<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.securityinnovation.com/blog/2013/03/byod-security-making-byod-approachable-and-secure-for-all-users-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/dread-2.0-an-argument-against-critical-rating</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-12-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/application-security-is-not-a-tool-developers-arent-either-notes-from-rsa-11.html</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/the-magic-of-empowerment-my-first-year-at-security-innovation</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/the-magic-of-empowerment-my-first-year-at-security-innovation.jpg</image:loc><image:caption>themagicofempowermentmyfirstyearatsecurityinnovation</image:caption><image:title>themagicofempowermentmyfirstyearatsecurityinnovation</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2022-10-19</lastmod></url><url><loc>https://blog.securityinnovation.com/dread-2.0-an-argument-for-critical-rating</loc><lastmod>2017-01-19</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-q2-2023-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2023-05-10</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-october-2021-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><lastmod>2021-10-21</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-cyber-range-new-features-part-5</loc><lastmod>2019-09-09</lastmod></url><url><loc>https://blog.securityinnovation.com/innovation</loc><lastmod>2018-09-24</lastmod></url><url><loc>https://blog.securityinnovation.com/what-software-engineers-can-learn-from-the-apollo-1-tragedy</loc><lastmod>2017-02-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/centralize-error-handling.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/07/dangerous-precedent-appeals-court-calls-banks-security-commercially-unreasonable.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/defcon2023</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Yasmin%20headshot_1658213752976.jpg</image:loc><image:caption>Yasminheadshot1658213752976</image:caption><image:title>Yasminheadshot1658213752976</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-defcon2023-blog-post.jpg</image:loc><image:caption>securityinnovationdefcon2023blogpost</image:caption><image:title>securityinnovationdefcon2023blogpost</image:title></image:image><lastmod>2023-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/i-wrote-earlier-about-security-innovations-policy-on-responsible-disclosure-over-open-or-full-disclosure-it-wasnt-my-i.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/11/security-for-securitys-sake-at-last.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/removing-barriers-to-encryption-the-need-for-high-performance-ssl.html</loc><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/do-not-rely-on-client-side-validation.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/the-many-faces-of-ssrf</loc><lastmod>2020-02-04</lastmod></url><url><loc>https://blog.securityinnovation.com/threat-modeling-for-large-language-models</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-chatgpt-plugins.png</image:loc><image:caption>threatmodelingchatgptplugins</image:caption><image:title>threatmodelingchatgptplugins</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-sumary-ip-address.png</image:loc><image:caption>threatmodelingsumaryipaddress</image:caption><image:title>threatmodelingsumaryipaddress</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-webpilot-rendering.png</image:loc><image:caption>threatmodelingwebpilotrendering</image:caption><image:title>threatmodelingwebpilotrendering</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-webhook.png</image:loc><image:caption>threatmodelingwebhook</image:caption><image:title>threatmodelingwebhook</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-chatgpt-webpilot-flow-chart.png</image:loc><image:caption>threatmodelingchatgptwebpilotflowchart</image:caption><image:title>threatmodelingchatgptwebpilotflowchart</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-webpilot-summary.png</image:loc><image:caption>threatmodelingwebpilotsummary</image:caption><image:title>threatmodelingwebpilotsummary</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/threat-modeling-blog-post-chatgpt.jpg</image:loc><image:caption>threatmodelingblogpostchatgpt</image:caption><image:title>threatmodelingblogpostchatgpt</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/grant-shanklin.jpeg</image:loc><image:caption>grantshanklin</image:caption><image:title>grantshanklin</image:title></image:image><lastmod>2023-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/crypto-stasis-securing-data-at-rest</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/crypto-stasis-securing-data-at-rest.jpg</image:loc><image:caption>cryptostasissecuringdataatrest</image:caption><image:title>cryptostasissecuringdataatrest</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/12/gmail-changes-to-displays-images-by-default.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/secure-vehicle-to-vehicle-communications-part-ii-the-wireless-technology-behind-it.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/10/tips-and-tricks-secure-password-methods-and-using-password-managers.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/create-a-threat-model-step-5.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/how-to-test-for-command-injection-v2</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/comand-injection-select-entry-point.png</image:loc><image:caption>comandinjectionselectentrypoint</image:caption><image:title>comandinjectionselectentrypoint</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/rubyonrails-2x1-unsplash.jpg</image:loc><image:caption>rubyonrails2x1unsplash</image:caption><image:title>rubyonrails2x1unsplash</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-11-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/thoughts-on-sony-dod-rsa-imf-lockheed-martin.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/abusing-the-tor-anonymity-network-for-high-bandwidth-anonymous-internet-usage</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://blog.securityinnovation.com/proxying-unaware-thick-clients</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/maxfield-chen.jpg</image:loc><image:caption>maxfieldchen</image:caption><image:title>maxfieldchen</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/road-closed-detour-wrong-way-2x1.jpg</image:loc><image:caption>roadcloseddetourwrongway2x1</image:caption><image:title>roadcloseddetourwrongway2x1</image:title></image:image><lastmod>2020-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/disable-directory-browsing.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/02/boston-police-department-hacked.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/diffusion-of-innovation-and-its-impact-on-security</loc><lastmod>2017-05-03</lastmod></url><url><loc>https://blog.securityinnovation.com/migrating-to-the-cloud-move-your-applications-securely</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-10-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/01/preventing-code-injection-vulnerabilities-in-php.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/php-security-the-good-the-bad-and-the-ugly</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/2020-mid-year-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/event-infographic-midyear-2020.png</image:loc><image:caption>eventinfographicmidyear2020</image:caption><image:title>eventinfographicmidyear2020</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cmd%2Bctrl-event-midyear-2020-2x1.png</image:loc><image:caption>cmdctrleventmidyear20202x1</image:caption><image:title>cmdctrleventmidyear20202x1</image:title></image:image><lastmod>2020-08-07</lastmod></url><url><loc>https://blog.securityinnovation.com/llm-prompt-injection-whats-the-business-risk</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Securing%20LLM.png</image:loc><image:caption>SecuringLLM</image:caption><image:title>SecuringLLM</image:title></image:image><lastmod>2025-05-09</lastmod></url><url><loc>https://blog.securityinnovation.com/removing-blockchain-adoption-barriers</loc><lastmod>2019-08-01</lastmod></url><url><loc>https://blog.securityinnovation.com/devsecops-for-executives</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/whiteboard-hands-unsplash-2x1.jpg</image:loc><image:caption>whiteboardhandsunsplash2x1</image:caption><image:title>whiteboardhandsunsplash2x1</image:title></image:image><lastmod>2022-01-11</lastmod></url><url><loc>https://blog.securityinnovation.com/scaling-appsec-with-security-champions</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/trophies-unsplash-2x1.jpg</image:loc><image:caption>trophiesunsplash2x1</image:caption><image:title>trophiesunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/sec-champs-blog-1a.png</image:loc><image:caption>secchampsblog1a</image:caption><image:title>secchampsblog1a</image:title></image:image><lastmod>2023-05-16</lastmod></url><url><loc>https://blog.securityinnovation.com/march-hackness-post-game-report</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-march-hackness-2x1.jpg</image:loc><image:caption>backgroundmarchhackness2x1</image:caption><image:title>backgroundmarchhackness2x1</image:title></image:image><lastmod>2020-03-27</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-cyber-range-new-features-part-2</loc><lastmod>2019-08-20</lastmod></url><url><loc>https://blog.securityinnovation.com/buzzword-bingo-devops</loc><lastmod>2018-02-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/use-named-queries-with-java-persistence-api-jpa.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/quadrooter-the-4-headed-monster-that-threatens-900-million-android-users</loc><lastmod>2016-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/three-best-practices-for-securing-kubernetes</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/three-best-practices-kubernetes-security.jpg</image:loc><image:caption>threebestpracticeskubernetessecurity</image:caption><image:title>threebestpracticeskubernetessecurity</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/koblitz-and-menezes-on-safety-margins-in-cryptography.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/learn-about-application-security-contract-language</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/identifying-malicious-android-applications-in-3rd-party-stores</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-01-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/create-a-threat-model-step-3.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/repo-jacking-exploiting-the-dependency-supply-chain</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/repo-hijacking-2.png</image:loc><image:caption>repohijacking2</image:caption><image:title>repohijacking2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/github-screenshot-2x1.jpg</image:loc><image:caption>githubscreenshot2x1</image:caption><image:title>githubscreenshot2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/indiana-moreau-500x500.jpeg</image:loc><image:caption>indianamoreau500x500</image:caption><image:title>indianamoreau500x500</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/repo-hijacking-1.png</image:loc><image:caption>repohijacking1</image:caption><image:title>repohijacking1</image:title></image:image><lastmod>2020-10-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/09/security-disconnected-examining-the-mat-honan-breach-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-a-hacker-matt-pardo</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/07/want2hack-open-sourced.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/from-anthropologist-to-cybersecurity</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-10-08</lastmod></url><url><loc>https://blog.securityinnovation.com/navigating-the-fdas-cybersecurity-guidance-for-medical-devices</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/FDA%20medical%20cybersecurity.png</image:loc><image:caption>FDAmedicalcybersecurity</image:caption><image:title>FDAmedicalcybersecurity</image:title></image:image><lastmod>2025-04-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/intelligent-transportation-systems-highlights-from-orlando-world-congress-event.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/antisec-hacking-into-booz-allen-web-site.html</loc><lastmod>2017-01-19</lastmod></url><url><loc>https://blog.securityinnovation.com/consumers-microsoft-the-nsa-all-wannacry</loc><lastmod>2017-05-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/01/java-zero-day-1.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/q1-2024-cmdctrl-update</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2024-02-14</lastmod></url><url><loc>https://blog.securityinnovation.com/bostem-unitedway</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com/firewall</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/ssl-tls-attacks-for-the-layman-repeated-plain-text</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-01-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/05/what-are-the-main-teammentor-use-cases-and-dont-copy-and-paste-from-google-copy-and-paste-from-teamm.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/ed-talk-after-show-back-to-basics</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-microphone-ed-talks.jpg</image:loc><image:caption>backgroundmicrophoneedtalks</image:caption><image:title>backgroundmicrophoneedtalks</image:title></image:image><lastmod>2020-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/boeing-paying-hackers-to-break-into-their-systems.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/expanding-our-cyber-range-portfolio</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-05-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/to-err-is-human-to-hack-is-well-human-too.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-17</lastmod></url><url><loc>https://blog.securityinnovation.com/manual-or-automated-application-security-testing-whats-more-effective</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/aditya-kakrania.jpg</image:loc><image:caption>adityakakrania</image:caption><image:title>adityakakrania</image:title></image:image><lastmod>2024-08-13</lastmod></url><url><loc>https://blog.securityinnovation.com/ransomware-it-could-happen-to-you</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-05-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/web-application-security-controls-based-on-the-owasp-top-10-recommendations.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/pci-compliance-awareness-quick-tips-to-verifying-a-credit-transaction-1.html</loc><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/03/effective-application-security-testing-thinking-like-the-enemy-.html</loc><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/securing-llms-against-prompt-injection-attacks</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Technical%20LLM%20injection.png</image:loc><image:caption>TechnicalLLMinjection</image:caption><image:title>TechnicalLLMinjection</image:title></image:image><lastmod>2025-05-14</lastmod></url><url><loc>https://blog.securityinnovation.com/what-is-pii-and-how-can-i-protect-my-private-information</loc><lastmod>2017-01-26</lastmod></url><url><loc>https://blog.securityinnovation.com/whats-old-with-the-owasp-top-10</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/owasp-mapping-2021-2017-2x1.png</image:loc><image:caption>owaspmapping202120172x1</image:caption><image:title>owaspmapping202120172x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/owasp-mapping-2021-2017.png</image:loc><image:caption>owaspmapping20212017</image:caption><image:title>owaspmapping20212017</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/consider-using-jaas-for-authorization.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/chrome-takes-on-quantum-computers</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/privacy_policy-3</loc><lastmod>2019-05-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/todays-ciso-personality-should-dictate-where-the-position-resides.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/11/preventative-tips-to-avoid-or-quell-a-cyber-spying-campaign-1.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/assessing-cots-3rd-party-software</loc><lastmod>2020-03-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/how-to-test-for-sql-injection-bugs-step-4.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/how-to-test-for-command-injection.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/mobile-app-security-2024.jpg</image:loc><image:caption>mobileappsecurity2024</image:caption><image:title>mobileappsecurity2024</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/secure-vehicle-to-vehicle-communications-part-iii-security.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/could-you-spot-a-phishing-attack</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/06/software-vulnerability-management.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/march-hackness</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-03-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/03/the-new-information-security-prize-healthcare-data-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/validate-all-input-passed-to-the-database.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/about-the-authors.html</loc><lastmod>2019-06-26</lastmod></url><url><loc>https://blog.securityinnovation.com/beyond-blue-and-red-teaming</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cyber-color-wheel.jpg</image:loc><image:caption>cybercolorwheel</image:caption><image:title>cybercolorwheel</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cyber-space-blocks.jpg</image:loc><image:caption>cyberspaceblocks</image:caption><image:title>cyberspaceblocks</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://blog.securityinnovation.com/devops_debate</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-02-05</lastmod></url><url><loc>https://blog.securityinnovation.com/cybersecurity_beanpot</loc><lastmod>2018-11-07</lastmod></url><url><loc>https://blog.securityinnovation.com/four-frightening-iot-scenarios-that-became-reality</loc><lastmod>2016-10-26</lastmod></url><url><loc>https://blog.securityinnovation.com/our-top-5-blog-posts-of-2016</loc><lastmod>2016-12-20</lastmod></url><url><loc>https://blog.securityinnovation.com/xml-external-entities-owasps-easily-preventable-newcomer</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/colombia-emeralds-and-a-jewel-of-denial.html</loc><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/from-google-to-ghana-and-beyond</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/audrey%20mengue.jpg</image:loc><image:caption>audreymengue</image:caption><image:title>audreymengue</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Joshua%20Offe%20Berkoh.jpg</image:loc><image:caption>JoshuaOffeBerkoh</image:caption><image:title>JoshuaOffeBerkoh</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/from-google-to-ghana-and-beyond.jpg</image:loc><image:caption>fromgoogletoghanaandbeyond</image:caption><image:title>fromgoogletoghanaandbeyond</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-ghana-appsec-challenge-winner.jpg</image:loc><image:caption>securityinnovationghanaappsecchallengewinner</image:caption><image:title>securityinnovationghanaappsecchallengewinner</image:title></image:image><lastmod>2022-07-14</lastmod></url><url><loc>https://blog.securityinnovation.com/iotmyths2018</loc><lastmod>2018-06-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/02/new-application-security-research-from-the-ponemon-institute.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/fuzz-testing-yottadb</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/fuzz-testing-yottadb-for-unknown-security-vulnerabilities.jpg</image:loc><image:caption>fuzztestingyottadbforunknownsecurityvulnerabilities</image:caption><image:title>fuzztestingyottadbforunknownsecurityvulnerabilities</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/zachary-minniker-headshotsmall.jpg</image:loc><image:caption>zacharyminnikerheadshotsmall</image:caption><image:title>zacharyminnikerheadshotsmall</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-fuzz-testing-yottadb-found-vulnerabilities.jpg</image:loc><image:caption>securityinnovationfuzztestingyottadbfoundvulnerabilities</image:caption><image:title>securityinnovationfuzztestingyottadbfoundvulnerabilities</image:title></image:image><lastmod>2022-01-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/07/no-wafing-matter-gartners-perplexing-analysis-on-web-application-firewalls.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/3-cloud-configuration-mistakes-to-avoid</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-10-05</lastmod></url><url><loc>https://blog.securityinnovation.com/pen-testing-attack-simulation-red-teaming</loc><lastmod>2018-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/reducing-your-applications-attack-surface.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/03/restricting-signed-java-applets.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/speed-dating-with-security-executives-thoughts-from-a-ceo</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/speed-dating-with-cybersecurity-executives-thoughts-from-ceo.jpg</image:loc><image:caption>speeddatingwithcybersecurityexecutivesthoughtsfromceo</image:caption><image:title>speeddatingwithcybersecurityexecutivesthoughtsfromceo</image:title></image:image><lastmod>2023-05-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/08/nsa-transition-quantum-resistant-algorithms.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/11/learning-styles-information-security-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/password-policy-basics-part-2-1.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/how-to-test-for-luring-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/security-considerations-for-the-explosion-of-mobile-application-development.html</loc><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/run-your-own-cyber-range-event</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://blog.securityinnovation.com/making-iot-safer-how-to-reverse-engineer-devices</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-12-22</lastmod></url><url><loc>https://blog.securityinnovation.com/v2v-communications-what-about-my-privacy</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-11-29</lastmod></url><url><loc>https://blog.securityinnovation.com/what-does-a-security-company-do-with-responsibly-disclosed-vulnerabilities</loc><lastmod>2019-04-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/05/memorial-day-weekend-travel-security-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchain-ctf-winners</loc><lastmod>2019-03-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/10/security-resources-for-non-technical-users-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/securing-software-in-the-sdlc</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-microphone-ed-talks.jpg</image:loc><image:caption>backgroundmicrophoneedtalks</image:caption><image:title>backgroundmicrophoneedtalks</image:title></image:image><lastmod>2022-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/cyber-ranges-extending-the-skills-of-tool-experts</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-11-19</lastmod></url><url><loc>https://blog.securityinnovation.com/defcon-30-a-study-in-scarlet</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/defcon-30-study-in-scarlet-mailjay-cloud-cyber-range.jpg</image:loc><image:caption>defcon30studyinscarletmailjaycloudcyberrange</image:caption><image:title>defcon30studyinscarletmailjaycloudcyberrange</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cmd-ctrl-mailjay-results-defcon-30.jpg</image:loc><image:caption>cmdctrlmailjayresultsdefcon30</image:caption><image:title>cmdctrlmailjayresultsdefcon30</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/01/preventing-shell-upload-vulnerabilities-in-php.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-11-21</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/08/mobile-application-security-testing-faqs-post-1.html</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/ed-talks-a-2020-retrospective</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/blog-post-cta-ed-talks-icon.png</image:loc><image:caption>blogpostctaedtalksicon</image:caption><image:title>blogpostctaedtalksicon</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-microphone-ed-talks.jpg</image:loc><image:caption>backgroundmicrophoneedtalks</image:caption><image:title>backgroundmicrophoneedtalks</image:title></image:image><lastmod>2020-12-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/03/understanding-the-connected-car.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/securing-application-it-systems-what-tools-technologies-and-best-practices-can-and-cannot-protect-ag.html</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/cyber-security-warning-system.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-february-2022-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/why-do-we-expect-to-find-lots-of-really-bad-things-during-testing.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/lifes-a-breach.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/03/where-can-we-harness-appsec-talent-in-college-thats-where.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/05/how-to-use-regular-expressions-to-constrain-input.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-software-as-fuel.jpg</image:loc><image:caption>securityinnovationsoftwareasfuel</image:caption><image:title>securityinnovationsoftwareasfuel</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/12/preventing-command-injection-in-php-with-a-few-simple-techniques.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-01-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/facebook-security.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/whats-new-is-old-updated-fda-guidance-for-medical-devices</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/whats-old-is-new-updated-fda-guidance-for-medical-devices.jpg</image:loc><image:caption>whatsoldisnewupdatedfdaguidanceformedicaldevices</image:caption><image:title>whatsoldisnewupdatedfdaguidanceformedicaldevices</image:title></image:image><lastmod>2023-05-16</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/04/data-breaches-when-the-lawyers-get-involved.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/11/getting-defensive-with-coding-validating-input.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-january-2021-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/NIST-NICE-Categories.png</image:loc><image:caption>NISTNICECategories</image:caption><image:title>NISTNICECategories</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/wikipedia-chart-io.png</image:loc><image:caption>wikipediachartio</image:caption><image:title>wikipediachartio</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/sql-injection-workflow.png</image:loc><image:caption>sqlinjectionworkflow</image:caption><image:title>sqlinjectionworkflow</image:title></image:image><lastmod>2021-01-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/information-security-the-dangers-of-using-facebook-and-other-social-media-insecurely-1.html</loc><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/automating-tls-configuration-verification</loc><lastmod>2017-09-22</lastmod></url><url><loc>https://blog.securityinnovation.com/building-a-collaborative-social-application-security-program</loc><lastmod>2017-10-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/06/q-a-with-wendy-nather-on-todays-appsec-topics.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/growing-mismatch-between-education-and-the-needs-of-business.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/is-your-fridge-running-it-might-be-a-hacker-running-it</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/q4-2023-cmdctrl-update</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2024-02-14</lastmod></url><url><loc>https://blog.securityinnovation.com/three-strategies-for-car-cybersecurity</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-10-31</lastmod></url><url><loc>https://blog.securityinnovation.com/what-do-i-do-if-my-account-has-been-hacked</loc><lastmod>2016-10-10</lastmod></url><url><loc>https://blog.securityinnovation.com/cloud-security-alliance-egregious-11</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/5-csa-egregious-11-account-hijacking.jpg</image:loc><image:caption>5csaegregious11accounthijacking</image:caption><image:title>5csaegregious11accounthijacking</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/7-csa-egregious-11-insecure-interfaces-and-apis.jpg</image:loc><image:caption>7csaegregious11insecureinterfacesandapis</image:caption><image:title>7csaegregious11insecureinterfacesandapis</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cloud-security-alliance-egregious-11-tips.jpg</image:loc><image:caption>cloudsecurityallianceegregious11tips</image:caption><image:title>cloudsecurityallianceegregious11tips</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/11-csa-egregious-11-abuse-and-nefarious-use-of-cloud-services.jpg</image:loc><image:caption>11csaegregious11abuseandnefarioususeofcloudservices</image:caption><image:title>11csaegregious11abuseandnefarioususeofcloudservices</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/2-csa-egregious-11-misconfiguration-inadequate-change-control.jpg</image:loc><image:caption>2csaegregious11misconfigurationinadequatechangecontrol</image:caption><image:title>2csaegregious11misconfigurationinadequatechangecontrol</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/6-csa-egregious-11-insider-threat.jpg</image:loc><image:caption>6csaegregious11insiderthreat</image:caption><image:title>6csaegregious11insiderthreat</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/1-csa-egregious-11-data-breach.jpg</image:loc><image:caption>1csaegregious11databreach</image:caption><image:title>1csaegregious11databreach</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/10-csa-egregious-11-limited-cloud-usage-visibility.jpg</image:loc><image:caption>10csaegregious11limitedcloudusagevisibility</image:caption><image:title>10csaegregious11limitedcloudusagevisibility</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/8-csa-egregious-11-weak-control-plane.jpg</image:loc><image:caption>8csaegregious11weakcontrolplane</image:caption><image:title>8csaegregious11weakcontrolplane</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/9-csa-egregious-11-metastructure-and-applistructure-failures.jpg</image:loc><image:caption>9csaegregious11metastructureandapplistructurefailures</image:caption><image:title>9csaegregious11metastructureandapplistructurefailures</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/4-csa-egregious-11-insufficient-identity-access-key-management.jpg</image:loc><image:caption>4csaegregious11insufficientidentityaccesskeymanagement</image:caption><image:title>4csaegregious11insufficientidentityaccesskeymanagement</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/3-csa-egregious-11-lack-of-cloud-security-architecture-strategy.jpg</image:loc><image:caption>3csaegregious11lackofcloudsecurityarchitecturestrategy</image:caption><image:title>3csaegregious11lackofcloudsecurityarchitecturestrategy</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/11/a-look-at-todays-cyber-security-threats.html</loc><lastmod>2016-02-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/12/pgpy-030-released.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/01/mobile-password-app-done-right-1.html</loc><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/are-your-cloud-permissions-leaving-you-exposed</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Cloud%20Permissions.png</image:loc><image:caption>CloudPermissions</image:caption><image:title>CloudPermissions</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2025-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/hot-dogs-and-hacking-wrap-up</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-07-09</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/10/evolution-of-touch-id-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/create-a-threat-model-step-1.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/hack-through-the-holidays-cmd-ctrl_3-0</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2018-12-20</lastmod></url><url><loc>https://blog.securityinnovation.com/happy-birthday-world-wide-web-will-the-next-25-years-be-as-risky</loc><lastmod>2021-03-29</lastmod></url><url><loc>https://blog.securityinnovation.com/why-you-should-have-trust-issues-with-pokemon-go</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/define-a-security-policy.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2016/02/why-your-best-kept-secrets-arent-really-secrets.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/security-tips-for-virgin-customer-support-1.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/feds-automated-vehicle-guidance-stresses-cybersecurity-by-design</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-09-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/the-high-cost-of-an-application-security-data-breach.html</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/security-training-for-software-teams</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-microphone-ed-talks.jpg</image:loc><image:caption>backgroundmicrophoneedtalks</image:caption><image:title>backgroundmicrophoneedtalks</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/infosec-color-wheel.png</image:loc><image:caption>infoseccolorwheel</image:caption><image:title>infoseccolorwheel</image:title></image:image><lastmod>2021-11-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/questions-for-comodo-and-rsa-after-their-recent-hacks-.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/iot_uart</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-08-23</lastmod></url><url><loc>https://blog.securityinnovation.com/get-secure-at-work-and-at-home</loc><lastmod>2017-10-03</lastmod></url><url><loc>https://blog.securityinnovation.com/top-two-threat-driven-activities-for-organizations-on-a-budget</loc><lastmod>2018-05-09</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/03/information-security-march-madness-click-on-headlines-at-your-own-risk-1.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/protect-your-administration-interfaces.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/whats-all-of-the-talk-about</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/whats-all-the-talk-about-edtalks-predictions-2022.jpg</image:loc><image:caption>whatsallthetalkaboutedtalkspredictions2022</image:caption><image:title>whatsallthetalkaboutedtalkspredictions2022</image:title></image:image><lastmod>2022-06-08</lastmod></url><url><loc>https://blog.securityinnovation.com/privacy_secrets</loc><lastmod>2019-01-24</lastmod></url><url><loc>https://blog.securityinnovation.com/infocondb</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2018-09-20</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/11/threats-to-data-centers-attacking-the-application-layer.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/wrapping-up-hot-dogs-and-hacking</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/hands-group-2x1.jpg</image:loc><image:caption>handsgroup2x1</image:caption><image:title>handsgroup2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://blog.securityinnovation.com/the-role-of-cryptography-in-software-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/role-of-cryptography-in-software-security.jpg</image:loc><image:caption>roleofcryptographyinsoftwaresecurity</image:caption><image:title>roleofcryptographyinsoftwaresecurity</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/12/pci-dss-30-security-awareness-training-1.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/streamlining-access-control-in-google-cloud-platform</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/access-control-in-gcp-resource-tag.jpg</image:loc><image:caption>accesscontrolingcpresourcetag</image:caption><image:title>accesscontrolingcpresourcetag</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/streamlining-access-control-in-google-cloud-platform.jpg</image:loc><image:caption>streamliningaccesscontrolingooglecloudplatform</image:caption><image:title>streamliningaccesscontrolingooglecloudplatform</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/access-control-gcp-security-boundaries.jpg</image:loc><image:caption>accesscontrolgcpsecurityboundaries</image:caption><image:title>accesscontrolgcpsecurityboundaries</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/secure-iot-updating-process</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/laptop-workfromhome-unsplash-2x1.jpg</image:loc><image:caption>laptopworkfromhomeunsplash2x1</image:caption><image:title>laptopworkfromhomeunsplash2x1</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/four-steps-to-tackle-appsec-training</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/CSAM-banner-hero-security-lock.jpg</image:loc><image:caption>CSAMbannerherosecuritylock</image:caption><image:title>CSAMbannerherosecuritylock</image:title></image:image><lastmod>2023-10-12</lastmod></url><url><loc>https://blog.securityinnovation.com/cmon-dad...you-should-know-better</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-09-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/06/reviewing-cc-code-for-security-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/06/1-introduction-from-fitness-tracking-watches-to-tire-pressure-monitoring-sensors-the-world-is-getting-smarter-one-device-a.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/2fa-tips-for-software-and-network-architects</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-july-2021-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture1-2.png</image:loc><image:caption>Picture12</image:caption><image:title>Picture12</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture2-2.png</image:loc><image:caption>Picture22</image:caption><image:title>Picture22</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture3-2.png</image:loc><image:caption>Picture32</image:caption><image:title>Picture32</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture4-2.png</image:loc><image:caption>Picture42</image:caption><image:title>Picture42</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.securityinnovation.com/march-hackness-a-recap</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-04-01</lastmod></url><url><loc>https://blog.securityinnovation.com/setting-up-a-pentesting-environment-for-the-meta-quest-2</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/metaquest1.png</image:loc><image:caption>metaquest1</image:caption><image:title>metaquest1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/metaquest2.jpg</image:loc><image:caption>metaquest2</image:caption><image:title>metaquest2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Meta%20Quest.png</image:loc><image:caption>MetaQuest</image:caption><image:title>MetaQuest</image:title></image:image><lastmod>2025-04-28</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/10/how-long-do-you-want-your-secrets-to-remain-secret.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/five-steps-to-make-compliance-a-breeze</loc><lastmod>2018-03-20</lastmod></url><url><loc>https://blog.securityinnovation.com/six-best-practices-for-security-testing-in-the-sdlc</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/10/shell-shock-what-development-and-security-teams-need-to-know.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/threat-modeling-eating-your-veggies</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/eat-veggies-threat-model-2x1.png</image:loc><image:caption>eatveggiesthreatmodel2x1</image:caption><image:title>eatveggiesthreatmodel2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/aditya-kakrania.jpg</image:loc><image:caption>adityakakrania</image:caption><image:title>adityakakrania</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/eat-your-veggies-and-threat-model.png</image:loc><image:caption>eatyourveggiesandthreatmodel</image:caption><image:title>eatyourveggiesandthreatmodel</image:title></image:image><lastmod>2020-08-20</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/the-time-for-application-security-certification-is-now-part-ii.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/05/3-steps-to-staying-ahead-of-attackers-security-awareness-training-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/llm-security-by-design</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/LLM%20Security.png</image:loc><image:caption>LLMSecurity</image:caption><image:title>LLMSecurity</image:title></image:image><lastmod>2025-04-04</lastmod></url><url><loc>https://blog.securityinnovation.com/hack-through-the-holidays</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-12-23</lastmod></url><url><loc>https://blog.securityinnovation.com/black-hat-2023-understanding-mobile-exploitation-beyond-the-app</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-blackhat-2023-dinesh-shetty.jpg</image:loc><image:caption>securityinnovationblackhat2023dineshshetty</image:caption><image:title>securityinnovationblackhat2023dineshshetty</image:title></image:image><lastmod>2023-07-28</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/people-people-people.html</loc><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/12/2015-car-hacking-year-in-review.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/a-new-approach-to-cyber-crisis-management</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Luke-Fletcher-Secura.jpeg</image:loc><image:caption>LukeFletcherSecura</image:caption><image:title>LukeFletcherSecura</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/newapproach.png</image:loc><image:caption>newapproach</image:caption><image:title>newapproach</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Cyber%20Crisis%20Management.png</image:loc><image:caption>CyberCrisisManagement</image:caption><image:title>CyberCrisisManagement</image:title></image:image><lastmod>2025-03-03</lastmod></url><url><loc>https://blog.securityinnovation.com/why-i-was-asked-to-a-white-house-meeting</loc><lastmod>2016-09-07</lastmod></url><url><loc>https://blog.securityinnovation.com/why-ed-talks</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/background-microphone-ed-talks.jpg</image:loc><image:caption>backgroundmicrophoneedtalks</image:caption><image:title>backgroundmicrophoneedtalks</image:title></image:image><lastmod>2023-03-15</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-a-hacker-julian-runnels-kuan-xiang-wen</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2016/02/the-blessing-and-curse-of-apple-security.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/the-dangers-of-social-networking-and-information-security-part-2.html</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/owasp-top-10-why-it-still-matters</loc><lastmod>2018-01-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/how-to-test-for-memory-sniffing.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/lcnc-blue-cyber.jpg</image:loc><image:caption>lcncbluecyber</image:caption><image:title>lcncbluecyber</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/11/you-are-free-to-tinker-with-your-cars-software.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/accounts-are-locked-after-consecutive-failed-login-attempts.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchain_ctf_v2</loc><lastmod>2018-12-13</lastmod></url><url><loc>https://blog.securityinnovation.com/successful-cybersecurity-training</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/man-plaid-suit-crown-smirk-2x1.jpg</image:loc><image:caption>manplaidsuitcrownsmirk2x1</image:caption><image:title>manplaidsuitcrownsmirk2x1</image:title></image:image><lastmod>2021-05-26</lastmod></url><url><loc>https://blog.securityinnovation.com/owasp-top-ten-for-2017-the-hits-misses</loc><lastmod>2017-05-26</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/a-2012-security-holiday-wish-list-for-developers-.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/which-is-more-secure-windows-or-linux.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/ota-challenges-for-automakers</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/fintech-threat-the-malicious-insider</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/steal-familly-wall-unsplash-2x1.jpg</image:loc><image:caption>stealfamillywallunsplash2x1</image:caption><image:title>stealfamillywallunsplash2x1</image:title></image:image><lastmod>2020-11-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/09/you-should-probably-just-ask-for-directions.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/devsecops-in-microsoft-azure</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/devops-infinity-cicd-2x1.png</image:loc><image:caption>devopsinfinitycicd2x1</image:caption><image:title>devopsinfinitycicd2x1</image:title></image:image><lastmod>2022-01-28</lastmod></url><url><loc>https://blog.securityinnovation.com/earn-the-us-cyber-trust-mark-and-unlock-new-iot-growth-opportunities</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cyber%20trust.png</image:loc><image:caption>cybertrust</image:caption><image:title>cybertrust</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2025-03-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/03/4-critical-questions-to-boost-mobile-app-security.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-cyber-range-new-features-part-3</loc><lastmod>2019-09-03</lastmod></url><url><loc>https://blog.securityinnovation.com/modern-linux-rootkits</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/blue-circuit-board-2x1.jpg</image:loc><image:caption>bluecircuitboard2x1</image:caption><image:title>bluecircuitboard2x1</image:title></image:image><lastmod>2020-06-11</lastmod></url><url><loc>https://blog.securityinnovation.com/shift-left-your-software-security-training</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Shift-Left-Your-Software-Security-Training.jpg</image:loc><image:caption>ShiftLeftYourSoftwareSecurityTraining</image:caption><image:title>ShiftLeftYourSoftwareSecurityTraining</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/shift-left-in-the-software-development-life-cycle.gif</image:loc><image:caption>shiftleftinthesoftwaredevelopmentlifecycle</image:caption><image:title>shiftleftinthesoftwaredevelopmentlifecycle</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/cloudflare-dos-blackout</loc><lastmod>2019-07-16</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/11/industrial-control-system-ics-hacks-demonstrated.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/mitigating-common-password-attacks</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-09-28</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/05/information-security-awareness-password-security-password-day-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/demystifying-secure-database-development-myths</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/01/security-basics-for-2013-1.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/solve-the-software-security-authorization-testing-riddle-with-authmatrix-for-burp-suite</loc><lastmod>2017-01-20</lastmod></url><url><loc>https://blog.securityinnovation.com/ssl-tls-attacks-for-the-layman-oracles</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-12-15</lastmod></url><url><loc>https://blog.securityinnovation.com/the-what-how-and-why-of-application-security-training</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/the-what-how-and-why-of-software-security-training.jpg</image:loc><image:caption>thewhathowandwhyofsoftwaresecuritytraining</image:caption><image:title>thewhathowandwhyofsoftwaresecuritytraining</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://blog.securityinnovation.com/attackers-love-your-password-reset-feature</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/harsh-bothra.jpg</image:loc><image:caption>harshbothra</image:caption><image:title>harshbothra</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/sunset-heart-hands-unsplash-2x1.jpg</image:loc><image:caption>sunsethearthandsunsplash2x1</image:caption><image:title>sunsethearthandsunsplash2x1</image:title></image:image><lastmod>2020-09-02</lastmod></url><url><loc>https://blog.securityinnovation.com/hacking-community-and-passion-spokane-mayors-cup-ctf</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/spokane-mayors-cup-ctf-popup-alert.jpg</image:loc><image:caption>spokanemayorscupctfpopupalert</image:caption><image:title>spokanemayorscupctfpopupalert</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/spokane-mayors-cup-ctf-discussions-.jpg</image:loc><image:caption>spokanemayorscupctfdiscussions</image:caption><image:title>spokanemayorscupctfdiscussions</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/spokane-mayors-cup-ctf.jpg</image:loc><image:caption>spokanemayorscupctf</image:caption><image:title>spokanemayorscupctf</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/spokane-mayors-cup-ctf-assisting-d-squad.jpg</image:loc><image:caption>spokanemayorscupctfassistingdsquad</image:caption><image:title>spokanemayorscupctfassistingdsquad</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/spokane-mayors-cup-ctf-opening-discussion-.jpg</image:loc><image:caption>spokanemayorscupctfopeningdiscussion</image:caption><image:title>spokanemayorscupctfopeningdiscussion</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/nathaniel-kirkland.jpg</image:loc><image:caption>nathanielkirkland</image:caption><image:title>nathanielkirkland</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/plugging-the-security-gaps-in-your-iot-infrastructure</loc><lastmod>2017-05-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/king-rsa-cryptos-successor-why-we-need-to-move-away-from-a-monarchy.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/gdpr</loc><lastmod>2018-04-26</lastmod></url><url><loc>https://blog.securityinnovation.com/team-tournament-2020</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/team-tournament-scores-2020.png</image:loc><image:caption>teamtournamentscores2020</image:caption><image:title>teamtournamentscores2020</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/teamwork-laptops-2x1.jpg</image:loc><image:caption>teamworklaptops2x1</image:caption><image:title>teamworklaptops2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-09-09</lastmod></url><url><loc>https://blog.securityinnovation.com/q2-2024-cmdctrl-update</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/11/why-would-anyone-want-to-attack-our-servers.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/owasp-top-ten-2017-release-movers-shakers</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2018-02-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/application-security-its-bigger-on-the-inside.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-at-defcon-27-recap</loc><lastmod>2019-08-27</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-july-2020-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/q3-cbt-release-chart.png</image:loc><image:caption>q3cbtreleasechart</image:caption><image:title>q3cbtreleasechart</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/books-library-2x1.jpg</image:loc><image:caption>bookslibrary2x1</image:caption><image:title>bookslibrary2x1</image:title></image:image><lastmod>2020-07-23</lastmod></url><url><loc>https://blog.securityinnovation.com/cyber-ranges-getting-into-the-mind-of-the-attacker</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/shadow-health-cyber-range-mind-of-the-attacker.jpg</image:loc><image:caption>shadowhealthcyberrangemindoftheattacker</image:caption><image:title>shadowhealthcyberrangemindoftheattacker</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2023-06-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/09/new-voices-warn-quantum-computing-threat.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-a-hacker-matthew-thurber</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/stopping-bus-sniffing-with-tpm-encryption</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/taking-apart-laptop.jpg</image:loc><image:caption>takingapartlaptop</image:caption><image:title>takingapartlaptop</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/pico-bus.jpg</image:loc><image:caption>picobus</image:caption><image:title>picobus</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-02-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/03/the-security-compliance-challenge.html</loc><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/06/information-security-awareness-malicious-charger-malware-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/buzzword-bingo-cots-hbo-and-another-software-insecurity-crises</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-2019-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2020-01-28</lastmod></url><url><loc>https://blog.securityinnovation.com/moving-to-mobile-devsecops</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/mobile-app-security-devsecops.jpg</image:loc><image:caption>mobileappsecuritydevsecops</image:caption><image:title>mobileappsecuritydevsecops</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/10/call-to-arms-support-the-us-cybersecurity-initiative.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/evolution-of-touch-id</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/password-policy-basics-part-1-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/assume-all-web-application-input-is-malicious.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/application-security-roi-talking-business.html</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/a-simple-explanation-of-cross-site-scripting</loc><lastmod>2024-04-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/11/researchers-predict-cryptopolypse.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/learn-about-ransomware-and-how-to-protect-yourself</loc><lastmod>2017-05-19</lastmod></url><url><loc>https://blog.securityinnovation.com/hacking-vegas-at-def-con-2017</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-08-10</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-q1-2023-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><lastmod>2023-02-16</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/all-pages-that-use-authentication-have-logout-links.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/11/how-we-attacked-autonomous-cars-at-security-innovation.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-07-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/06/mapping-research-against-the-owasp-top-10-to-develop-an-effective-application-security-model.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/pancakescon-2020</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/do-something-great-2x1.jpg</image:loc><image:caption>dosomethinggreat2x1</image:caption><image:title>dosomethinggreat2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-03-25</lastmod></url><url><loc>https://blog.securityinnovation.com/how-to-rock-cybersecurity-awareness-month</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/CSAM-banner-hero-security-lock-2.jpg</image:loc><image:caption>CSAMbannerherosecuritylock2</image:caption><image:title>CSAMbannerherosecuritylock2</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.securityinnovation.com/women-in-cybersecurity-rocking-code-ahead-of-their-time</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-womens-history-month-2024banner.jpg</image:loc><image:caption>siwomenshistorymonth2024banner</image:caption><image:title>siwomenshistorymonth2024banner</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-03-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/11/learn-how-to-integrate-your-security-policies-into-teammentor-.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/06/the-importance-of-vulnerability-disclosure-programs-and-bug-bounties.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/breach-what-this-compromise-of-https-really-means-to-us-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/how-to-spot-a-potential-application-security-champion-in-your-organization</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/how-to-spot-a-potential-application-security-champion-in-your-org.jpg</image:loc><image:caption>howtospotapotentialapplicationsecuritychampioninyourorg</image:caption><image:title>howtospotapotentialapplicationsecuritychampioninyourorg</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2023-04-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/my-concerns-with-cybersecurity-legislation-no-teeth-paper-audits-and-security-auditors.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/bid/56448/how-much-security-does-obfuscation-get-you</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/05/encrypt-all-sensitive-data.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/attacks-over-the-air-phreaking-html-injection</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-4.jpeg</image:loc><image:caption>phreakingHTMLinjection4</image:caption><image:title>phreakingHTMLinjection4</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jesse-victors.jpeg</image:loc><image:caption>jessevictors</image:caption><image:title>jessevictors</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-5.jpeg</image:loc><image:caption>phreakingHTMLinjection5</image:caption><image:title>phreakingHTMLinjection5</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-1.jpeg</image:loc><image:caption>phreakingHTMLinjection1</image:caption><image:title>phreakingHTMLinjection1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-2.jpeg</image:loc><image:caption>phreakingHTMLinjection2</image:caption><image:title>phreakingHTMLinjection2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-3.jpeg</image:loc><image:caption>phreakingHTMLinjection3</image:caption><image:title>phreakingHTMLinjection3</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/phreaking-HTML-injection-banner.jpg</image:loc><image:caption>phreakingHTMLinjectionbanner</image:caption><image:title>phreakingHTMLinjectionbanner</image:title></image:image><lastmod>2023-09-20</lastmod></url><url><loc>https://blog.securityinnovation.com/3rd-party-it-risk-managing-the-headaches</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/headache-stress-unsplash-2x1.jpg</image:loc><image:caption>headachestressunsplash2x1</image:caption><image:title>headachestressunsplash2x1</image:title></image:image><lastmod>2021-02-16</lastmod></url><url><loc>https://blog.securityinnovation.com/navigating-the-new-era-of-social-engineering</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Social-engineering-types-v3.png</image:loc><image:caption>Socialengineeringtypesv3</image:caption><image:title>Socialengineeringtypesv3</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Navigating%20the%20New%20Era%20of%20Social%20Engineering.png</image:loc><image:caption>NavigatingtheNewEraofSocialEngineering</image:caption><image:title>NavigatingtheNewEraofSocialEngineering</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/doing-a-vishing-call_edit.webp</image:loc><image:caption>doingavishingcalledit</image:caption><image:title>doingavishingcalledit</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2025-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/bug-bounty-hunter-programs-is-your-organization-equipped</loc><lastmod>2016-08-09</lastmod></url><url><loc>https://blog.securityinnovation.com/lazy-days-in-the-cloud</loc><lastmod>2017-08-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/sony-appoints-ciso.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/boardroom-office-horizontal-unsplash-2x1.jpg</image:loc><image:caption>boardroomofficehorizontalunsplash2x1</image:caption><image:title>boardroomofficehorizontalunsplash2x1</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/02/cryptography-eprint-report-2012094-no-ntru-is-not-broken.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/new-york-state-adds-application-security-requirements-to-its-cybersecurity-regulation</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/creating-your-own-personal-threat-model-for-everyday-security</loc><lastmod>2016-11-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/secure-and-agile-can-they-go-together.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-cyber-range-new-features-part-4</loc><lastmod>2019-09-05</lastmod></url><url><loc>https://blog.securityinnovation.com/avoiding-iot-design-flaws</loc><lastmod>2021-08-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/12/the-owasp-top-10-from-break-to-build.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/cracking-a-sports-scoreboard-part-2</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-bit-differences.png</image:loc><image:caption>crackingasportsscoreboardbitdifferences</image:caption><image:title>crackingasportsscoreboardbitdifferences</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-gqrx.jpg</image:loc><image:caption>crackingasportsscoreboardgqrx</image:caption><image:title>crackingasportsscoreboardgqrx</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-urh3.png</image:loc><image:caption>crackingasportsscoreboardurh3</image:caption><image:title>crackingasportsscoreboardurh3</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-ECB.jpg</image:loc><image:caption>crackingasportsscoreboardECB</image:caption><image:title>crackingasportsscoreboardECB</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-inspectrum.png</image:loc><image:caption>crackingasportsscoreboardinspectrum</image:caption><image:title>crackingasportsscoreboardinspectrum</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-controller.jpg</image:loc><image:caption>crackingasportsscoreboardcontroller</image:caption><image:title>crackingasportsscoreboardcontroller</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-receiver.jpg</image:loc><image:caption>crackingasportsscoreboardreceiver</image:caption><image:title>crackingasportsscoreboardreceiver</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jesse-victors.jpeg</image:loc><image:caption>jessevictors</image:caption><image:title>jessevictors</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-part-2.jpg</image:loc><image:caption>crackingasportsscoreboardpart2</image:caption><image:title>crackingasportsscoreboardpart2</image:title></image:image><lastmod>2023-02-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/how-to-test-for-sniffing-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/how-to-test-for-sql-injection-bugs-step-1.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/5-questions-to-ask-for-threat-modeling-software-applications</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-01-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/12/does-jailbreaking-mobile-devices-help-security.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/vulnerability-management-not-just-off-the-shelf.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/07/qa-professionals-represent-a-unique-opportunity-to-integrate-security-into-softwar.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/05/the-ctf-toolbox.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/owasp-mobile-risks-2014-vs.-owasp-mobile-2016-release-candidate</loc><lastmod>2018-01-11</lastmod></url><url><loc>https://blog.securityinnovation.com/enhancing-cyber-resilience-through-behavior-analysis</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Enhancing%20Cyber%20Resilience%20(1).png</image:loc><image:caption>EnhancingCyberResilience1</image:caption><image:title>EnhancingCyberResilience1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/ONE-v8.1_3.png</image:loc><image:caption>ONEv813</image:caption><image:title>ONEv813</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Behavior.png</image:loc><image:caption>Behavior</image:caption><image:title>Behavior</image:title></image:image><lastmod>2025-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/streamline-your-software-fixes.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/another-year-of-data-breaches-information-security-in-2012-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/jailbreak</loc><lastmod>2019-02-26</lastmod></url><url><loc>https://blog.securityinnovation.com/owasp-mobile-top-ten-update-2024</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/owasp-mobile-security-2024.jpg</image:loc><image:caption>owaspmobilesecurity2024</image:caption><image:title>owaspmobilesecurity2024</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/create-a-threat-model-step-2.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-csnp</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/united-hands-unsplash-2x1.jpg</image:loc><image:caption>unitedhandsunsplash2x1</image:caption><image:title>unitedhandsunsplash2x1</image:title></image:image><lastmod>2020-09-16</lastmod></url><url><loc>https://blog.securityinnovation.com/celebrating-equal-pay-for-equal-work-on-equalpayday</loc><lastmod>2017-04-04</lastmod></url><url><loc>https://blog.securityinnovation.com/wrapping-up-2019-cyber-range-events</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-01-07</lastmod></url><url><loc>https://blog.securityinnovation.com/five-ways-to-discourage-malicious-attacks-from-an-it-administrator</loc><lastmod>2017-03-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/02/protecting-a-vehicle-from-hackers.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-a-hacker-guild</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-12-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/01/the-appsec-trouble-with-3rd-party-components-1.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/11/-6-steps-to-safe-email-sending.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/software-security-lessons-learned-from-the-uber-federal-trade-commission-dust-up</loc><lastmod>2021-07-07</lastmod></url><url><loc>https://blog.securityinnovation.com/white-house-cybersecurity-executive-order-wheres-the-software-security</loc><lastmod>2017-05-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/09/touch-id-security-bane-or-boon-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/constrain-reject-and-sanitize-input.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/want-to-reduce-application-security-risk-build-more-secure-software.html</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/06/swift-pros-and-cons-1.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/understanding-behavior-and-unknown-vulnerabilities-in-mobile-and-social-environments.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/best-practices-for-cybersecurity-training-programs</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cogs-gears-unsplash-2x1.jpg</image:loc><image:caption>cogsgearsunsplash2x1</image:caption><image:title>cogsgearsunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/roi-for-training-elements.png</image:loc><image:caption>roifortrainingelements</image:caption><image:title>roifortrainingelements</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/accenture-graph.png</image:loc><image:caption>accenturegraph</image:caption><image:title>accenturegraph</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/ses-quartile-rate.png</image:loc><image:caption>sesquartilerate</image:caption><image:title>sesquartilerate</image:title></image:image><lastmod>2021-11-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/04/security-innovation-is-very-excited-to-be-part-of-the-consortium-of-appsec-vendors-that-are-working-to-create-a-dataset-of-or.html</loc><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/what-i-learned-working-in-the-cybersecurity-industry</loc><lastmod>2016-11-15</lastmod></url><url><loc>https://blog.securityinnovation.com/reducing-cloud-infrastructure-risk-through-skills</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/forescient-2.png</image:loc><image:caption>forescient2</image:caption><image:title>forescient2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/forescient-1-2x1.png</image:loc><image:caption>forescient12x1</image:caption><image:title>forescient12x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/forescient-1.png</image:loc><image:caption>forescient1</image:caption><image:title>forescient1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/att&amp;ck-matrix.png</image:loc><image:caption>attckmatrix</image:caption><image:title>attckmatrix</image:title></image:image><lastmod>2020-10-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/why-software-still-stinks-its-still-insecure.html</loc><lastmod>2018-01-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/05/how-threat-modeling-saved-my-life.html</loc><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/jailbreaking-your-iphone-worth-the-security-risk</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/09/spy-car-act-forces-automakers-to-think-about-connected-car-security.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/centralize-input-validation.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/privacy_policy</loc><lastmod>2019-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/preventing-initramfs-attacks-tpm</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/main-system-tpm-diagram.png</image:loc><image:caption>mainsystemtpmdiagram</image:caption><image:title>mainsystemtpmdiagram</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/harddisk-encryption.jpg</image:loc><image:caption>harddiskencryption</image:caption><image:title>harddiskencryption</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/disk_key_log.jpeg</image:loc><image:caption>diskkeylog</image:caption><image:title>diskkeylog</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-01-24</lastmod></url><url><loc>https://blog.securityinnovation.com/cmd-ctrl-q2-2022-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><lastmod>2022-05-06</lastmod></url><url><loc>https://blog.securityinnovation.com/tips-for-conducting-effective-security-code-reviews</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/tips-for-conducting-effective-security-code-review.jpg</image:loc><image:caption>tipsforconductingeffectivesecuritycodereview</image:caption><image:title>tipsforconductingeffectivesecuritycodereview</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/privacy-impact-assessments</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/privacy-please-sign-unsplash-2x1.jpg</image:loc><image:caption>privacypleasesignunsplash2x1</image:caption><image:title>privacypleasesignunsplash2x1</image:title></image:image><lastmod>2021-06-09</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/how-to-hash-and-salt-passwords-in-aspnet.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/best-practices-for-docker-container-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/best-practices-for-docker-container-security.jpg</image:loc><image:caption>bestpracticesfordockercontainersecurity</image:caption><image:title>bestpracticesfordockercontainersecurity</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/introducing-the-new-si-csc-certification-program</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/SI-CSC-certificate.png</image:loc><image:caption>SecurityInnovationSICSCCertification</image:caption><image:title>SICSCcertificate</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/SI-CSC-certifications.jpg</image:loc><image:caption>SICSCcertifications</image:caption><image:title>SICSCcertifications</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/SI-CSC_Logo-FINAL.jpg</image:loc><image:caption>SICSCLogoFINAL</image:caption><image:title>SICSCLogoFINAL</image:title></image:image><lastmod>2023-02-28</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/06/descriptive-application-security-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/06/constraining-vs-training-developers-not-an-eitheror-decision-.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/sony-ciso-reporting-to-executive-management-maybe-cyber-security-czar-will-follow-suit.html</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/05/ruby-on-rails.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/software-total-risk-management</loc><lastmod>2020-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/validating-trust-boundaries.html</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/automotive-cybersecurity-best-practices</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2016/01/4-tips-for-securing-your-office-space.html</loc><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/lessons-learned-as-a-penetration-tester</loc><lastmod>2019-08-15</lastmod></url><url><loc>https://blog.securityinnovation.com/devsecops-in-google-cloud-platform</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture2-3.png</image:loc><image:caption>Picture23</image:caption><image:title>Picture23</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture1-3.png</image:loc><image:caption>Picture13</image:caption><image:title>Picture13</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture4-3.png</image:loc><image:caption>Picture43</image:caption><image:title>Picture43</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Picture3-3.png</image:loc><image:caption>Picture33</image:caption><image:title>Picture33</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/clouds-sky-background-unsplash.jpg</image:loc><image:caption>cloudsskybackgroundunsplash</image:caption><image:title>cloudsskybackgroundunsplash</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2016/01/when-will-quantum-computers-arrive.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-10-30</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/traditional-security-issues-mobile-security-2.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-april-2021-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><lastmod>2021-04-29</lastmod></url><url><loc>https://blog.securityinnovation.com/stride</loc><lastmod>2018-08-15</lastmod></url><url><loc>https://blog.securityinnovation.com/cybersecuritys-great-untapped-resource-women-and-minorities</loc><lastmod>2019-04-29</lastmod></url><url><loc>https://blog.securityinnovation.com/hack-through-the-holidays-cmd-ctrl_1</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2018-12-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/05/exception-handling-patterns.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/hacker-summer-camp-2019</loc><lastmod>2019-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/03/freak-encryption-vulnerability-exposes-secure-communications.html</loc><lastmod>2016-02-24</lastmod></url><url><loc>https://blog.securityinnovation.com/hack-through-the-holidays-cmd-ctrl_2-0</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://blog.securityinnovation.com/browsealoud-story</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-07-28</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/cross-site-scripting-why-is-it-still-so-prevalent.html</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/extend-security-to-the-cloud</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jelleke-vanooteghem-gnxb59lGU1M-unsplash.png</image:loc><image:caption>jellekevanooteghemgnxb59lGU1Munsplash</image:caption><image:title>jellekevanooteghemgnxb59lGU1Munsplash</image:title></image:image><lastmod>2021-01-21</lastmod></url><url><loc>https://blog.securityinnovation.com/pentesters-guide-to-evaluating-oauth-2.0</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Screen%20Shot%202020-11-13%20at%209.01.26%20PM.png</image:loc><image:caption>ScreenShot20201113at90126PM</image:caption><image:title>ScreenShot20201113at90126PM</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/maxfield-chen.jpg</image:loc><image:caption>maxfieldchen</image:caption><image:title>maxfieldchen</image:title></image:image><lastmod>2020-11-19</lastmod></url><url><loc>https://blog.securityinnovation.com/scaling-appsec-in-the-connected-enterprise</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/scaling-appsec-in-the-connected-enterprise.jpg</image:loc><image:caption>scalingappsecintheconnectedenterprise</image:caption><image:title>scalingappsecintheconnectedenterprise</image:title></image:image><lastmod>2023-01-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/03/does-security-awareness-training-actually-improve-enterprise-security-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/give-hacking-a-try</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/3000milesfromaceo</loc><lastmod>2018-11-30</lastmod></url><url><loc>https://blog.securityinnovation.com/building-a-better-security-community-for-women-and-everyone-else</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-10-10</lastmod></url><url><loc>https://blog.securityinnovation.com/profile-of-a-hacker-andre-gott</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/07/security-awareness-training-for-small-businesses-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/by-now-you-may-have-all-heard-about-the-new-york-times-being-attacked-by-a-group-of-attackers-in-china-the-group-is-well-kno.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/how-to-not-get-hacked-on-social-media</loc><lastmod>2016-11-21</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/08/developers-do-care-about-security-so-what-are-you-going-to-do-about-it-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/secure-vehicle-to-vehicle-communications-can-it-save-more-lives-than-seatbelts-1.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/are-we-doomed-to-repeat-the-security-mistakes-of-the-past</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/nice-cybersecurity-workforce-framework</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/hexagons-honeycomb-unsplash-2x1.jpg</image:loc><image:caption>hexagonshoneycombunsplash2x1</image:caption><image:title>hexagonshoneycombunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/nice-article-diagram-2.png</image:loc><image:caption>nicearticlediagram2</image:caption><image:title>nicearticlediagram2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/nice-article-diagram-1.png</image:loc><image:caption>nicearticlediagram1</image:caption><image:title>nicearticlediagram1</image:title></image:image><lastmod>2021-06-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/10/us-house-proposal-make-cars-less-safe.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/the-power-of-low-code-and-no-code-platforms</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/lcnc-blue-cyber.jpg</image:loc><image:caption>lcncbluecyber</image:caption><image:title>lcncbluecyber</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/why-responsible-disclosure-is-the-best-choice-for-security-innovation.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/05/application-security-roi-the-two-towers.html</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/todays-ciso-the-three-personality-types-technical-business-and-strategic.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://blog.securityinnovation.com/the-dark-side-of-request-routing</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/mdulin-square.jpg</image:loc><image:caption>mdulinsquare</image:caption><image:title>mdulinsquare</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/rubyonrails-2x1-unsplash.jpg</image:loc><image:caption>rubyonrails2x1unsplash</image:caption><image:title>rubyonrails2x1unsplash</image:title></image:image><lastmod>2020-07-09</lastmod></url><url><loc>https://blog.securityinnovation.com/hot-dog-and-hacking</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/hd&amp;h-background-2x1.jpg</image:loc><image:caption>hdhbackground2x1</image:caption><image:title>hdhbackground2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-06-17</lastmod></url><url><loc>https://blog.securityinnovation.com/fda-medical-device-requirements-necessary-but-not-sufficient</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/FDA-Medical-Device-Requirements-Necessary-But-Not-Sufficient.jpg</image:loc><image:caption>FDAMedicalDeviceRequirementsNecessaryButNotSufficient</image:caption><image:title>FDAMedicalDeviceRequirementsNecessaryButNotSufficient</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/how-to-test-for-sql-injection-bugs-step-3.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchainfuture</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2020-09-25</lastmod></url><url><loc>https://blog.securityinnovation.com/4-ways-to-reduce-the-cost-of-pci-compliance</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/preparing-network-documentation-for-pci-dss-and-other-compliance-requirements</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/04/gop-version-of-cybersecurity-bill-introduced.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/putting-your-code-in-an-mri-you-still-need-a-doctor.html</loc><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/a-cisos-guide-to-application-security</loc><lastmod>2017-05-01</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/07/using-the-open-source-approach-as-a-scapegoat-.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/how-to-test-for-man-in-the-middle-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/10/creating-server-emulators.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/12/delta-airlines-needs-a-privacy-policy-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/my-haystack-is-finding-that-one-needle-really-all-that-important-hint-yes-it-is.html</loc><lastmod>2016-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/04/effective-application-security-testing-a-great-security-tester-has-a-great-imagination.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/09/think-more-like-an-attacker-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/12/a-software-engineers-career-path-into-application-security.html</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/05/new-proposed-us-law-could-put-privacy-at-risk.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/teaching-young-adults-to-hack</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/common-security-flaws-in-android-development.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/authmatrix0.8</loc><lastmod>2018-03-22</lastmod></url><url><loc>https://blog.securityinnovation.com/keys-to-scaling-appsec-building-relationships-and-security-champions</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/keys-to-scaling-appsec-building-relationships-security-champions.jpg</image:loc><image:caption>keystoscalingappsecbuildingrelationshipssecuritychampions</image:caption><image:title>keystoscalingappsecbuildingrelationshipssecuritychampions</image:title></image:image><lastmod>2022-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/focus-on-input-validation.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/defensive-coding-best-practices</loc><lastmod>2017-09-19</lastmod></url><url><loc>https://blog.securityinnovation.com/the-value-of-ot-penetration-testing</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/pen%20testing%20blog.png</image:loc><image:caption>pentestingblog</image:caption><image:title>pentestingblog</image:title></image:image><lastmod>2025-03-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/10/php-security-configuring-the-phpini-file-properly.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/cracking-a-sports-scoreboard-part-3</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/ManInTheMiddle-Scoreboard.gif</image:loc><image:caption>maninthemiddleattackbetweenRFmoduleandAtmelProcessor</image:caption><image:title>ManInTheMiddleScoreboard</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-part-3-hacking-sports-scoreboard.jpg</image:loc><image:caption>crackingasportsscoreboardpart3hackingsportsscoreboard</image:caption><image:title>crackingasportsscoreboardpart3hackingsportsscoreboard</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Manchester_encoding_both_conventions.svg.png</image:loc><image:caption>manchesterencodingbothconventionssignal</image:caption><image:title>Manchesterencodingbothconventionssvg</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/hardware-hackrf-one-sdr-software-defined-radio.jpg</image:loc><image:caption>hardwarehackrfonesdrsoftwaredefinedradio</image:caption><image:title>hardwarehackrfonesdrsoftwaredefinedradio</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/discord_screenshot.jpg</image:loc><image:caption>discordscreenshot</image:caption><image:title>discordscreenshot</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/ReceiverTopBoardCommented.png</image:loc><image:caption>RFTransceiverModule</image:caption><image:title>ReceiverTopBoardCommented</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/PacketFormatLengthEmphasis.png</image:loc><image:caption>packetformatlengthemphasisondatawhiteningCRCchecksumcalculation</image:caption><image:title>PacketFormatLengthEmphasis</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/fuzz_screenshot.png</image:loc><image:caption>fuzzscreenshot</image:caption><image:title>fuzzscreenshot</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jesse-victors.jpeg</image:loc><image:caption>jessevictors</image:caption><image:title>jessevictors</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/gnuradio_flowgraph.png</image:loc><image:caption>gnuradioflowgraph</image:caption><image:title>gnuradioflowgraph</image:title></image:image><lastmod>2023-02-06</lastmod></url><url><loc>https://blog.securityinnovation.com/software-security-beyond-secure-code-training-across-the-sdlc</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/whats-all-the-talk-about-edtalks-predictions-2022.jpg</image:loc><image:caption>whatsallthetalkaboutedtalkspredictions2022</image:caption><image:title>whatsallthetalkaboutedtalkspredictions2022</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cicd-dev-ops-app-development.jpg</image:loc><image:caption>cicddevopsappdevelopment</image:caption><image:title>cicddevopsappdevelopment</image:title></image:image><lastmod>2022-07-27</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/03/how-does-agility-impact-the-security-of-software-development.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/input_validation_using_regular_expressions.html</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/digital-side-door</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/diffusion-of-innovation-why-you-need-to-adapt</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/04/eu-to-potentially-punish-publishers-of-cyber-attack-tools.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/centralize-logging.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/crypto-motion-securing-data-in-transit</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/globalsign-email-sender-authentication.png</image:loc><image:caption>globalsignemailsenderauthentication</image:caption><image:title>globalsignemailsenderauthentication</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/digitally-signed-email-delivery-receipt-request.png</image:loc><image:caption>digitallysignedemaildeliveryreceiptrequest</image:caption><image:title>digitallysignedemaildeliveryreceiptrequest</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/crypto-motion-securing-data-in-transit.jpg</image:loc><image:caption>cryptomotionsecuringdataintransit</image:caption><image:title>cryptomotionsecuringdataintransit</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://blog.securityinnovation.com/getting-started-with-local-security-groups</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-06-24</lastmod></url><url><loc>https://blog.securityinnovation.com/q3-2023-cmdctrl-update</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/library-books-unsplash-2x1.jpg</image:loc><image:caption>librarybooksunsplash2x1</image:caption><image:title>librarybooksunsplash2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/11/essential-guide-to-online-security.html</loc><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/the-security-aware-and-unaware</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/man-blindfold-adobe-2x1.jpg</image:loc><image:caption>manblindfoldadobe2x1</image:caption><image:title>manblindfoldadobe2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/dev-zombies-table.png</image:loc><image:caption>devzombiestable</image:caption><image:title>devzombiestable</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-april-2020-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/online-training-modules-images-2x1.png</image:loc><image:caption>onlinetrainingmodulesimages2x1</image:caption><image:title>onlinetrainingmodulesimages2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><lastmod>2020-04-24</lastmod></url><url><loc>https://blog.securityinnovation.com/three-questions-to-help-evaluate-your-organizations-security-posture</loc><lastmod>2016-12-02</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/04/internet-justice-social-medias-role-in-todays-justice-system.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/04/pci-dss-v-31-ssl-is-no-longer-considered-strong-crypto.html</loc><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/secret-weapon-to-diversity-and-the-job-shortage</loc><lastmod>2019-11-18</lastmod></url><url><loc>https://blog.securityinnovation.com/the-promise-the-peril-of-html5</loc><lastmod>2017-06-26</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/secure-vehicle-to-vehicle-communications-part-iv-adoption-challenges.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/11/social-engineering-on-the-silver-screen.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/understanding-security-challenges-of-media-players</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-11-30</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/01/developing-a-training-program-not-a-one-and-done-approach.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/open-source-software-security-the-nerd-is-no-longer-in-the-basement</loc><lastmod>2017-07-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/02/president-obamas-cyber-security-executive-order.html</loc><lastmod>2016-02-09</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/12/-keeping-your-mobile-devices-secure-in-five-easy-steps.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-04</lastmod></url><url><loc>https://blog.securityinnovation.com/dyn-ddos-attack-raises-concerns-about-iot-security</loc><lastmod>2017-05-25</lastmod></url><url><loc>https://blog.securityinnovation.com/google-awards-1.2-million-in-bounties-just-for-xss-bugs</loc><lastmod>2016-10-07</lastmod></url><url><loc>https://blog.securityinnovation.com/identity-and-access-management-in-aws-devsecops</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/identity-and-access-management-in-aws-devsecops.jpg</image:loc><image:caption>identityandaccessmanagementinawsdevsecops</image:caption><image:title>identityandaccessmanagementinawsdevsecops</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://blog.securityinnovation.com/whats-old-with-the-owasp-top-10-part-2</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/social-suggested-images/blog.securityinnovation.comhubfsowasp-mapping-2021-2017-2x1-1.png</image:loc><image:caption>blogsecurityinnovationcomhubfsowaspmapping202120172x11</image:caption><image:title>blogsecurityinnovationcomhubfsowaspmapping202120172x11</image:title></image:image><lastmod>2021-12-16</lastmod></url><url><loc>https://blog.securityinnovation.com/train-security-champions-in-cross-functional-devops-teams</loc><lastmod>2020-02-05</lastmod></url><url><loc>https://blog.securityinnovation.com/hot-dogs-and-hacking-2019</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://blog.securityinnovation.com/hardware-root-of-trust-bios-and-uefi</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/rope-risk-2x1.jpg</image:loc><image:caption>roperisk2x1</image:caption><image:title>roperisk2x1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/maxfield-chen.jpg</image:loc><image:caption>maxfieldchen</image:caption><image:title>maxfieldchen</image:title></image:image><lastmod>2020-12-03</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/10/intelligence-agencies-to-squeeze-savings-from-it-contractors-genius.html</loc><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/verify-the-applications-authenticity-to-the-user.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/06/application-security-optimism-for-a-new-age.html</loc><lastmod>2016-08-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/04/anatomy-of-a-distributed-denial-of-service-ddos-attack.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/compliance_mandates</loc><lastmod>2018-07-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/10/introducing-placeraider-dark-knight-inspired-malware-surveillance-1.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/glitching-firmware-over-usb-using-facewhisperer</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/09/understanding-customer-needs-and-helping-them-mature.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/07/the-2015-isc2-global-information-security-workforce-study.html</loc><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2010/12/identify-security-objectives.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/gdpr2</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/09/weaponized-cars-hackers-will-kill-us-all.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/create-a-threat-model-step-4.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/online-safety-at-work</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-08-05</lastmod></url><url><loc>https://blog.securityinnovation.com</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Defend%20the%20airport.png</image:loc><image:caption>Defendtheairport</image:caption><image:title>Defendtheairport</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Meta%20Quest.png</image:loc><image:caption>MetaQuest</image:caption><image:title>MetaQuest</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/securing%20your%20cloud.png</image:loc><image:caption>securingyourcloud</image:caption><image:title>securingyourcloud</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/LLM%20Security.png</image:loc><image:caption>LLMSecurity</image:caption><image:title>LLMSecurity</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Securing%20LLM.png</image:loc><image:caption>SecuringLLM</image:caption><image:title>SecuringLLM</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Technical%20LLM%20injection.png</image:loc><image:caption>TechnicalLLMinjection</image:caption><image:title>TechnicalLLMinjection</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/pen%20testing%20blog.png</image:loc><image:caption>pentestingblog</image:caption><image:title>pentestingblog</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/FDA%20medical%20cybersecurity.png</image:loc><image:caption>FDAmedicalcybersecurity</image:caption><image:title>FDAmedicalcybersecurity</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cyber%20trust.png</image:loc><image:caption>cybertrust</image:caption><image:title>cybertrust</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Stealing%20Firmware.png</image:loc><image:caption>StealingFirmware</image:caption><image:title>StealingFirmware</image:title></image:image><lastmod>2024-03-11</lastmod></url><url><loc>https://blog.securityinnovation.com/nist-weighs-in-on-post-quantum-cryptography</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/careers-in-cybersecurity</loc><lastmod>2018-11-07</lastmod></url><url><loc>https://blog.securityinnovation.com/buzzword-bingo-rasp</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/seven-sins-of-anti-csrf-tokens</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/harsh-bothra.jpg</image:loc><image:caption>harshbothra</image:caption><image:title>harshbothra</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/kaur-kristjan-unsplash-2x1.jpg</image:loc><image:caption>kaurkristjanunsplash2x1</image:caption><image:title>kaurkristjanunsplash2x1</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/09/an-emerging-threat-medical-identity-theft-security-awareness-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/information-security-vs-product-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/information-security-vs-product-security-who-navigates-who-steers.jpg</image:loc><image:caption>informationsecurityvsproductsecuritywhonavigateswhosteers</image:caption><image:title>informationsecurityvsproductsecuritywhonavigateswhosteers</image:title></image:image><lastmod>2023-05-08</lastmod></url><url><loc>https://blog.securityinnovation.com/defend-the-airport</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/Defend%20the%20airport.png</image:loc><image:caption>Defendtheairport</image:caption><image:title>Defendtheairport</image:title></image:image><lastmod>2025-06-04</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/partition-your-site-into-ssl-and-unsecured-areas.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/cbt-october-2020-in-review</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/jose-lazu-full.jpeg</image:loc><image:caption>joselazufull</image:caption><image:title>joselazufull</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/books-library-2x1.jpg</image:loc><image:caption>bookslibrary2x1</image:caption><image:title>bookslibrary2x1</image:title></image:image><lastmod>2020-10-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/03/testing-google-glass.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/cmdctrl-cyber-range-new-features</loc><lastmod>2019-08-13</lastmod></url><url><loc>https://blog.securityinnovation.com/ssl-and-tls-bad-practices-for-the-technical-layman</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-01-10</lastmod></url><url><loc>https://blog.securityinnovation.com/hitting-the-security-training-trifecta-content-metrics-and-governance</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/organizations-cybersecurity-posture-high-security-effectiveness-scores-SES-v2.png</image:loc><image:caption>organizationscybersecurityposturehighsecurityeffectivenessscoresSESv2</image:caption><image:title>organizationscybersecurityposturehighsecurityeffectivenessscoresSESv2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/hitting-the-security-training-trifecta.jpg</image:loc><image:caption>hittingthesecuritytrainingtrifecta</image:caption><image:title>hittingthesecuritytrainingtrifecta</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cybersecurity-training-enrollment-consumption-data.png</image:loc><image:caption>cybersecuritytrainingenrollmentconsumptiondata</image:caption><image:title>cybersecuritytrainingenrollmentconsumptiondata</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/realistic-simulation-training-role-based-training-statisticsv2.png</image:loc><image:caption>realisticsimulationtrainingrolebasedtrainingstatisticsv2</image:caption><image:title>realisticsimulationtrainingrolebasedtrainingstatisticsv2</image:title></image:image><lastmod>2023-05-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/jay-zs-got-99-problems-and-his-app-privacy-is-1-security-awareness-blog-post.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/scaling-appsec-with-quick-wins-the-right-tools-and-purple-teams</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/infosec-color-wheel-april-wright.jpg</image:loc><image:caption>infoseccolorwheelaprilwright</image:caption><image:title>infoseccolorwheelaprilwright</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/scaling-appsec-with-quick-wins-the-right-tools-purple-teams.jpg</image:loc><image:caption>scalingappsecwithquickwinstherighttoolspurpleteams</image:caption><image:title>scalingappsecwithquickwinstherighttoolspurpleteams</image:title></image:image><lastmod>2023-04-24</lastmod></url><url><loc>https://blog.securityinnovation.com/iotmyths2018-0</loc><lastmod>2018-07-06</lastmod></url><url><loc>https://blog.securityinnovation.com/just-doing-secure-code-training-how-immature</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/just-doing-secure-code-training-how-immature.jpg</image:loc><image:caption>justdoingsecurecodetraininghowimmature</image:caption><image:title>justdoingsecurecodetraininghowimmature</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/OWASP-Software-Assurance-Maturity-Model-SAMM.jpg</image:loc><image:caption>OWASPSoftwareAssuranceMaturityModelSAMM</image:caption><image:title>OWASPSoftwareAssuranceMaturityModelSAMM</image:title></image:image><lastmod>2022-09-07</lastmod></url><url><loc>https://blog.securityinnovation.com/new-cyber-range-defcon-28</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/defcon28scoreboard.png</image:loc><image:caption>defcon28scoreboard</image:caption><image:title>defcon28scoreboard</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cloud-wp-image-2x1.jpg</image:loc><image:caption>cloudwpimage2x1</image:caption><image:title>cloudwpimage2x1</image:title></image:image><lastmod>2020-08-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/05/responsible-product-management.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2015/03/looking-back-at-2014-examining-the-people-problem.html</loc><lastmod>2016-01-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/10/drupal-sql-injection.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-03-15</lastmod></url><url><loc>https://blog.securityinnovation.com/developer-turned-hacker</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2020-03-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/07/how-to-test-for-brute-force-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cyber-space-blocks.jpg</image:loc><image:caption>cyberspaceblocks</image:caption><image:title>cyberspaceblocks</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/frida</loc><lastmod>2019-03-05</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/encrypt-sql-connection-strings-with-dpapi.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/04/effective-application-security-testing-the-evil-streak.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/06/how-to-test-for-insecure-key-store-vulnerabilities.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/stealing-firmware-from-over-the-air-updates</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/firware1.png</image:loc><image:caption>firware1</image:caption><image:title>firware1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/firmware5.png</image:loc><image:caption>firmware5</image:caption><image:title>firmware5</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/firmware2.png</image:loc><image:caption>firmware2</image:caption><image:title>firmware2</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/firmware3.png</image:loc><image:caption>firmware3</image:caption><image:title>firmware3</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/firmware4.png</image:loc><image:caption>firmware4</image:caption><image:title>firmware4</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Stealing%20Firmware.png</image:loc><image:caption>StealingFirmware</image:caption><image:title>StealingFirmware</image:title></image:image><lastmod>2025-02-17</lastmod></url><url><loc>https://blog.securityinnovation.com/ssl-tls-attacks-for-the-layman-mitm-downgrade-attacks</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-02-07</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/05/doing-a-net-code-review-for-security.html</loc><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/three-security-account-features-everyone-needs-enabled</loc><lastmod>2016-09-23</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/09/automatically-lock-inactive-user-accounts.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/08/crypto-algorithm-agility-solving-our-single-point-of-failure-problem.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/08/sql-injection-why-does-it-still-exist.html</loc><lastmod>2016-03-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/03/implement-authentication-and-authorization-administration.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/01/how-to-test-for-sql-injection-bugs-step-2.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchain-security-the-impact-of-decentralization-on-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/blockchain-security-the-impact-of-decentralization-on-security.jpg</image:loc><image:caption>blockchainsecuritytheimpactofdecentralizationonsecurity</image:caption><image:title>blockchainsecuritytheimpactofdecentralizationonsecurity</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2023-03-14</lastmod></url><url><loc>https://blog.securityinnovation.com/keep-your-credit-card-safe-when-holiday-shopping-online</loc><lastmod>2016-11-29</lastmod></url><url><loc>https://blog.securityinnovation.com/2016-owasp-mobile-top-10-vulnerabilities</loc><lastmod>2019-06-13</lastmod></url><url><loc>https://blog.securityinnovation.com/ssl-tls-attacks-for-the-layman-bad-implementation</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-12-19</lastmod></url><url><loc>https://blog.securityinnovation.com/code-assisted-pen-test</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2018-03-27</lastmod></url><url><loc>https://blog.securityinnovation.com/rsa_cyberrange</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-02-28</lastmod></url><url><loc>https://blog.securityinnovation.com/avoiding-nebulous-cloud-privacy-policies</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/clouds-sky-background-unsplash.jpg</image:loc><image:caption>cloudsskybackgroundunsplash</image:caption><image:title>cloudsskybackgroundunsplash</image:title></image:image><lastmod>2021-07-07</lastmod></url><url><loc>https://blog.securityinnovation.com/creating-your-own-personal-threat-model</loc><lastmod>2017-04-17</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/08/use-named-queries-with-hibernate.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/iotbestpracticesforhome</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/profiles-of-student-hackers</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/windows-laptop-backpack.jpg</image:loc><image:caption>windowslaptopbackpack</image:caption><image:title>windowslaptopbackpack</image:title></image:image><lastmod>2020-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/mobile-risk-and-threats-part-i</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-08-16</lastmod></url><url><loc>https://blog.securityinnovation.com/purple-team-qa</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/sandro-katalina-k1bO_VTiZSs-unsplash.jpg</image:loc><image:caption>sandrokatalinak1bOVTiZSsunsplash</image:caption><image:title>sandrokatalinak1bOVTiZSsunsplash</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://blog.securityinnovation.com/cracking-a-sports-scoreboard-part-1</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cracking-a-sports-scoreboard-part-1.jpg</image:loc><image:caption>crackingasportsscoreboardpart1</image:caption><image:title>crackingasportsscoreboardpart1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/scoreboard.jpg</image:loc><image:caption>scoreboard</image:caption><image:title>scoreboard</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/OSI_Model_v1.png</image:loc><image:caption>OSIModelv1</image:caption><image:title>OSIModelv1</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/key-fob-fsk-rtl-sdr.jpg</image:loc><image:caption>keyfobfskrtlsdr</image:caption><image:title>keyfobfskrtlsdr</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Dipole_anim.gif</image:loc><image:caption>Dipoleanim</image:caption><image:title>Dipoleanim</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/jesse-victors.jpeg</image:loc><image:caption>jessevictors</image:caption><image:title>jessevictors</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/Fsk.png</image:loc><image:caption>Fsk</image:caption><image:title>Fsk</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/the-cybersecurity-skills-gap-defcon</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2019-08-15</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchain</loc><lastmod>2019-02-28</lastmod></url><url><loc>https://blog.securityinnovation.com/what-the-tesla-autopilot-crash-tells-us-about-the-need-for-v2v-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-09-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/08/facebook-accused-of-deceiving-developers-over-security-assessments.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/12/social-media-tips.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-04</lastmod></url><url><loc>https://blog.securityinnovation.com/ftc-issues-sanctions-for-insecure-software</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/software-as-fuel</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/security-innovation-software-as-fuel.jpg</image:loc><image:caption>securityinnovationsoftwareasfuel</image:caption><image:title>securityinnovationsoftwareasfuel</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://blog.securityinnovation.com/march-hackness-is-coming</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/chad-holmes-150x150.jpg</image:loc><image:caption>chadholmes150x150</image:caption><image:title>chadholmes150x150</image:title></image:image><lastmod>2019-03-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/06/mac-windows-safer.html</loc><lastmod>2016-02-11</lastmod></url><url><loc>https://blog.securityinnovation.com/spectre-meltdown-vulnerabilities-cutting-to-the-chase</loc><lastmod>2018-01-08</lastmod></url><url><loc>https://blog.securityinnovation.com/next-generation-cyber-security-skills-development</loc><lastmod>2019-07-25</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/04/partition-the-application-between-public-and-private-areas.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/10/code-assisted-penetration-testing-of-a-nodejs-app.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-17</lastmod></url><url><loc>https://blog.securityinnovation.com/why-attackers-target-social-media-and-how-to-protect-your-accounts</loc><lastmod>2016-08-22</lastmod></url><url><loc>https://blog.securityinnovation.com/securing-your-cloud</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/securing%20your%20cloud.png</image:loc><image:caption>securingyourcloud</image:caption><image:title>securingyourcloud</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2025-03-21</lastmod></url><url><loc>https://blog.securityinnovation.com/how-to-avoid-phishing-scams-this-tax-season</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2017-02-03</lastmod></url><url><loc>https://blog.securityinnovation.com/testing-the-security-of-nfc-and-rfid</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/proxmark3-cables1-500px.jpg</image:loc><image:caption>proxmark3cables1500px</image:caption><image:title>proxmark3cables1500px</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/maxfield-chen.jpg</image:loc><image:caption>maxfieldchen</image:caption><image:title>maxfieldchen</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/christopher-gower-m_HRfLhgABo-unsplash2x1.png</image:loc><image:caption>christophergowermHRfLhgABounsplash2x1</image:caption><image:title>christophergowermHRfLhgABounsplash2x1</image:title></image:image><lastmod>2020-12-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/09/security-awareness-training-defense-in-depth-strategy-1.html</loc><lastmod>2016-02-08</lastmod></url><url><loc>https://blog.securityinnovation.com/us-gao-tells-us-dot-to-define-its-role-in-automotive-cybersecurity</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-08-18</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/02/bring-your-own-deviceand-cross-your-fingers.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/could-being-nice-to-employees-prevent-a-data-breach</loc><lastmod>2016-11-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/01/a-few-security-awareness-lessons-learned-from-healthcaregov-1.html</loc><lastmod>2016-02-23</lastmod></url><url><loc>https://blog.securityinnovation.com/the-impact-of-the-cybersecurity-education-crisis-at-us-undergraduate-institutions</loc><lastmod>2016-08-23</lastmod></url><url><loc>https://blog.securityinnovation.com/cybersecurity-trends-2021</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/k8-r87zX1RWECQ-unsplash-1.jpg</image:loc><image:caption>k8r87zX1RWECQunsplash1</image:caption><image:title>k8r87zX1RWECQunsplash1</image:title></image:image><lastmod>2021-01-14</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2013/01/hardening-your-banking-applications-from-attack.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><lastmod>2016-02-10</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2016/02/finding-the-right-mix-of-automated-and-manual-security-testing.html</loc><lastmod>2016-08-19</lastmod></url><url><loc>https://blog.securityinnovation.com/know-your-threats-to-reduce-the-most-application-security-risk</loc><lastmod>2017-01-19</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/03/effective-application-security-testing-complete-knowledge-of-the-system.html</loc><lastmod>2021-12-29</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2014/10/how-to-interview-at-security-innovation.html</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/hiring-process-si.jpg</image:loc><image:caption>hiringprocesssi</image:caption><image:title>hiringprocesssi</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.securityinnovation.com/changes-on-the-horizon-for-medical-device-software-developers</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/changes-on-horizon-for-medical-device-software-developers.jpg</image:loc><image:caption>changesonhorizonformedicaldevicesoftwaredevelopers</image:caption><image:title>changesonhorizonformedicaldevicesoftwaredevelopers</image:title></image:image><lastmod>2023-04-24</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2012/03/doing-application-security-training-right-part-one.html</loc><lastmod>2016-02-12</lastmod></url><url><loc>https://blog.securityinnovation.com/making-application-security-fun-and-approachable</loc><lastmod>2016-11-16</lastmod></url><url><loc>https://blog.securityinnovation.com/blog/2011/02/csslp-good-but-just-a-start-for-secure-development-professionals.html</loc><lastmod>2019-06-25</lastmod></url><url><loc>https://blog.securityinnovation.com/http-desync-request-smuggling-attacks</loc><lastmod>2020-01-15</lastmod></url><url><loc>https://blog.securityinnovation.com/a-new-journey-to-better-software-security</loc><image:image><image:loc>https://web.securityinnovation.com/hubfs/cybersecurity-job-openings-vs-cyber-workforced.jpg</image:loc><image:caption>cybersecurityjobopeningsvscyberworkforced</image:caption><image:title>cybersecurityjobopeningsvscyberworkforced</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/golden-triangle-people-process-technology.jpg</image:loc><image:caption>goldentrianglepeopleprocesstechnology</image:caption><image:title>goldentrianglepeopleprocesstechnology</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/cmd-ctrl-base-camp-logo.png</image:loc><image:caption>cmdctrlbasecamplogo</image:caption><image:title>cmdctrlbasecamplogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/si-lock-logo.jpg</image:loc><image:caption>securityinnovationlogomark</image:caption><image:title>silocklogo</image:title></image:image><image:image><image:loc>https://web.securityinnovation.com/hubfs/whats-all-the-talk-about-edtalks-predictions-2022.jpg</image:loc><image:caption>whatsallthetalkaboutedtalkspredictions2022</image:caption><image:title>whatsallthetalkaboutedtalkspredictions2022</image:title></image:image><lastmod>2023-02-06</lastmod></url><url><loc>https://blog.securityinnovation.com/blockchain-ctf</loc><lastmod>2018-08-27</lastmod></url></urlset>