<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityconscience.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityconscience.com/blog/</loc>
		<lastmod>2019-11-25T20:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2026/03/hero1-1024x684.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityconscience.com/wp-content/uploads/2026/02/PAM-1-1024x572.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityconscience.com/what-to-govern-first-a-priority-stack-for-security-leaders/</loc>
		<lastmod>2026-04-05T21:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/your-mfa-adoption-rate-is-a-broken-metric/</loc>
		<lastmod>2026-04-05T21:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/your-pam-is-live-your-admins-still-have-standing-privilege/</loc>
		<lastmod>2026-03-30T23:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/cybersecurity-governance-in-practice-decision-rights-raci-and-the-cadence-that-prevents-security-drift/</loc>
		<lastmod>2026-03-30T23:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/2026-vpn-strategy/</loc>
		<lastmod>2026-03-30T23:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/device-trust-is-not-a-verdict-why-compliance-is-not-security/</loc>
		<lastmod>2026-03-30T23:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/remote-access-in-2026-stop-arguing-vpn-vs-zero-trust-and-build-a-portfolio/</loc>
		<lastmod>2026-03-30T23:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/workload-identities-are-the-real-perimeter/</loc>
		<lastmod>2026-03-30T23:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/cutting-through-security-noise-for-your-cio/</loc>
		<lastmod>2026-03-30T23:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/conditional-access-is-not-a-policy-how-enterprises-accidentally-break-identity-security/</loc>
		<lastmod>2026-03-30T23:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/vendor-access-doesnt-expire-it-just-goes-unmonitored/</loc>
		<lastmod>2026-03-30T23:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/enterprise-remote-access-in-2026-vpn-ztna-and-secure-tunnels-compared/</loc>
		<lastmod>2026-03-04T21:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/building-effective-cybersecurity-governance-frameworks/</loc>
		<lastmod>2026-02-22T04:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/why-identity-is-the-new-perimeter-for-modern-enterprises/</loc>
		<lastmod>2026-02-22T02:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityconscience.com/zero-trust-in-real-life-what-it-actually-looks-like-for-large-organizations/</loc>
		<lastmod>2025-11-22T00:24:17+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->