a0f0-c438-424b-a965-0ee47f5ef943.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/medical-device-cybersecurity-in-2026-more-investment-more-attacks-more-harm/</loc><lastmod>2026-05-11T15:31:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/92889bc9-7a2d-4130-9916-2a09845f64a3.png</image:loc><image:caption>92889bc9-7a2d-4130-9916-2a09845f64a3.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/coming-soon/</loc><lastmod>2026-05-11T14:08:33.000Z</lastmod><image:image><image:loc>https://static.ghost.org/v4.0.0/images/feature-image.jpg</image:loc><image:caption>feature-image.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybersecurity-is-more-than-keyboards-and-dashboards/</loc><lastmod>2026-05-08T12:18:44.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/92ee647e-e534-4ef1-b951-240cbabe80cf.png</image:loc><image:caption>92ee647e-e534-4ef1-b951-240cbabe80cf.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/this-cybersecurity-community-is-not-like-the-others/</loc><lastmod>2026-05-07T13:39:56.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/Media-Banner-2.png</image:loc><image:caption>Media-Banner-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/mental-health-awareness-month-boundaries-are-a-security-control/</loc><lastmod>2026-05-06T12:21:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/20ff10a4-df25-41d4-97d5-8241cf939306.png</image:loc><image:caption>20ff10a4-df25-41d4-97d5-8241cf939306.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/security-starts-with-the-mission-not-a-checklist/</loc><lastmod>2026-05-06T11:57:50.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/b9032e8d-79da-4c57-9e29-5831ee73bfe1.png</image:loc><image:caption>b9032e8d-79da-4c57-9e29-5831ee73bfe1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-resilience-in-action-a-framework-for-utilities/</loc><lastmod>2026-05-05T16:29:24.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/Bill-Lawrence---Sid-Schaffer.png</image:loc><image:caption>Bill-Lawrence---Sid-Schaffer.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/how-to-build-a-vulnerability-intelligence-pipeline-that-doesnt-rely-on-nists-nvd/</loc><lastmod>2026-05-04T15:25:08.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/a689ffb6-bd6a-46fe-b5a8-dcda2384f4df.png</image:loc><image:caption>a689ffb6-bd6a-46fe-b5a8-dcda2384f4df.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-cyber-luminaries-who-enrich-cybr-sec-community/</loc><lastmod>2026-05-04T13:18:11.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/05/6201ae3b-0a3c-4739-af9f-b83289fe1fbc.png</image:loc><image:caption>6201ae3b-0a3c-4739-af9f-b83289fe1fbc.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/those-security-threats-are-all-in-your-head/</loc><lastmod>2026-05-01T13:04:55.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Media-Banner-2-2.png</image:loc><image:caption>Media-Banner-2-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/fix-it-no-not-like-that/</loc><lastmod>2026-05-01T12:39:09.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/a579cabc-44e1-4916-8083-5d8ec4665fd7.png</image:loc><image:caption>a579cabc-44e1-4916-8083-5d8ec4665fd7.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-identity-perimeter-is-already-failing-heres-where-to-start-fixing-it/</loc><lastmod>2026-04-30T13:29:51.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/64271113-9629-4dd5-876d-b792014e0690.png</image:loc><image:caption>64271113-9629-4dd5-876d-b792014e0690.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/have-we-already-had-a-cognitive-pearl-harbor/</loc><lastmod>2026-04-29T20:46:18.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/04849d5f-b4aa-4cd1-8c99-ee038fc4a8de.png</image:loc><image:caption>04849d5f-b4aa-4cd1-8c99-ee038fc4a8de.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-hak-cast-episode-13-winn-schwartau/</loc><lastmod>2026-04-29T14:30:15.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Winn-Schwartau.png</image:loc><image:caption>Winn-Schwartau.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/security-teams-are-fighting-the-wrong-ddos-the-one-happening-in-their-heads/</loc><lastmod>2026-04-29T13:46:43.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/df049310-41d8-4d23-9db6-ce80c31a1341.png</image:loc><image:caption>df049310-41d8-4d23-9db6-ce80c31a1341.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/high-risk-vulnerabilities-with-llms-at-nearly-triple-the-rate-of-traditional-software-new-cobalt-report-finds/</loc><lastmod>2026-04-29T13:13:04.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/d2338410-5d3c-4145-a0fb-643a4cb886d3.png</image:loc><image:caption>d2338410-5d3c-4145-a0fb-643a4cb886d3.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/omdia-survey-captures-microsegmentation-gap-security-teams-know-what-they-need-and-still-arent-getting-it-done/</loc><lastmod>2026-04-29T13:12:52.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/5032cb86-fb5a-495c-89cb-eb3629866bbd.png</image:loc><image:caption>5032cb86-fb5a-495c-89cb-eb3629866bbd.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/enhancing-ot-cybersecurity-in-maritime-environments/</loc><lastmod>2026-04-29T12:36:20.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Chris-Wolski.png</image:loc><image:caption>Chris-Wolski.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-executive-imperative-acting-decisively-when-you-need-to-defend-ot/</loc><lastmod>2026-04-29T12:32:01.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Vivek-Ponnada.png</image:loc><image:caption>Vivek-Ponnada.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/agentic-ai-in-ot-the-ultimate-insider-threat/</loc><lastmod>2026-04-29T12:27:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Ian-Bramson.png</image:loc><image:caption>Ian-Bramson.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-static-controls-to-dynamic-risk-how-ot-cybersecurity-risk-is-finally-becoming-actionable/</loc><lastmod>2026-04-29T12:24:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Jay-McMickle---Al-Lindseth.png</image:loc><image:caption>Jay-McMickle---Al-Lindseth.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/breaches-dont-kill-companies-being-unprepared-does/</loc><lastmod>2026-04-28T16:30:10.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/7473fa7a-ce2c-4bcd-ab8b-9eb719df5c85.png</image:loc><image:caption>7473fa7a-ce2c-4bcd-ab8b-9eb719df5c85.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/breachcalc-energy-maritime-calculate-your-risk-per-kilowatt-maritime-cyber-disruption-cost-calculator/</loc><lastmod>2026-04-28T15:01:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Quincy-Jackson-1.png</image:loc><image:caption>Quincy-Jackson-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/bitwarden-cli-compromised-in-github-actions-supply-chain-attack-what-it-means-for-you/</loc><lastmod>2026-04-23T18:43:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/61ce4594-16e5-474e-8172-248be167dac9.png</image:loc><image:caption>61ce4594-16e5-474e-8172-248be167dac9.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-cybersecurity-version-of-the-helpers-mister-rogers-told-us-about-present-and-future/</loc><lastmod>2026-04-23T17:17:05.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Media-Banner-2-1.png</image:loc><image:caption>Media-Banner-2-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/nist-declares-inbox-zero-pulls-back-on-cve-enrichment-now-enterprise-security-teams-must-fill-the-gap/</loc><lastmod>2026-04-23T16:11:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/fb599ec9-0c54-4284-a44c-8db2d09cd5be.png</image:loc><image:caption>fb599ec9-0c54-4284-a44c-8db2d09cd5be.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-community-establishes-permanent-home-at-the-innovation-hub-at-801-travis/</loc><lastmod>2026-04-23T13:44:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/4.22.26_LinkedIn.png</image:loc><image:caption>4.22.26_LinkedIn.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/vercel-breach-raises-supply-chain-risk-what-security-teams-must-do-now/</loc><lastmod>2026-04-22T15:56:25.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/68272873-be50-4c0a-bfec-1a7ace56b994.png</image:loc><image:caption>68272873-be50-4c0a-bfec-1a7ace56b994.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-hidden-risks-of-big-ai-a-community-discussion/</loc><lastmod>2026-04-22T14:44:37.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Tommy-Todd-2.png</image:loc><image:caption>Tommy-Todd-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/why-ot-cyber-resiliency-matters-practical-steps-to-improve-your-ot-cyber-resiliency-posture/</loc><lastmod>2026-04-21T18:22:01.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Eric-Smith.png</image:loc><image:caption>Eric-Smith.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/quantifying-cyber-risk-in-dollars-a-better-way-to-fund-and-prioritize-ot-security/</loc><lastmod>2026-04-21T18:01:04.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Hector-Perez-and-David-White.png</image:loc><image:caption>Hector-Perez-and-David-White.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-cyber-warfare-to-the-factory-floor-what-national-defense-gets-right-and-wrong-about-ot-security/</loc><lastmod>2026-04-21T13:04:43.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Anthony-George.png</image:loc><image:caption>Anthony-George.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybersecurity-tabletops-building-resiliency-and-relationships/</loc><lastmod>2026-04-21T13:00:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Randy-Petersen.png</image:loc><image:caption>Randy-Petersen.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/best-practices-for-implementing-iec-62443-within-existing-ot-security-frameworks/</loc><lastmod>2026-04-20T14:30:04.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Brendan-Clemmer.png</image:loc><image:caption>Brendan-Clemmer.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-security-bridging-the-it-and-ot-gap/</loc><lastmod>2026-04-20T14:25:31.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Justin-Turner.png</image:loc><image:caption>Justin-Turner.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/followfriday-authors-who-entered-the-ai-storm-and-chose-reason-over-fud/</loc><lastmod>2026-04-20T14:14:56.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/9ea453fc-8777-4b97-8b06-b892f5adc111.png</image:loc><image:caption>9ea453fc-8777-4b97-8b06-b892f5adc111.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-kids-would-be-alright-if-cybersecurity-would-stop-failing-them/</loc><lastmod>2026-04-17T15:22:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/d3a2c0b0-7496-4b68-8416-0e1b87d08b99.png</image:loc><image:caption>d3a2c0b0-7496-4b68-8416-0e1b87d08b99.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/an-ot-pen-test-conversation-tester-intent-vs-asset-owner-reality/</loc><lastmod>2026-04-17T14:13:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Reynaldo-Gonzalez-and-Oren-Niskin.png</image:loc><image:caption>Reynaldo-Gonzalez-and-Oren-Niskin.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/driving-ot-security-forward-evolving-architectures-for-monitoring-and-segmentation-in-ot/</loc><lastmod>2026-04-17T14:09:56.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Blake-Gilson.png</image:loc><image:caption>Blake-Gilson.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/final-destination-the-data-pipeline-where-governance-always-dies-first/</loc><lastmod>2026-04-17T13:31:53.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/00b81d51-76dd-4c8b-905a-7eb6c446956c.png</image:loc><image:caption>00b81d51-76dd-4c8b-905a-7eb6c446956c.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-insurable-gap-why-ot-security-is-the-new-board-mandate/</loc><lastmod>2026-04-16T12:41:27.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Shaun-Six-2.png</image:loc><image:caption>Shaun-Six-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/unleashing-the-power-of-overlooked-logging-sources-in-ot-networks/</loc><lastmod>2026-04-16T12:37:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Stuart-Bailey-2.png</image:loc><image:caption>Stuart-Bailey-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-newsletter-goes-weekly-mythos-creates-chaos-and-cybersecurity-does-wrong-by-the-kids/</loc><lastmod>2026-04-16T12:10:33.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Media-Banner-2.png</image:loc><image:caption>Media-Banner-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cyber-distortions-kevin-pentecost-and-jason-popillion-on-cyber-immortality-ai-companions-and-security-risks/</loc><lastmod>2026-04-15T14:15:02.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Kevin-and-Jason.png</image:loc><image:caption>Kevin-and-Jason.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/doing-cool-stuff-with-dr-dustin-sachs/</loc><lastmod>2026-04-15T14:14:03.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Dr.-Dustin-Sachs_LinkedIn--2.png</image:loc><image:caption>Dr.-Dustin-Sachs_LinkedIn--2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-air-force-unix-to-ai-chaos-john-dickson-on-securing-whats-next/</loc><lastmod>2026-04-15T14:13:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/John-Dickson.png</image:loc><image:caption>John-Dickson.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-cyberstalking-to-cybersecurity-leadership-kelley-misatas-mission-to-protect-nonprofits/</loc><lastmod>2026-04-15T14:12:31.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Kelley-Misata.png</image:loc><image:caption>Kelley-Misata.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-hak-cast-episode-12-fergus-hay-of-the-hacking-games/</loc><lastmod>2026-04-15T14:10:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Fergus-Hay-2.png</image:loc><image:caption>Fergus-Hay-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-hak-cast-episode-11-theresa-lanowitz/</loc><lastmod>2026-04-15T14:07:39.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Theresa-Lanowitz.png</image:loc><image:caption>Theresa-Lanowitz.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/less-blood-more-bits-what-almost-went-wrong-matters-more-than-what-did/</loc><lastmod>2026-04-15T14:04:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Wendy-Nather-2.png</image:loc><image:caption>Wendy-Nather-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/gaming-isnt-a-distraction-its-cybersecurity-training-in-disguise/</loc><lastmod>2026-04-14T21:23:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/cc92c9fd-2e01-4df2-9e3c-08f82cbf1b0f.png</image:loc><image:caption>cc92c9fd-2e01-4df2-9e3c-08f82cbf1b0f.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/mythos-and-the-making-of-a-cybersecurity-mental-health-crisis/</loc><lastmod>2026-04-14T13:16:51.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/5874bfdb-f28b-4d97-b7f7-f0af37aee164.png</image:loc><image:caption>5874bfdb-f28b-4d97-b7f7-f0af37aee164.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/mythos-broke-the-clock-now-defenders-are-racing-the-storm/</loc><lastmod>2026-04-14T13:16:24.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/a6732486-a3f1-4471-9476-3e5d663ee0dd.png</image:loc><image:caption>a6732486-a3f1-4471-9476-3e5d663ee0dd.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/segregation-vs-segmentation-evolving-ot-security-from-physical-segregation-to-context-aware-segmentation/</loc><lastmod>2026-04-14T12:39:01.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Fazil-Osman-and-Farshad-Hendi.png</image:loc><image:caption>Fazil-Osman-and-Farshad-Hendi.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-siloed-to-secure-aligning-people-process-and-technology-for-cps-risk-reduction/</loc><lastmod>2026-04-14T12:34:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Arshad-Massomi.png</image:loc><image:caption>Arshad-Massomi.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/infographic-7-moves-to-survive-the-ai-vulnerability-storm/</loc><lastmod>2026-04-13T17:33:31.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/c3d7e28f-470e-4d37-aab8-4088ad3dade1.png</image:loc><image:caption>c3d7e28f-470e-4d37-aab8-4088ad3dade1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/packets-dont-lie-leveraging-ir-processes-to-solve-operational-downtime/</loc><lastmod>2026-04-13T14:23:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Markus-Mueller.png</image:loc><image:caption>Markus-Mueller.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/failing-forward-in-industrial-security/</loc><lastmod>2026-04-13T14:17:39.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Mike-Holcomb-2.png</image:loc><image:caption>Mike-Holcomb-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-it-ot-pen-test-greatest-hits-why-your-findings-report-looks-like-on-repeat/</loc><lastmod>2026-04-13T14:11:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Dd-Budiharto-2.png</image:loc><image:caption>Dd-Budiharto-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/iranian-hackers-didnt-need-a-zero-day-to-hit-u-s-critical-infrastructure-they-just-rtfm/</loc><lastmod>2026-04-13T12:58:57.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/8f84bcf9-8e2e-44d2-8867-521c4b7c6030.png</image:loc><image:caption>8f84bcf9-8e2e-44d2-8867-521c4b7c6030.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-hackers-who-will-rock-cybr-hak-con/</loc><lastmod>2026-04-13T12:58:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/27b7d276-f8a0-4059-8c36-4078476384cf.png</image:loc><image:caption>27b7d276-f8a0-4059-8c36-4078476384cf.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/when-ai-becomes-the-insider-threat-on-the-plant-floor/</loc><lastmod>2026-04-10T12:37:14.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/c363c6f3-c7c4-4c82-b9d7-56cd71e990d0.png</image:loc><image:caption>c363c6f3-c7c4-4c82-b9d7-56cd71e990d0.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ai-becomes-the-insider-threat-on-the-plant-floor-supply-chain-collapse-critical-infrastructure-under-fire-and-too-much-noise/</loc><lastmod>2026-04-10T12:37:02.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Media-Banner--1-.png</image:loc><image:caption>Media-Banner--1-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/wendy-nather-on-cyber-lessons-that-come-from-the-near-misses/</loc><lastmod>2026-04-09T13:36:45.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/07b432e7-2746-4152-89e3-b79e47c23138.png</image:loc><image:caption>07b432e7-2746-4152-89e3-b79e47c23138.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/hunted-online-rewired-for-cybersecurity-how-kelley-misata-turned-trauma-into-a-mission/</loc><lastmod>2026-04-08T12:55:16.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/Screenshot-2026-04-07-at-8.56.09---AM.png</image:loc><image:caption>Screenshot-2026-04-07-at-8.56.09---AM.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/shall-we-play-a-conference-game-wopr-is-a-regular-attendee-at-ot-sec-con-cybr-hak-con-and-cybr-sec-con/</loc><lastmod>2026-04-07T14:53:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/unnamed.jpg</image:loc><image:caption>unnamed.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-week-the-software-supply-chain-melted-down/</loc><lastmod>2026-04-07T12:53:57.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/e41451b9-3adf-44ae-a4ed-3dc4329f6fa2.png</image:loc><image:caption>e41451b9-3adf-44ae-a4ed-3dc4329f6fa2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/m-a-cybersecurity-searching-for-lego-in-the-dark/</loc><lastmod>2026-04-03T14:18:26.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/04/81831d20-011c-4ec9-861d-d3ca42d16880.png</image:loc><image:caption>81831d20-011c-4ec9-861d-d3ca42d16880.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-security-starts-with-understanding-the-plant-inside-mike-holcombs-ot-sec-con-training/</loc><lastmod>2026-04-02T20:38:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/6d78f9f3-5c9a-4c0f-ba5f-0725568db329.png</image:loc><image:caption>6d78f9f3-5c9a-4c0f-ba5f-0725568db329.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/how-ai-has-weaponized-the-software-supply-chain-and-how-to-respond/</loc><lastmod>2026-04-02T15:25:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/44d4a855-431b-4d15-863f-ec1c2d72fc70.png</image:loc><image:caption>44d4a855-431b-4d15-863f-ec1c2d72fc70.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cisa-is-running-at-40-strength-while-irans-proxies-run-at-full-speed/</loc><lastmod>2026-04-01T13:18:00.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/3870ff82-0c7f-4674-b226-75cc9c4c4d77.png</image:loc><image:caption>3870ff82-0c7f-4674-b226-75cc9c4c4d77.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-sec-con-where-cyber-meets-the-physical-world-and-failure-is-no-longer-an-option/</loc><lastmod>2026-03-31T20:34:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/otseccon_green_final.png</image:loc><image:caption>otseccon_green_final.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/pilot-program-to-boost-water-utility-cybersecurity-falls-short/</loc><lastmod>2026-03-31T18:09:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/ee4de9b8-39f4-4143-ac6f-6fecf3a5b30d.png</image:loc><image:caption>ee4de9b8-39f4-4143-ac6f-6fecf3a5b30d.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/state-of-security-vendors-at-rsac-2026-ai-noise-identity-sprawl-and-a-show-floor-built-for-lead-capture/</loc><lastmod>2026-03-31T10:24:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/be33a4d3-d422-44eb-8044-bb33e8746bd5.png</image:loc><image:caption>be33a4d3-d422-44eb-8044-bb33e8746bd5.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/your-agents-arent-your-children-stop-naming-them-that-way/</loc><lastmod>2026-03-31T10:23:57.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/cb554bbc-91b4-49be-8041-1da3504d6608-1.png</image:loc><image:caption>cb554bbc-91b4-49be-8041-1da3504d6608-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-purdue-model-is-aging-heres-why-operators-are-looking-toward-2-0/</loc><lastmod>2026-03-30T21:26:40.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/d70e902e-aece-4204-a77d-e514d45594db.png</image:loc><image:caption>d70e902e-aece-4204-a77d-e514d45594db.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/you-dont-have-to-be-interesting-to-get-hit-opportunistic-cps-attacks-against-critical-infrastructure/</loc><lastmod>2026-03-30T21:03:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/09b5120b-3b64-4f49-92cd-6b432da08352.png</image:loc><image:caption>09b5120b-3b64-4f49-92cd-6b432da08352.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/america-must-better-prepare-for-a-critical-infrastructure-cyber-battlefield/</loc><lastmod>2026-03-30T14:29:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/08d6352b-0391-461a-a9ab-e61660f98199.png</image:loc><image:caption>08d6352b-0391-461a-a9ab-e61660f98199.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/rsac-2026-the-cybersecurity-jobs-paradox-the-industry-needs-talent-but-entry-level-workers-cant-get-in/</loc><lastmod>2026-03-30T12:11:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/4eefffac-d9ee-4a72-9838-63ad686d5e2b.png</image:loc><image:caption>4eefffac-d9ee-4a72-9838-63ad686d5e2b.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/a-brief-history-of-console-hacks/</loc><lastmod>2026-03-27T17:43:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Joseph-Bolduc.png</image:loc><image:caption>Joseph-Bolduc.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/rsac-2026-vendor-highlights/</loc><lastmod>2026-03-27T01:30:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/ab74a644-43b3-4af8-b0a5-05242c4b4a5f.png</image:loc><image:caption>ab74a644-43b3-4af8-b0a5-05242c4b4a5f.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-apocalypse-live-from-the-rsac-expo-floor/</loc><lastmod>2026-03-26T22:27:15.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/8c1dc29e-40cc-4304-9a71-cead14d88a40.png</image:loc><image:caption>8c1dc29e-40cc-4304-9a71-cead14d88a40.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/rsac-2026-the-new-reality-in-cybersecurity-cyber-kinetic-and-human/</loc><lastmod>2026-03-26T15:00:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Media-Banner--1--1.png</image:loc><image:caption>Media-Banner--1--1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-cast-episode-64-rob-lee/</loc><lastmod>2026-03-25T18:00:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Rob-Lee.png</image:loc><image:caption>Rob-Lee.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-hak-cast-episode-10-chris-glanden/</loc><lastmod>2026-03-25T17:56:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Chris-Glanden.png</image:loc><image:caption>Chris-Glanden.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-cast-episode-65-icits-valerie-moon/</loc><lastmod>2026-03-25T13:32:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Valerie-Moon.png</image:loc><image:caption>Valerie-Moon.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ata-2026-china-russia-iran-north-korea-treat-u-s-infrastructure-as-a-standing-battlespace/</loc><lastmod>2026-03-24T23:17:19.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/d3ae1cb4-b707-4e63-a9c4-b20826dd3cc2.png</image:loc><image:caption>d3ae1cb4-b707-4e63-a9c4-b20826dd3cc2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-ai-revolution-could-bring-a-new-kind-of-tyranny-unless-we-force-a-better-outcome/</loc><lastmod>2026-03-23T23:27:32.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/IMG_0408-1.jpeg</image:loc><image:caption>IMG_0408-1.jpeg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-luminaries-worth-following-during-rsac/</loc><lastmod>2026-03-22T22:40:45.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/1428a6f5-1add-4b16-b902-50115ba9d27e.png</image:loc><image:caption>1428a6f5-1add-4b16-b902-50115ba9d27e.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cyber-fortress-the-war-game-preparing-the-u-s-for-cyberattacks-on-critical-infrastructure/</loc><lastmod>2026-03-20T20:59:09.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Screenshot-2026-03-17-at-10.39.22---AM.png</image:loc><image:caption>Screenshot-2026-03-17-at-10.39.22---AM.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-war-with-iran-is-now-being-partially-fought-in-data-centers-defense-networks-and-telegram-chats/</loc><lastmod>2026-03-20T13:20:32.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/cb6de6ab-20bd-44e0-b6c0-7c0a5842cce5.png</image:loc><image:caption>cb6de6ab-20bd-44e0-b6c0-7c0a5842cce5.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/iranian-attack-on-stryker-brings-byod-dangers-back-to-center-stage/</loc><lastmod>2026-03-20T13:20:11.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/5c88df4f-4435-4786-b51e-c50fee8111a9.png</image:loc><image:caption>5c88df4f-4435-4786-b51e-c50fee8111a9.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/americas-medical-hardware-is-a-battlefield/</loc><lastmod>2026-03-20T13:19:52.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/7e9b7582-c630-4df9-8218-a20287c957ff.png</image:loc><image:caption>7e9b7582-c630-4df9-8218-a20287c957ff.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-it-help-desk-to-cyber-storyteller-how-chris-glanden-built-a-creative-career-in-cybersecurity/</loc><lastmod>2026-03-20T13:19:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Screenshot-2026-03-17-at-8.41.37---AM.png</image:loc><image:caption>Screenshot-2026-03-17-at-8.41.37---AM.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cyberwars-new-red-line-why-attacks-on-civilians-must-be-stopped/</loc><lastmod>2026-03-20T13:16:55.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/da7b9bd6-98c3-4b2b-8fe5-fa70472414ad.png</image:loc><image:caption>da7b9bd6-98c3-4b2b-8fe5-fa70472414ad.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/welcome-to-the-ghostline-chris-glandens-tool-for-telling-anonymous-cybersecurity-stories/</loc><lastmod>2026-03-18T14:06:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/3a4f853f-18e4-4769-bf21-f94ce5f3e18e.png</image:loc><image:caption>3a4f853f-18e4-4769-bf21-f94ce5f3e18e.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/neurohacked-how-stress-fatigue-and-bias-sabotage-cybersecurity-decisions/</loc><lastmod>2026-03-17T12:55:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Dustin-Sachs.png</image:loc><image:caption>Dustin-Sachs.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/followfriday-five-ot-security-leaders-speaking-at-ot-sec-con/</loc><lastmod>2026-03-16T12:28:53.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/73985e74-a57d-4b49-a15f-fff6832d12f4.png</image:loc><image:caption>73985e74-a57d-4b49-a15f-fff6832d12f4.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/iran-and-the-new-realities-of-cyberwar/</loc><lastmod>2026-03-13T13:42:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/Media-Banner--1-.png</image:loc><image:caption>Media-Banner--1-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/where-to-track-cyber-activity-tied-to-the-us-israel-iran-conflict/</loc><lastmod>2026-03-09T19:54:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/03a60bbb-a1e9-4129-9ef6-c38c23e6172b.png</image:loc><image:caption>03a60bbb-a1e9-4129-9ef6-c38c23e6172b.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/followfriday-5-voices-exploring-how-ai-will-reshape-cybersecurity-work/</loc><lastmod>2026-03-09T19:31:33.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/ee844305-d8cc-4112-afe5-9518a580f92e.png</image:loc><image:caption>ee844305-d8cc-4112-afe5-9518a580f92e.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/health-isac-data-shows-healthcare-under-sustained-escalating-siege-in-2025/</loc><lastmod>2026-03-05T21:49:29.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/6787561a-546d-44d3-80c1-9420bc8b4718.png</image:loc><image:caption>6787561a-546d-44d3-80c1-9420bc8b4718.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/iran-conflict-americas-cyber-defenses-face-their-biggest-test-at-a-weak-moment/</loc><lastmod>2026-03-03T22:25:06.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/aae8d236-17d2-4027-8366-c916c3e6ab8b.png</image:loc><image:caption>aae8d236-17d2-4027-8366-c916c3e6ab8b.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/conflict-with-iran-is-latest-case-of-the-wall-between-cyber-and-kinetic-warfare-crumbling/</loc><lastmod>2026-03-02T19:12:53.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/03/290c97f3-cabe-473b-8531-53797a8c09f9.png</image:loc><image:caption>290c97f3-cabe-473b-8531-53797a8c09f9.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-cybersecurity-pr-practitioners-who-get-it-right/</loc><lastmod>2026-02-27T19:48:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/ead2ece6-460f-48aa-930f-68dae5377c67.png</image:loc><image:caption>ead2ece6-460f-48aa-930f-68dae5377c67.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/attackers-are-at-the-edge-and-theyre-bringing-their-ai/</loc><lastmod>2026-02-27T15:53:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/e13d0f90-7892-4f6d-8f84-50d2c2a611f1.png</image:loc><image:caption>e13d0f90-7892-4f6d-8f84-50d2c2a611f1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/how-anthropic-mcp-and-google-a2a-is-fueling-a-saas-market-collapse/</loc><lastmod>2026-02-26T14:25:26.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Media-Banner--1--1.png</image:loc><image:caption>Media-Banner--1--1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/making-the-blogger-list-with-bill-brenner/</loc><lastmod>2026-02-25T14:16:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Bill-Brenner_LinkedIn--3.png</image:loc><image:caption>Bill-Brenner_LinkedIn--3.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-the-editor-lessons-of-a-chatgpt-power-user/</loc><lastmod>2026-02-23T14:19:09.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/a5cd6a66-d8e9-4c02-89b5-79ad65adf046.png</image:loc><image:caption>a5cd6a66-d8e9-4c02-89b5-79ad65adf046.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-security-pros-dedicated-to-protecting-critical-infrastructure/</loc><lastmod>2026-02-23T14:15:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/9b749c69-e809-46e6-af88-49418c966328.png</image:loc><image:caption>9b749c69-e809-46e6-af88-49418c966328.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-saas-pocalypse-paradox-what-it-means-for-cisos-and-enterprise-security/</loc><lastmod>2026-02-20T22:11:37.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/dfc1aa4c-6279-4d21-999f-a917e805261d-1.png</image:loc><image:caption>dfc1aa4c-6279-4d21-999f-a917e805261d-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/slop-squatting-with-justin-hutch-hutchens/</loc><lastmod>2026-02-18T16:13:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Justin-Hutchens.png</image:loc><image:caption>Justin-Hutchens.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/graphalgo-north-korean-rock-salt-in-the-wound-of-todays-cybersecurity-job-market/</loc><lastmod>2026-02-17T15:41:40.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/082438c5-23e4-4e46-8071-63abd46a7636.png</image:loc><image:caption>082438c5-23e4-4e46-8071-63abd46a7636.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/stop-talking-about-threats-be-the-threat/</loc><lastmod>2026-02-17T15:22:00.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Trey-Bilbrey.png</image:loc><image:caption>Trey-Bilbrey.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/five-security-pros-dedicated-to-the-mental-health-of-cyber-defenders/</loc><lastmod>2026-02-13T14:30:55.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/4b14c4c9-5f02-4241-b6be-512219ed9717.png</image:loc><image:caption>4b14c4c9-5f02-4241-b6be-512219ed9717.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/white-house-readies-five-page-cybersecurity-strategy-built-on-offense-deterrence-and-deregulation/</loc><lastmod>2026-02-12T19:50:06.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1446776653964-20c1d3a81b06?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDI4fHxjeWJlcnNlY3VyaXR5fGVufDB8fHx8MTc3MDkyNDk3OHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:loc><image:caption>photo-1446776653964-20c1d3a81b06?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDI4fHxjeWJlcnNlY3VyaXR5fGVufDB8fHx8MTc3MDkyNDk3OHww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-notepad-to-epoch-theory-why-old-assumptions-are-failing-security-teams/</loc><lastmod>2026-02-12T14:20:13.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Media-Banner--1-.png</image:loc><image:caption>Media-Banner--1-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/unlocking-the-power-of-deception-technology-a-proactive-approach-to-defending-oil-and-gas-networks/</loc><lastmod>2026-02-10T15:53:01.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Patric-Dove.png</image:loc><image:caption>Patric-Dove.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/six-months-of-silence-how-a-hijacked-text-editor-exploited-structural-flaws-in-enterprise-security/</loc><lastmod>2026-02-06T17:35:37.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/ab3a9de9-c1be-461c-98ce-e51038dc5a52.png</image:loc><image:caption>ab3a9de9-c1be-461c-98ce-e51038dc5a52.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/a-new-followfriday-list-for-the-cybersecurity-community/</loc><lastmod>2026-02-06T14:06:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/fd832656-cb22-473c-9f49-0359dccd5fb6.png</image:loc><image:caption>fd832656-cb22-473c-9f49-0359dccd5fb6.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/epoch-theory-and-the-future-of-vulnerability-management/</loc><lastmod>2026-02-05T12:42:56.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/e6e43e13-2fce-442a-9543-415e215d0948.png</image:loc><image:caption>e6e43e13-2fce-442a-9543-415e215d0948.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-new-internet-with-jason-haddix/</loc><lastmod>2026-02-04T14:42:18.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Jason-Haddix.png</image:loc><image:caption>Jason-Haddix.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/webinar-replay-epoch-theory-of-cybersecurity-with-jeremiah-grossman/</loc><lastmod>2026-02-03T21:49:05.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/Ghost-Image.png</image:loc><image:caption>Ghost-Image.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-the-editor-a-refuge-from-the-sloppocalypse/</loc><lastmod>2026-02-02T22:20:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/5d3fee1e-8f00-46bf-92f8-b71c13ac9f7d-1-1.png</image:loc><image:caption>5d3fee1e-8f00-46bf-92f8-b71c13ac9f7d-1-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/injecting-automation-into-your-vulnerability-management-program/</loc><lastmod>2026-02-02T21:15:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/02/David-Busby.png</image:loc><image:caption>David-Busby.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-13/</loc><lastmod>2026-01-29T16:00:50.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Media-Banner--1-.png</image:loc><image:caption>Media-Banner--1-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-sec-cast-the-ot-sec-con-podcast-with-mike-holcomb/</loc><lastmod>2026-01-28T15:20:12.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Mike-Holcomb_LinkedIn-.png</image:loc><image:caption>Mike-Holcomb_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/too-many-cybersecurity-tools-how-to-declutter-through-platformization/</loc><lastmod>2026-01-27T16:31:03.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1582748298043-0c0d31aa506e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDM0fHx0ZWNoJTIwY2x1dHRlciUyMGhvcml6b250YWx8ZW58MHx8fHwxNzY3ODgwMDg0fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:loc><image:caption>photo-1582748298043-0c0d31aa506e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDM0fHx0ZWNoJTIwY2x1dHRlciUyMGhvcml6b250YWx8ZW58MHx8fHwxNzY3ODgwMDg0fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/how-gootloader-weaponizes-format-flaws-to-evade-detection/</loc><lastmod>2026-01-27T16:30:26.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fG1hbHdhcmV8ZW58MHx8fHwxNzY4OTE1OTg1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:loc><image:caption>photo-1678811326980-ea1b88cd9e8c?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fG1hbHdhcmV8ZW58MHx8fHwxNzY4OTE1OTg1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-the-editor-to-those-trapped-on-the-job-hunt-hamster-wheel/</loc><lastmod>2026-01-27T16:30:03.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/4bee9625-017d-485c-a908-f92255e09901.png</image:loc><image:caption>4bee9625-017d-485c-a908-f92255e09901.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-five-most-important-enacted-ai-regulations-affecting-us-and-european-organizations/</loc><lastmod>2026-01-27T16:29:27.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1744640326166-433469d102f2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDQyfHxBSXxlbnwwfHx8fDE3NjkzODEwNjF8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:loc><image:caption>photo-1744640326166-433469d102f2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDQyfHxBSXxlbnwwfHx8fDE3NjkzODEwNjF8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-dlp-security-to-securing-ai-rebooting-your-data-security-strategy/</loc><lastmod>2026-01-27T15:43:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Rick-Holland.png</image:loc><image:caption>Rick-Holland.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/project-d-a-r-w-i-n-can-bio-evolution-finally-solve-cybersecurity/</loc><lastmod>2026-01-23T16:12:37.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Clint-Bodungen.png</image:loc><image:caption>Clint-Bodungen.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/whose-line-is-it-anyway-with-dustin-wirefall-dykes/</loc><lastmod>2026-01-21T17:55:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Wirefall.png</image:loc><image:caption>Wirefall.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/preserving-hacker-history-with-emily-crose/</loc><lastmod>2026-01-21T02:26:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/07/Emily-Crose.jpg</image:loc><image:caption>Emily-Crose.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-12/</loc><lastmod>2026-01-15T16:00:02.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/battle-boards-and-cyber-war-rooms-bridging-public-safety-and-incident-response/</loc><lastmod>2026-01-14T18:06:55.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Kenneth-Lindbloom-1.png</image:loc><image:caption>Kenneth-Lindbloom-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-rise-of-the-security-enablement-function-a-model-for-partnering-with-the-business/</loc><lastmod>2026-01-14T18:06:40.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Stuart-Clark-and-Nicholas-McBride-2.png</image:loc><image:caption>Stuart-Clark-and-Nicholas-McBride-2.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/letter-from-the-new-editor-in-chief-of-cybr-sec-media/</loc><lastmod>2026-01-08T13:58:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/NoDoomsday.png</image:loc><image:caption>NoDoomsday.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-edge-ai-revolution-with-tommy-todd/</loc><lastmod>2026-01-07T12:00:03.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Tommy-Todd.png</image:loc><image:caption>Tommy-Todd.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-11/</loc><lastmod>2026-01-01T16:47:11.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/platform-power-achieving-better-cybersecurity-outcomes-through-smart-consolidation-and-ai/</loc><lastmod>2026-01-01T16:15:11.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Mark-Grassmann-and-Susan-Crowe.png</image:loc><image:caption>Mark-Grassmann-and-Susan-Crowe.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/zero-trust-terrain-and-holding-the-high-ground/</loc><lastmod>2026-01-01T15:52:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2026/01/Clint-Bruce-and-John-Kindervag.png</image:loc><image:caption>Clint-Bruce-and-John-Kindervag.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/combating-burnout-with-jessvin-thomas/</loc><lastmod>2025-12-31T12:00:13.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Jessvin-Thomas_LinkedIn-.png</image:loc><image:caption>Jessvin-Thomas_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/bbffs/</loc><lastmod>2025-12-24T15:13:51.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/BBFF-s.png</image:loc><image:caption>BBFF-s.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-10/</loc><lastmod>2025-12-18T16:00:04.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/ai-and-deepfakes-the-new-cyber-weapon/</loc><lastmod>2025-12-18T14:44:21.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Dr.-Joseph-Ponnoly.png</image:loc><image:caption>Dr.-Joseph-Ponnoly.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-hidden-cost-of-silence-why-info-sharing-fails-and-how-to-fix-it/</loc><lastmod>2025-12-18T14:32:27.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Sadie-Anne-Jones.png</image:loc><image:caption>Sadie-Anne-Jones.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/diving-pun-intended-into-scada-and-control-systems-with-randy-petersen/</loc><lastmod>2025-12-17T18:26:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Randy-Petersen_LinkedIn-.png</image:loc><image:caption>Randy-Petersen_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/crashing-cyber-marketing-con/</loc><lastmod>2025-12-10T13:01:43.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Cyber-Marketing-Con.png</image:loc><image:caption>Cyber-Marketing-Con.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-9/</loc><lastmod>2025-12-04T16:00:13.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/joining-cybersecurity-kicking-and-screaming-with-keith-turpin/</loc><lastmod>2025-12-03T15:20:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/12/Keith-Turpin_LinkedIn-.png</image:loc><image:caption>Keith-Turpin_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/taming-the-hydra-managing-security-tool-sprawl-through-strategic-governance/</loc><lastmod>2025-12-01T00:02:33.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Jim-Nitterauer.png</image:loc><image:caption>Jim-Nitterauer.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-bff-redundancy/</loc><lastmod>2025-11-26T12:52:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Phillip-Wylie.png</image:loc><image:caption>Phillip-Wylie.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/enhancing-cybersecurity-awareness-through-education-outreach/</loc><lastmod>2025-11-25T02:44:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Mayra-Foose-and-Maggie-Torres.png</image:loc><image:caption>Mayra-Foose-and-Maggie-Torres.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/logs-lifebood-or-biggest-problem/</loc><lastmod>2025-11-21T14:44:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/James-Cabe.png</image:loc><image:caption>James-Cabe.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-8/</loc><lastmod>2025-11-20T16:00:06.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/sectoprat-arechclient2-the-latest-on-this-popular-malware-family/</loc><lastmod>2025-11-19T22:40:18.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Michael-Gough.png</image:loc><image:caption>Michael-Gough.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/midlife-crisis-shift-with-haylie-treas/</loc><lastmod>2025-11-19T14:22:59.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Haylie-Treas_LinkedIn-.png</image:loc><image:caption>Haylie-Treas_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/what-could-possibly-go-wrong-from-the-lawyer-and-technologist-perspectives/</loc><lastmod>2025-11-19T12:56:20.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Haylie--Bart--Chris.png</image:loc><image:caption>Haylie--Bart--Chris.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/killer-context-how-ai-will-eat-security-and-software/</loc><lastmod>2025-11-13T16:23:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Daniel-Messier.png</image:loc><image:caption>Daniel-Messier.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/special-episode-cybr-hak-cast/</loc><lastmod>2025-11-12T15:56:20.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Len-Noe-Cover.png</image:loc><image:caption>Len-Noe-Cover.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ai-for-offensive-security-beyond-fuzzing-and-scanning/</loc><lastmod>2025-11-06T16:11:29.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/Daniel-Marques.png</image:loc><image:caption>Daniel-Marques.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/pen-testing-for-ai-created-apps-updating-your-testing-approach/</loc><lastmod>2025-11-03T02:42:39.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/11/John-B.-Dickson.png</image:loc><image:caption>John-B.-Dickson.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/mentorship-in-action-real-stories-from-the-cybersecurity-field/</loc><lastmod>2025-10-30T14:40:00.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Mentorship-Panel.png</image:loc><image:caption>Mentorship-Panel.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/stop-writing-crap-detections-with-page-glave/</loc><lastmod>2025-10-29T16:28:08.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Page-Glave_LinkedIn-.png</image:loc><image:caption>Page-Glave_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/go-hack-yourself-with-nodezero/</loc><lastmod>2025-10-28T01:05:24.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Snehal-Antani.png</image:loc><image:caption>Snehal-Antani.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/what-it-really-takes-to-build-an-ai-enabled-soc/</loc><lastmod>2025-10-27T14:43:43.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Stephen-Morrow.png</image:loc><image:caption>Stephen-Morrow.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/at-the-risk-of-cvss/</loc><lastmod>2025-10-24T14:44:55.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Robert-Hansen.png</image:loc><image:caption>Robert-Hansen.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-dumpster-fire-to-detection/</loc><lastmod>2025-10-21T21:14:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Page-Glave-1.png</image:loc><image:caption>Page-Glave-1.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/failure-to-accelerate/</loc><lastmod>2025-10-21T14:45:39.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Vivek-Ponnada.png</image:loc><image:caption>Vivek-Ponnada.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/catching-the-cybersecurity-marketing-bug-with-gianna-whitver-and-maria-velasquez/</loc><lastmod>2025-10-14T21:10:07.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/Gianna-and-Maria.png</image:loc><image:caption>Gianna-and-Maria.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/download-the-ebook-launching-and-sustaining-a-cybersecurity-career-in-2025/</loc><lastmod>2025-10-07T14:33:48.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/the-big-update-episode/</loc><lastmod>2025-10-01T11:22:25.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/10/The-Big-Update_LinkedIn-.png</image:loc><image:caption>The-Big-Update_LinkedIn-.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/saving-sara-with-mayra-foose-and-maggie-torres/</loc><lastmod>2025-09-24T02:33:23.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/09/Mayra-and-Maggie.png</image:loc><image:caption>Mayra-and-Maggie.png</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-7/</loc><lastmod>2025-09-11T15:00:57.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/its-not-magic-its-just-ai-with-daniel-miessler/</loc><lastmod>2025-09-10T13:35:35.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/09/Daniel-Miessler_LinkedIn-.jpg</image:loc><image:caption>Daniel-Miessler_LinkedIn-.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/a-cisos-first-principal-analysis-of-incentive-alignment/</loc><lastmod>2025-09-09T15:38:07.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/09/Trey-Ford-2.jpg</image:loc><image:caption>Trey-Ford-2.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/recovering-from-disaster-recovery/</loc><lastmod>2025-08-29T16:45:16.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/John-Podolanko.jpg</image:loc><image:caption>John-Podolanko.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-6/</loc><lastmod>2025-08-28T15:03:30.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/get-in-loser-were-going-to-shmoocon-with-matt-johansen/</loc><lastmod>2025-08-27T22:54:51.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Matt-Johansen.jpg</image:loc><image:caption>Matt-Johansen.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-4/</loc><lastmod>2025-08-27T22:40:01.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/the-leap-of-faith-leading-with-empathy-in-the-age-of-ai/</loc><lastmod>2025-08-27T15:03:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Karen-Worstell.jpg</image:loc><image:caption>Karen-Worstell.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/marketing-hype-to-real-security-validating-controls-through-offensive-security-testing/</loc><lastmod>2025-08-27T14:37:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Darin-Fredde.jpg</image:loc><image:caption>Darin-Fredde.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/a-intelligence-driven-defensible-architecture-process-case-study-volt-typhoon/</loc><lastmod>2025-08-27T14:37:15.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Markus-Mueller.jpg</image:loc><image:caption>Markus-Mueller.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/zombies-in-your-pipeline/</loc><lastmod>2025-08-27T14:36:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Andy-Lewis.jpg</image:loc><image:caption>Andy-Lewis.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/why-i-shouldnt-be-speaking-today/</loc><lastmod>2025-08-27T14:36:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Kenneth-Diaz-1.jpg</image:loc><image:caption>Kenneth-Diaz-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/zero-trust-in-aws-securing-your-cloud-environment/</loc><lastmod>2025-08-27T14:36:21.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Ivonne-Fernandez-1.jpg</image:loc><image:caption>Ivonne-Fernandez-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/stopping-session-theft-your-mfa-is-futile-if-i-have-your-cookie/</loc><lastmod>2025-08-27T14:24:22.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Anthony-Castano.jpg</image:loc><image:caption>Anthony-Castano.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ai-panel-at-exec-sec-con-2025/</loc><lastmod>2025-08-19T14:47:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/ESC-AI-Panel.jpg</image:loc><image:caption>ESC-AI-Panel.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/watching-each-others-backs-with-sean-jones-kaloyan-ivanov/</loc><lastmod>2025-08-13T02:31:52.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Sean-Jones-and-Kaloyan-Ivanov.jpg</image:loc><image:caption>Sean-Jones-and-Kaloyan-Ivanov.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/introduction-to-wifi-security/</loc><lastmod>2025-08-07T04:34:14.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/08/Lennart-Koopmann.jpg</image:loc><image:caption>Lennart-Koopmann.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-3/</loc><lastmod>2025-07-31T14:56:26.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/dad-jokes-with-doug-landoll/</loc><lastmod>2025-07-23T13:56:13.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/07/Doug-Landoll.jpg</image:loc><image:caption>Doug-Landoll.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-2/</loc><lastmod>2025-07-17T15:19:07.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/when-priorities-collide-cio-and-ciso-relationship-dynamics/</loc><lastmod>2025-07-16T23:33:07.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/07/Scott-Howitt.jpg</image:loc><image:caption>Scott-Howitt.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/leveraging-advanced-cyber-threat-intelligence-for-proactive-defense-a-case-study/</loc><lastmod>2025-07-09T19:10:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/07/Michael-Angelo-Zummo-and-Bryan-Perkola.jpg</image:loc><image:caption>Michael-Angelo-Zummo-and-Bryan-Perkola.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup/</loc><lastmod>2025-07-03T15:07:33.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/it-sucks-to-be-first-with-robert-hansen/</loc><lastmod>2025-07-02T13:49:36.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Robert-Hansen.jpg</image:loc><image:caption>Robert-Hansen.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-quantum-apocalypse-a-looming-threat-the-need-for-post-quantum-encryption/</loc><lastmod>2025-06-30T15:54:15.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Tommy-Todd-2.jpg</image:loc><image:caption>Tommy-Todd-2.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/bridging-the-it-ot-divide-securing-the-future-of-industrial-cybersecurity/</loc><lastmod>2025-06-26T14:33:22.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Kevin-and-Joe.jpg</image:loc><image:caption>Kevin-and-Joe.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/penetration-testing-case-study/</loc><lastmod>2025-06-26T14:30:20.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Damon-Small.jpg</image:loc><image:caption>Damon-Small.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-never-ending-cat-and-mouse-game-with-dmitri-alperovitch/</loc><lastmod>2025-06-25T11:46:34.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dmitri-Alperovitch.jpg</image:loc><image:caption>Dmitri-Alperovitch.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cybr-sec-media-biweekly-roundup-6-19-25/</loc><lastmod>2025-06-19T19:01:31.000Z</lastmod></url><url><loc>https://cybrsecmediatest.ghost.io/ai-malware-threat-justin-hutchens-hou-sec-con-2024/</loc><lastmod>2025-06-19T14:44:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Hutch-2-1.jpg</image:loc><image:caption>Hutch-2-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/hou-sec-con-2023-closing-keynote/</loc><lastmod>2025-06-11T23:27:26.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dave-Lewis_HSC-2023.jpg</image:loc><image:caption>Dave-Lewis_HSC-2023.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/chasing-entropy-lessons-learned-falling-on-swords/</loc><lastmod>2025-06-11T23:10:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dave-Lewis_HSC-2024.jpg</image:loc><image:caption>Dave-Lewis_HSC-2024.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/forcing-innovation-with-jeremiah-grossman/</loc><lastmod>2025-06-11T11:37:27.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Jeremiah-Grossman.jpg</image:loc><image:caption>Jeremiah-Grossman.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-security-with-watch-mr-wizard-star-sean-curry/</loc><lastmod>2025-06-03T14:01:52.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Sean-Curry.jpg</image:loc><image:caption>Sean-Curry.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/attack-surface-all-the-way-down-an-attackers-perspective-on-ot-environments/</loc><lastmod>2025-06-02T21:11:45.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Ray-Blasko.jpg</image:loc><image:caption>Ray-Blasko.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/cyber-risk-quantification-protecting-critical-infrastructure-from-cyber-sabotage/</loc><lastmod>2025-06-02T20:48:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Shane-Williams-2.jpg</image:loc><image:caption>Shane-Williams-2.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ciso-series-podcast-live-at-hou-sec-con-2024/</loc><lastmod>2025-06-02T20:32:09.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/05/Media-Video-Tile.jpg</image:loc><image:caption>Media-Video-Tile.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/enhancing-operational-technology-cybersecurity-using-modeling-and-simulation/</loc><lastmod>2025-06-02T20:12:11.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Titus-Gray-and-Lee-Maccarone.jpg</image:loc><image:caption>Titus-Gray-and-Lee-Maccarone.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/predicting-the-future-of-malware-with-dr-marcus-botacin-2/</loc><lastmod>2025-06-01T23:48:33.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Marcus-Botacin.jpg</image:loc><image:caption>Marcus-Botacin.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/all-about-youth-sec-con/</loc><lastmod>2025-06-01T23:42:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/YOUTH.SEC.CON..jpg</image:loc><image:caption>YOUTH.SEC.CON..jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/definitions-of-pen-testing-with-darin-fredde/</loc><lastmod>2025-06-01T23:35:49.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Darin-Fredde-2.jpg</image:loc><image:caption>Darin-Fredde-2.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/appsec-fish-in-a-barrel-with-steven-schmidt/</loc><lastmod>2025-06-01T23:27:53.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Steven-Schmidt.jpg</image:loc><image:caption>Steven-Schmidt.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/network-monitoring-in-ot-ics-environments-with-stuart-bailey/</loc><lastmod>2025-06-01T23:21:10.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Stuart-Bailey.jpg</image:loc><image:caption>Stuart-Bailey.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/defending-farmville-with-trey-ford/</loc><lastmod>2025-06-01T23:15:47.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Trey-Ford.jpg</image:loc><image:caption>Trey-Ford.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/special-special-special-guest-marco-ayala/</loc><lastmod>2025-06-01T23:08:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Marco-Ayala.jpg</image:loc><image:caption>Marco-Ayala.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/hipaa-with-two-as-with-stephen-alexander/</loc><lastmod>2025-06-01T23:02:46.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Stephen-Alexander.jpg</image:loc><image:caption>Stephen-Alexander.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/taupe-hat-hacking-with-len-noe/</loc><lastmod>2025-06-01T22:56:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Len-Noe.jpg</image:loc><image:caption>Len-Noe.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/final-episode-of-2024/</loc><lastmod>2025-06-01T22:49:25.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Final-Episode-of-2024.jpg</image:loc><image:caption>Final-Episode-of-2024.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/easy-pickins-with-dawn-cappelli/</loc><lastmod>2025-06-01T22:44:22.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dawn-Cappelli.jpg</image:loc><image:caption>Dawn-Cappelli.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/kids-these-days-with-jason-haddix/</loc><lastmod>2025-06-01T22:38:05.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Jason-Haddix.jpg</image:loc><image:caption>Jason-Haddix.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/sprinting-ahead-of-quantum-computing-with-marian-zaki/</loc><lastmod>2025-06-01T22:31:10.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Marian-Zaki.jpg</image:loc><image:caption>Marian-Zaki.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/releasing-angry-pixies-with-dennis-maldonado/</loc><lastmod>2025-06-01T22:26:03.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dennis-Maldonado-.jpg</image:loc><image:caption>Dennis-Maldonado-.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/the-honeymoon-is-over-with-dd-budiharto/</loc><lastmod>2025-06-01T22:25:10.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dd-Budiharto.jpg</image:loc><image:caption>Dd-Budiharto.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/101-definitions-of-cybersecurity-with-gene-spafford/</loc><lastmod>2025-06-01T22:01:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Gene-Spafford.jpg</image:loc><image:caption>Gene-Spafford.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/learn-something-new-today-with-andy-ellis/</loc><lastmod>2025-06-01T21:55:15.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Andy-Ellis.jpg</image:loc><image:caption>Andy-Ellis.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/protecting-the-cheese-and-chocolate-with-john-kindervag/</loc><lastmod>2025-06-01T21:49:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/John-Kindervag.jpg</image:loc><image:caption>John-Kindervag.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/shifting-left-with-christopher-pope/</loc><lastmod>2025-06-01T21:42:32.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Christopher-Pope-3.jpg</image:loc><image:caption>Christopher-Pope-3.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/h-town-skills-with-samir-saber/</loc><lastmod>2025-06-01T21:33:28.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Samir-Saber.jpg</image:loc><image:caption>Samir-Saber.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/play-stations-for-the-people-with-dr-branden-williams/</loc><lastmod>2025-06-01T21:24:13.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Branden-Williams.jpg</image:loc><image:caption>Branden-Williams.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/visiting-the-old-folks-home-with-mak-foss-and-rachel-schwalk/</loc><lastmod>2025-06-01T21:23:59.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Mak-and-Rachel-2.jpg</image:loc><image:caption>Mak-and-Rachel-2.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/robbing-banks-with-david-balcar/</loc><lastmod>2025-06-01T21:23:44.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/David-Balcar.jpg</image:loc><image:caption>David-Balcar.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/community-building-with-roya-gordon/</loc><lastmod>2025-06-01T21:23:29.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Roya-Gordon.jpg</image:loc><image:caption>Roya-Gordon.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/behind-the-scenes-with-lauren-andrus/</loc><lastmod>2025-06-01T21:23:12.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Lauren-Andrus.jpg</image:loc><image:caption>Lauren-Andrus.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/securing-the-next-generation-with-arthi-vasudevan/</loc><lastmod>2025-06-01T21:22:58.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Arthi-Vasudaven.jpg</image:loc><image:caption>Arthi-Vasudaven.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/exec-sec-con-with-marc-crudgington-and-kyle-lai/</loc><lastmod>2025-06-01T21:22:42.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Marc-and-Kyle.jpg</image:loc><image:caption>Marc-and-Kyle.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/coffee-beaver-nuggets-and-threat-hunting-with-dan-gunter/</loc><lastmod>2025-06-01T21:22:30.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dan-Gunter.jpg</image:loc><image:caption>Dan-Gunter.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/world-peace-still-requires-changing-default-passwords-with-marty-edwards/</loc><lastmod>2025-06-01T21:22:05.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Marty-Edwards-1.jpg</image:loc><image:caption>Marty-Edwards-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/ot-or-it-with-consequences-with-john-burns/</loc><lastmod>2025-06-01T21:21:51.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/John-Burns-1.jpg</image:loc><image:caption>John-Burns-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/secure-by-design-vs-cyber-informed-engineering-with-tony-turner/</loc><lastmod>2025-06-01T21:21:38.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Tony-Turner-1.jpg</image:loc><image:caption>Tony-Turner-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/posture-management-enabled-by-modern-api-extensibility/</loc><lastmod>2025-06-01T21:21:20.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/HSC-2023---2-1.jpg</image:loc><image:caption>HSC-2023---2-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/garbage-in-garbage-out-from-ai/</loc><lastmod>2025-06-01T21:21:04.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/HSC-2023---1-1.jpg</image:loc><image:caption>HSC-2023---1-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/hou-sec-con-part-2-with-thomas-pace/</loc><lastmod>2025-06-01T21:20:52.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Thomas-Pace-1.jpg</image:loc><image:caption>Thomas-Pace-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/researching-ai-before-it-was-cool-with-justin-hutch-hutchins/</loc><lastmod>2025-06-01T21:20:09.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Hutch-1.jpg</image:loc><image:caption>Hutch-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/on-tape-with-rick-holland/</loc><lastmod>2025-06-01T21:19:57.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Rick-Holland-1.jpg</image:loc><image:caption>Rick-Holland-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/from-california-to-texas-a-cybersecurity-startup-story-with-chad-spensky/</loc><lastmod>2025-06-01T21:19:45.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Chad-Spensky-1.jpg</image:loc><image:caption>Chad-Spensky-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/failing-forward-with-dave-lewis/</loc><lastmod>2025-06-01T21:19:31.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Dave-Lewis-1.jpg</image:loc><image:caption>Dave-Lewis-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/generative-ai-with-mark-weatherford/</loc><lastmod>2025-06-01T21:19:18.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Mark-Weatherford-1.jpg</image:loc><image:caption>Mark-Weatherford-1.jpg</image:caption></image:image></url><url><loc>https://cybrsecmediatest.ghost.io/offensive-security-for-all-with-phillip-wylie/</loc><lastmod>2025-06-01T21:19:03.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/f4/2b/f42be49c-6174-44b7-aec6-57a7762a799e/content/images/2025/06/Phillip-Wylie.jpg</image:loc><image:caption>Phillip-Wylie.jpg</image:caption></image:image></url></urlset>