<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersectalk.com/2026/03/25/how-i-built-a-log-validation-sop-for-siem-using-acsc-standards-with-a-reusable-template/</loc><lastmod>2026-03-24T11:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2025/03/28/essential-detection-tools-for-owasp-top-10-vulnerabilities-in-llms/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2025/03/securing-large-language-models-1.png</image:loc><image:title>securing-large-language-models</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2025/03/securing-large-language-models.png</image:loc><image:title>securing-large-language-models</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/security-for-artificial-intelligence.png</image:loc><image:title>security-for-artificial-intelligence</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/security-for-ai.png</image:loc><image:title>security-for-ai</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/securing-ai.png</image:loc><image:title>securing-ai</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/securing-large-language-models.png</image:loc><image:title>securing-large-language-models</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/securing-large-language-models-with-proper-detection-controls-1.png</image:loc><image:title>securing-large-language-models-with-proper-detection-controls</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/securing-large-language-models-with-proper-detection-controls.png</image:loc><image:title>securing-large-language-models-with-proper-detection-controls</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-13T20:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/about/</loc><lastmod>2025-03-31T01:36:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersectalk.com/soc-resources/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/06/tools.jpg</image:loc><image:title>tools</image:title></image:image><lastmod>2025-03-28T05:23:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersectalk.com/2021/04/14/breach-and-attack-simulation-bas-products-compared/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/04/breach-and-attack-simulation-tool.png</image:loc><image:title>breach-and-attack-simulation-tool</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/04/bas.jpg</image:loc><image:title>Breach attack simulation</image:title><image:caption>Photo by ThisIsEngineering from Pexels
</image:caption></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/safebreach.jpg</image:loc><image:title>safebreach</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/picus.jpg</image:loc><image:title>picus</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/logo-cymulate-cmyk-vertical-black.png</image:loc><image:title>logo Cymulate-cmyk-vertical-black</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/xm_cyber_logo_horizontal-507x72-1-300x42-1.png</image:loc><image:title>XM_Cyber_logo_horizontal-507x72-1-300x42</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/scythe.jpg</image:loc><image:title>scythe</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/attack.jpg</image:loc><image:title>attack</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/03/forsetti.jpg</image:loc><image:title>forsetti</image:title></image:image><lastmod>2024-10-28T22:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2023/11/14/how-to-monitor-and-protect-your-aws-account-from-high-privilege-and-disruptive-api-calls/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/11/cloud-api-security.png</image:loc><image:title>cloud-api-security</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/11/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/07/cloud_security.jpg</image:loc><image:title>cloud_security</image:title></image:image><lastmod>2024-10-28T22:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/blog-feed/</loc><lastmod>2024-10-26T05:49:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersectalk.com/2019/07/14/installing-unknown-software-read-this-before-you-proceed/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2019/07/unknown.jpg</image:loc><image:title>unknown</image:title></image:image><lastmod>2023-05-20T02:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2023/05/23/cyber-security-career-options-and-getting-started-part-1/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/ciso-bg.png</image:loc><image:title>ciso-bg</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/forensics_analyst-bg.png</image:loc><image:title>forensics_analyst-bg</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/pen_tester-bg.png</image:loc><image:title>pen_tester-bg</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/security_analyst.png</image:loc><image:title>security_analyst</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/cyber-security.jpg</image:loc><image:title>cyber-security</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/ciso.jpg</image:loc><image:title>ciso</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/security_auditor.png</image:loc><image:title>security_auditor</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/forensics_analyst.png</image:loc><image:title>forensics_analyst</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/sec_architect-1.jpg</image:loc><image:title>sec_architect-1</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2023/05/sec_architect.jpg</image:loc><image:title>sec_architect</image:title></image:image><lastmod>2023-05-20T02:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2020/05/29/events-of-interest-to-monitor-in-cisco-asa-firewall-ips/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/05/analytics-3088958_1280.jpg</image:loc><image:title>Logs</image:title></image:image><lastmod>2023-05-20T02:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2019/07/24/password-hygiene-how-to-create-strong-passwords-and-manage-them/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2019/07/security-2168233_640.jpg</image:loc><image:title>strong_password_management</image:title></image:image><lastmod>2023-01-31T14:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2019/08/19/active-directory-password-audit-using-pwned-passwords/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2019/08/audit-3929140_640.jpg</image:loc><image:title>audit-3929140_640</image:title></image:image><lastmod>2021-09-02T03:14:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2021/08/09/how-to-monitor-and-detect-malicious-powershell-scripts/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2021/08/powershell.jpg</image:loc><image:title>powershell</image:title></image:image><lastmod>2021-08-13T04:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2020/06/26/how-to-reduce-noise-in-your-siem/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/06/siem-noise-2.jpg</image:loc><image:title>SIEM-noise-2</image:title></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/06/siem_noise.jpg</image:loc><image:title>SIEM_noise</image:title></image:image><lastmod>2021-08-08T11:44:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2020/08/27/how-to-protect-your-organization-using-essential-eight-mitigation-strategy/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/08/pexels-miguel-a-padrinan-1061135-1-e1615976604388.jpg</image:loc><image:title>pexels-miguel-á-padriñán-1061135</image:title><image:caption>
Photo by Miguel Á. Padriñán from Pexels
</image:caption></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/08/pexels-miguel-a-padrinan-1061135.jpg</image:loc><image:title>Essential-Eight</image:title><image:caption>Photo by Miguel Á. Padriñán from Pexels</image:caption></image:image><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2020/08/pexels-photo-1061135.jpeg</image:loc><image:title>pexels-photo-1061135.jpeg</image:title><image:caption>Photo by Miguel u00c1. Padriu00f1u00e1n on &lt;a href="https://www.pexels.com/photo/gray-motorcycle-chain-form-number-8-1061135/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-06-30T01:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2019/07/06/how-to-secure-your-pc-from-ransomware/</loc><image:image><image:loc>https://cybersectalk.com/wp-content/uploads/2019/07/ransomware-2321665_640.png</image:loc><image:title>ransomware-2321665_640</image:title></image:image><lastmod>2021-03-16T04:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com/2019/07/04/cybersec-talk-intro/</loc><lastmod>2020-05-27T11:24:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersectalk.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-24T11:31:05+00:00</lastmod></url></urlset>
