<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.resilientcyber.io/archive</loc><changefreq>daily</changefreq></url><url><loc>https://www.resilientcyber.io/about</loc><changefreq>weekly</changefreq></url><url><loc>https://www.resilientcyber.io/podcast</loc><changefreq>weekly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-91</loc><lastmod>2026-04-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/what-450000-hours-of-incident-response</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-human-in-the-loop-illusion</loc><lastmod>2026-03-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/agents-in-action-what-177000-tools</loc><lastmod>2026-03-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-90</loc><lastmod>2026-03-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/m-trends-2026-what-450000-hours-of</loc><lastmod>2026-03-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/aiuc-1-the-standard-agentic-ai-has</loc><lastmod>2026-03-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-89</loc><lastmod>2026-03-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-new-offense-how-ai-agents-are</loc><lastmod>2026-03-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-350-million-problem-securing</loc><lastmod>2026-03-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/security-in-the-middle</loc><lastmod>2026-03-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-88</loc><lastmod>2026-03-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/before-the-breach-the-zero-day-clock</loc><lastmod>2026-03-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/trumps-national-cyber-strategy-ai</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-87</loc><lastmod>2026-03-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-zero-day-clock-is-ticking-why</loc><lastmod>2026-03-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/claude-code-security-a-reasoned-take</loc><lastmod>2026-03-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-sandbox-everyone-suddenly-needs</loc><lastmod>2026-03-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-86</loc><lastmod>2026-02-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-data-centric-approach-to-securing</loc><lastmod>2026-02-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-compliance-revolution-is-here</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/securing-the-future-with-autonomous</loc><lastmod>2026-02-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/when-the-frontier-labs-sneeze-the</loc><lastmod>2026-02-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/governing-agentic-ai-a-practical</loc><lastmod>2026-02-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-85</loc><lastmod>2026-02-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/selling-cyber-deal-flow-and-market</loc><lastmod>2026-02-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/exploiting-ai-ides</loc><lastmod>2026-02-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-84</loc><lastmod>2026-02-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/ai-is-ready-for-production-security</loc><lastmod>2026-02-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-agentic-ai-governance-blind-spot</loc><lastmod>2026-02-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/hacking-the-openclaw-hype</loc><lastmod>2026-02-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/its-never-too-late-to-hack-your-career</loc><lastmod>2026-02-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-83</loc><lastmod>2026-02-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-zero-trust-centric-approach-to</loc><lastmod>2026-02-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/capital-competition-and-cybersecurity</loc><lastmod>2026-01-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-82</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/secure-by-design-goes-prime-time</loc><lastmod>2026-01-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-anshuman-bhartiya</loc><lastmod>2026-01-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-81</loc><lastmod>2026-01-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-80</loc><lastmod>2026-01-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/appsecs-runtime-revolution</loc><lastmod>2026-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jerry-gamblin-cve</loc><lastmod>2026-01-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-79</loc><lastmod>2026-01-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-78</loc><lastmod>2026-01-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-77</loc><lastmod>2025-12-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/2025-ai-security-rewind</loc><lastmod>2025-12-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/2025-cybersecurity-macroeconomic</loc><lastmod>2025-12-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-76</loc><lastmod>2025-12-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-wins-media-creator</loc><lastmod>2025-12-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/fixing-the-broken-vulnerability-management</loc><lastmod>2025-12-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/owasp-top-10-for-agentic-applications</loc><lastmod>2025-12-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-75</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/elevating-ctem-with-agentic-exposure</loc><lastmod>2025-12-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/innovating-cybersecurity-investigations</loc><lastmod>2025-11-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/state-of-ai-in-secops-2025</loc><lastmod>2025-11-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-kayne-mcgladrey</loc><lastmod>2025-11-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-74</loc><lastmod>2025-11-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-security-challenges-of-post-quantum</loc><lastmod>2025-12-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/exposure-management-metrics</loc><lastmod>2025-11-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-henrik-and-amod</loc><lastmod>2025-11-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-73</loc><lastmod>2025-11-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-evolution-of-appsec-from-shifting</loc><lastmod>2025-11-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-kamal-shah-the</loc><lastmod>2025-11-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jeff-and-naomi</loc><lastmod>2025-11-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-owasp-top-10-gets-modernized</loc><lastmod>2025-11-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/beyond-the-hype-of-ai-agents-in-the</loc><lastmod>2025-11-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-72</loc><lastmod>2025-11-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-dependency-dilemmas-in-the</loc><lastmod>2025-11-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-ross-young-mastering</loc><lastmod>2025-11-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-71</loc><lastmod>2025-10-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/ais-intersection-with-trust</loc><lastmod>2025-10-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-rise-of-the-enterprise-browser</loc><lastmod>2025-10-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-70</loc><lastmod>2025-10-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/identity-threat-detection-and-response</loc><lastmod>2025-10-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-69</loc><lastmod>2025-10-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-mitch-herckis-securing</loc><lastmod>2025-10-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vulnerability-management-evolves</loc><lastmod>2025-10-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-68</loc><lastmod>2025-10-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-kenny-scott-following</loc><lastmod>2025-10-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-snehal-antani-ai</loc><lastmod>2025-10-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-67</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/sans-difference-makers-awards</loc><lastmod>2025-10-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-security-vibe-check</loc><lastmod>2025-09-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-alon-jackson-enterprise</loc><lastmod>2025-09-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-66</loc><lastmod>2025-09-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-emre-tinaztepe</loc><lastmod>2025-09-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-65</loc><lastmod>2025-09-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-andy-ellis-effective</loc><lastmod>2025-09-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-64</loc><lastmod>2025-09-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-cory-michal-appomni</loc><lastmod>2025-09-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/critical-ai-security-guidelines</loc><lastmod>2025-09-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-rob-t-lee-navigating</loc><lastmod>2025-09-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-63</loc><lastmod>2025-09-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-62</loc><lastmod>2025-08-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-gianna-and-maria</loc><lastmod>2025-08-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-michael-bargury</loc><lastmod>2025-12-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-61</loc><lastmod>2025-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-andrew-carney-darpa</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-60</loc><lastmod>2025-08-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/operation-frostbyte-snowflake-goat</loc><lastmod>2025-08-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-59</loc><lastmod>2025-08-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/ai-adoption-seatbelts-air-bags-and</loc><lastmod>2025-08-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-sid-trivedi-black</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/fast-and-flawed</loc><lastmod>2025-08-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-58</loc><lastmod>2025-07-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/ai-incentives-economics-technology</loc><lastmod>2025-07-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-christian-posta</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-57</loc><lastmod>2025-07-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-daniel-bardenstein</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-56</loc><lastmod>2025-07-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-ed-sim-the-intersection</loc><lastmod>2025-07-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/entering-the-ai-controls-matrix</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jim-manico-enhancing</loc><lastmod>2025-07-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-55</loc><lastmod>2025-07-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-54</loc><lastmod>2025-07-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-aj-yawn-transforming</loc><lastmod>2025-06-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-53</loc><lastmod>2025-06-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-patrick-duffy-securing</loc><lastmod>2025-06-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cve-cost-conundrums</loc><lastmod>2025-12-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-james-berthoty</loc><lastmod>2025-06-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-52</loc><lastmod>2025-06-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-wade-baker-data</loc><lastmod>2025-06-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-51</loc><lastmod>2025-06-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-50</loc><lastmod>2025-06-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-bob-ritchie-securing</loc><lastmod>2025-06-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-49</loc><lastmod>2025-05-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-phil-venables-security</loc><lastmod>2025-05-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-48</loc><lastmod>2025-06-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-vineeth-sai-narajala</loc><lastmod>2025-05-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/quantifying-ais-impact-on-data-risk</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jay-jacobs-and</loc><lastmod>2025-05-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-47</loc><lastmod>2025-05-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/orchestrating-agentic-ai-securely</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-andy-cao-vulnerability</loc><lastmod>2025-05-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-46</loc><lastmod>2025-05-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/buckle-up-for-the-dods-software-fast</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vulnerability-velocity-and-exploitation</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-45</loc><lastmod>2025-05-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-daniel-miessler</loc><lastmod>2025-04-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-44</loc><lastmod>2025-04-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/securitys-ai-driven-dilemma</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-state-of-trust</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-43</loc><lastmod>2025-04-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-ravid-circus-tackling</loc><lastmod>2025-04-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-varun-badhwar-ai</loc><lastmod>2025-04-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/agentic-ai-threats-and-mitigations</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-42</loc><lastmod>2025-04-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jit-agentic-ai</loc><lastmod>2025-04-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/grc-is-ripe-for-a-revolution</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-41</loc><lastmod>2025-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-elad-schulman-secure</loc><lastmod>2025-03-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/context-is-king-but-prioritization</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-piyush-sharrma</loc><lastmod>2025-03-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-40</loc><lastmod>2025-04-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vibe-coding-conundrums</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-sergej-epp-cloud</loc><lastmod>2025-03-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-39</loc><lastmod>2025-04-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cybers-collection-of-ai</loc><lastmod>2025-03-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/diving-into-reversinglabs-2025-software</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-chenxi-wang-the</loc><lastmod>2025-03-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-38</loc><lastmod>2025-03-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/so-you-want-to-write-a-cybersecurity</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-2025-open-source-security-landscape</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-lior-div-and-nate</loc><lastmod>2025-03-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-37</loc><lastmod>2025-03-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/secure-by-design-delusions</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-rob-shavell-personal</loc><lastmod>2025-02-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-36</loc><lastmod>2025-02-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/implementing-genai-red-teaming-the</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-steve-martano-cisos</loc><lastmod>2025-02-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-35</loc><lastmod>2025-02-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-katie-norton-appsec</loc><lastmod>2025-02-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/ai-vendor-transparency-understanding</loc><lastmod>2025-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-34</loc><lastmod>2025-02-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-mike-privette-2024</loc><lastmod>2025-02-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-33</loc><lastmod>2025-02-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-evolving-grc-landscape</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-sounil-yu-the-intersection</loc><lastmod>2025-01-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-32</loc><lastmod>2025-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-grant-oviatt-transforming</loc><lastmod>2025-01-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-31</loc><lastmod>2025-01-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-rajan-kapoor-native</loc><lastmod>2025-01-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-30</loc><lastmod>2025-01-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/owasp-nhi-top-10</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-greg-martin-agentic</loc><lastmod>2025-01-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-29</loc><lastmod>2025-01-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/elephant-in-the-room-your-security</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-28</loc><lastmod>2024-12-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-mick-leach-5-email</loc><lastmod>2024-12-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-26-517</loc><lastmod>2024-12-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/prevention-is-ideal-but-detection</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-heidi-trost-human</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-filip-stojkovski</loc><lastmod>2024-12-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-26</loc><lastmod>2024-12-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/agentic-ais-intersection-with-cybersecurity</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-25</loc><lastmod>2024-12-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/invite-your-friends-to-read-resilient</loc><lastmod>2024-12-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-24</loc><lastmod>2024-11-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-walter-haydock</loc><lastmod>2024-11-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-23</loc><lastmod>2024-11-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-jim-dempsey-navigating</loc><lastmod>2024-11-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/2024-state-of-the-software-supply</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-22</loc><lastmod>2024-11-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-21</loc><lastmod>2024-11-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-tyler-shields-and</loc><lastmod>2024-11-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-20</loc><lastmod>2024-10-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/shift-left-is-starting-to-rust</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-wendy-nather-and</loc><lastmod>2024-10-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-19</loc><lastmod>2024-10-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/compliance-does-equal-security-just</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-shyam-sankar-the</loc><lastmod>2024-10-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-mark-simos-cybersecurity</loc><lastmod>2024-10-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-18</loc><lastmod>2024-10-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/state-of-dependency-management-2024</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-17</loc><lastmod>2024-10-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/secure-by-design-vs-secure-by-default</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-helen-oakley-exploring</loc><lastmod>2024-09-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-15</loc><lastmod>2024-09-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-14</loc><lastmod>2024-09-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cybersecurity-workforce-woes</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-ross-young-how</loc><lastmod>2024-09-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-state-of-non-human-identity-nhi</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-13</loc><lastmod>2024-09-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-christina-liaghati</loc><lastmod>2024-09-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/navigating-ai-risks-with-atlas</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-12</loc><lastmod>2024-09-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cybersecuritys-delusion-problem</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-steve-wilson-securing</loc><lastmod>2024-08-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-11</loc><lastmod>2024-08-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-snehal-antani-building</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/how-adr-addresses-gaps-in-the-detection</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-10</loc><lastmod>2024-08-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-chloe-messdaghi</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-rob-allen-endpoint</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/softwares-iron-triangle-cheap-fast</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-9</loc><lastmod>2024-08-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-8</loc><lastmod>2024-08-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-michael-silva-securing</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vulnerability-exploitation-in-the</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/sponsorships</loc><lastmod>2026-03-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-7</loc><lastmod>2024-08-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/systemic-concentrated-cyber-risks</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-travis-mcpeak-securing</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/3-key-areas-for-mitigating-non-human</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-6</loc><lastmod>2024-07-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-stuart-mitchell</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-5</loc><lastmod>2024-07-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-4</loc><lastmod>2024-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e22-daniel-shechter-application</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-3</loc><lastmod>2024-07-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-2</loc><lastmod>2024-06-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-newsletter-1</loc><lastmod>2024-06-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e21-christopher-kern-dissecting</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e20-joe-mccaffrey-securing-the</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e19-madison-oliver-open-source</loc><lastmod>2024-08-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/bringing-security-out-of-the-shadows</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/what-are-non-human-identities-and</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/public-sector-compliance-conundrums</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e16-alon-schindel-cloud-threats</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-digital-scouts-honor</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-dbir-is-entering-its-vulnerability</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e15-john-hammond-cybersecurity</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-georgianna-shea</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-rise-of-application-security</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/open-source-security-landscape-2024</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/you-cant-teach-someone-to-swim-when</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e13-bryson-bort-cybersecurity-and</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/leveraging-an-ai-security-framework</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e12-matt-nelson-and-david-cantrell</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e11-josh-bressers-and-dan-lorenc</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e10-adam-bateman-securing-the-modern</loc><lastmod>2024-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e9-joanna-mcdaniel-burkey-from</loc><lastmod>2024-03-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cisa-secure-software-development</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/death-knell-of-the-nvd</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/owasp-llm-ai-cybersecurity-and-governance</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e8-erez-yalon-appsec-supply-chain</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-look-at-the-uks-national-cyber</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e7-chinmayi-sharma-and-jim-dempsey</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/nists-strategies-for-integration</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-liability-safe-harbor-and</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e6-crystal-poenisch-cybersecurity</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e5-jeevan-singh-scaling-application</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/us-cyber-trust-mark-cybersecurity</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-joe-lewis-a-year</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e3-ross-haleliuk-cyber-for-builders</loc><lastmod>2024-01-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-die-triad-applied-to-your-career</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e2-jacob-horne-171-cmmc-and-the</loc><lastmod>2024-01-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/digging-into-the-owasp-ai-exchange</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s6e1-rob-van-der-veer-navigating</loc><lastmod>2024-01-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-kevin-green</loc><lastmod>2023-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/sitting-on-a-haystack-of-digital</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/sbom-management</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e8-jake-meloche-of-aqua-security</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/managing-open-source-and-sboms</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/whats-in-a-name</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cisa-and-ncscs-take-on-secure-ai</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/securing-your-software-supply-chain</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-w-kelly-shortridge</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-s5e7-darwin-salazar</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/not-all-boms-are-created-equal</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/modernizing-fedramp</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/secure-by-design-and-demand</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e6-allie-mellen-secops-detection</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e5-greg-rasner-zero-trust-and-third</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/top-10-cybersecurity-misconfigurations</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e4-jonathan-rau-the-modern-security</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-supply-chain-security-in</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-season-5-e3-patrick</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e2-scott-piper-modern-cloud-security</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s5e1-resilient-cyber-w-amit-elazari</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/what-vulnerabilities-were-malicious</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e24-michael-mclaughlin-and-bill</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-look-at-the-exploit-prediction</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/false-dichotomies-and-overemphasizing</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/striving-towards-an-implementing</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/defending-cicd-environments-the-nsacisa</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e22-omkhar-arasaratnam-oss-and</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e22-jerry-gambling-the-evolving</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-secure-software-self-attestation</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e21-kelly-shortridge-security-chaos</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cloud-compliance-at-the-speed-of</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e20-luke-hinds-and-craig-mcluckie</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/going-down-with-the-ship</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-transparency</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e19-mark-montgomery-securing-the</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/risk-tolerance-and-raising-the-technical</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e18-joseph-lewis-cybersecurity</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e17-yotam-perkal-vulnerability</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-illusion-of-security-and-safety</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/security-throwing-toil-over-the-fence</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e16-alfredo-hickman-saas-security</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/sign-here-on-the-dotted-line</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cybersecurity-first-principles-and</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e15-tom-pace-firmware-iot-and-cyber</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e14-josh-reiter-us-navy-workforce</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-elusive-built-in-not-bolted-on</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e13-chris-kulakowski-threat-hunting</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/breaking-down-the-dod-software-modernization-df0</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/building-a-compliance-and-appsec</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/youre-vulnerable-and-malicious-actors</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e12-kristin-saling-us-army-workforce</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/april-event-round-up-and-public-speaking</loc><lastmod>2023-04-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vulnerability-management-and-developer</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e10-lily-zeleke-dod-cloud-and-software</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cloud-shared-responsibility-model</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-show-w-day-johnson</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/top-10-oss-risks</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e8-jim-dempsey-cyber-policy-and</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e7jeff-williams-devsecops-and-application</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-combined-power-of-sast-and-threat</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/2023-national-cybersecurity-strategy</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-supply-chain-attack-types-088</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-show-w-matt-cronin</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-look-at-the-open-software-supply</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/enter-the-matrix</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-s4e5-robert-wood</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/the-why-and-how-of-saas-governance</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-show-s4e4-derek-fisher</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/supplier-misnomer</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/trust-through-transparency</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/trouble-in-the-neighborhood</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/what-do-you-mean-there-isnt-a-patch</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s4e1-stephen-carter-state-of-the</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/application-security-maturity-models</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/software-supply-chain-attack-types</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/vulnerability-disclosure-programs</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-show-s3e28-w-chris</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/omb-22-18-and-nists-ssdf</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e27-varun-badhwar-oss-governance</loc><lastmod>2025-08-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/dissecting-the-fedramp-authorization</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/a-look-at-the-dods-zero-trust-strategy</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/cisas-take-on-vulnerability-prioritization</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/securing-the-software-supply-chain</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/an-incomplete-look-at-vulnerability</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/breaking-down-the-dod-software-modernization</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/microsofts-secure-supply-chain-consumption</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e25-richard-stiennon-cyber-industry-953</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e26-mark-curphey-challenges-in-254</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e24-chinmayi-sharma-tragedy-of-cd8</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/coming-soon</loc><lastmod>2023-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e23-richard-bird-digital-identity-d16</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e22-steve-springett-navigating-9e1</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e21-josh-bressers-securing-open-c52</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e19-andres-vega-and-andrew-clay-748</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e20-ken-myers-federal-icam-and-c5f</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e18-jacques-chester-vulnerability-76e</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e17-anil-karmel-compliance-innovation-c68</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e16-greg-thomas-secure-service-8fc</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e13-jimmy-mesta-kubernetes-security-904</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e14-jon-meadows-the-secure-software-a90</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e15-aaron-rinehart-chaos-engineering-0ec</loc><lastmod>2022-11-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e12-daniel-krivelevich-of-cider-815</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e11-larry-clinton-w-internet-security-c33</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e9-rob-black-vciso-and-story-telling-7f5</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e10-magno-logan-container-and-kubernetes-566</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e8-maril-vernon-purple-teaming-fe3</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e5-kelsei-young-cybersecurity-m-582</loc><lastmod>2024-09-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e6-walter-haydock-software-supply-114</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e7-robert-hurlbut-all-things-threat-8b2</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e2-jacob-horne-security-vs-compliance-559</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e3-dan-lorenc-software-supply-chain-737</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e4-dr-butler-cybersecurity-and-35f</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s3e1-bob-zukis-cybersecurity-in-the-f0d</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e24-breaking-down-the-dod-continuous-4c1</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e23-greg-touhill-securityboardroom-2f4</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e22-hackerone-bug-bounty-vulnerability-dc5</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e21-jerich-beason-emotional-intelligence-8b5</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e20-tidelift-open-source-software-1cf</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e19-renee-wynn-organizational-leadership-8c4</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e18-john-guckian-edr-xdr-and-modern-b42</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e17-ron-ross-nist-devsecops-resilience-20e</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e16-dr-nagi-mei-drone-security-3cd</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e15-shubhi-mishra-government-innovation-023</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e14-jacquelyn-schneider-us-cybersecurity-0b3</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e13-omar-marrero-chaos-engineering-299</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e12-dr-nikki-robinson-vulnerability-ddd</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e11-drew-malloy-disa-zero-trust-544</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e10-shane-barney-federal-zero-trust-145</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e9-ron-gula-cybersecurity-founding-42f</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e8-john-dabruzzo-offensive-security-026</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e7-rock-lambros-cybersecurity-business-2bc</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e6-tracy-bannon-devsecops-innovation-102</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e5-lonye-ford-cybersecurity-workforce-1b1</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e4-dr-allan-friedman-cisa-sbom-5c2</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e3-meghan-jacquot-breaking-in-to-703</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e2-cole-kennedy-software-supply-d6c</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/s2e1-michael-baker-vpciso-at-gdit-268</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-23-f75</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-22-2c4</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-21-d6a</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-20-1ec</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-19-fde</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-18-02b</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-podcast-episode-17-2b3</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-16-john-stoner-aa1</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/episode-15-dr-chase-cunningham-dr-fce</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-14-hannah-95e</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-13-carlota-7f3</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-12-jason-a22</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-11-dr-margaret-e15</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-10-nikki-67f</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-9-matt-johnson-6fb</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-8-ray-letteer-c80</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-7-jim-perkins-e82</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-6-chris-hughes-856</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-5-naomi-buckwalter-84e</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-4-aj-yawn-a30</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-3-calvin-29c</loc><lastmod>2024-09-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-2-dutch-schwartz-2d2</loc><lastmod>2024-09-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.resilientcyber.io/p/resilient-cyber-episode-1-introductions-d05</loc><lastmod>2026-03-09</lastmod><changefreq>monthly</changefreq></url></urlset>