<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityconscience.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-the-trust-you-forgot-you-granted/</loc>
		<lastmod>2026-03-30T23:30:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-three-years-inside-your-network-nobody-noticed/</loc>
		<lastmod>2026-03-30T23:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-your-security-program-is-built-on-things-you-stopped-verifying/</loc>
		<lastmod>2026-03-30T23:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-your-security-stack-is-the-attack-surface/</loc>
		<lastmod>2026-03-30T23:27:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-your-tools-are-the-attack-surface-now/</loc>
		<lastmod>2026-03-30T23:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-when-approved-doesnt-mean-safe/</loc>
		<lastmod>2026-03-30T23:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-patched-clean/</loc>
		<lastmod>2026-02-20T17:30:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-what-we-assume-is-safe/</loc>
		<lastmod>2026-02-09T18:13:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/securityconscience-the-risk-you-didnt-mean-to-keep/</loc>
		<lastmod>2026-02-08T05:35:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/issue-04-when-trust-boundaries-break/</loc>
		<lastmod>2026-01-21T07:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/issue-03-google-patches-gemini-enterprise/</loc>
		<lastmod>2025-12-15T14:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/issue-01-soc-challenges-for-2026/</loc>
		<lastmod>2025-12-07T05:03:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/issue-02-chinese-long-term-persistence/</loc>
		<lastmod>2025-12-08T15:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/newsletters/issue-00-week-of-nov-21-2025/</loc>
		<lastmod>2025-11-27T07:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2020/04/Digital_logo.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->