<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 3 April 2026 at 19:10 by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybersecurityshawn.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>cybersecurityshawn.com</title>
		<link><![CDATA[https://cybersecurityshawn.com]]></link>
		<description><![CDATA[cybersecurityshawn.com]]></description>
		<lastBuildDate><![CDATA[Tue, 29 Aug 2023 11:00:00 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybersecurityshawn.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybersecurityshawn.com/navigating-the-implications-of-googles-90-day-tls-certificate-expiration/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/navigating-the-implications-of-googles-90-day-tls-certificate-expiration/]]></link>
			<title>Navigating the Implications of Google&#8217;s 90-Day TLS Certificate Expiration</title>
			<pubDate><![CDATA[Tue, 29 Aug 2023 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/a-deep-dive-into-microsofts-august-2023-patch-release-what-enterprises-need-to-know/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/a-deep-dive-into-microsofts-august-2023-patch-release-what-enterprises-need-to-know/]]></link>
			<title>A Deep Dive into Microsoft&#8217;s August 2023 Patch Release: What Enterprises Need to Know</title>
			<pubDate><![CDATA[Thu, 10 Aug 2023 18:24:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/sabsa-and-enterprise-security-frameworks-current-state-enhancement-needs-for-modernization/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/sabsa-and-enterprise-security-frameworks-current-state-enhancement-needs-for-modernization/]]></link>
			<title>SABSA and Enterprise Security Frameworks: Current State &#038; Enhancement Needs For Modernization</title>
			<pubDate><![CDATA[Sun, 24 Aug 2025 22:29:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/game-of-threats-winter-is-coming-for-unsecured-apis/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/game-of-threats-winter-is-coming-for-unsecured-apis/]]></link>
			<title>Game of Threats: Winter is Coming for Unsecured APIs</title>
			<pubDate><![CDATA[Tue, 15 Aug 2023 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/understanding-the-new-cyber-threat-autonomous-llms-as-hackers/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/understanding-the-new-cyber-threat-autonomous-llms-as-hackers/]]></link>
			<title>Understanding the New Cyber Threat: Autonomous LLMs as Hackers</title>
			<pubDate><![CDATA[Sun, 25 Feb 2024 02:27:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/feed-templates/default/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/feed-templates/default/]]></link>
			<title>Default</title>
			<pubDate><![CDATA[Sun, 13 Aug 2023 15:24:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/addressing-the-latest-vulnerabilities-in-data-centers-top-concerns-for-businesses/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/addressing-the-latest-vulnerabilities-in-data-centers-top-concerns-for-businesses/]]></link>
			<title>Addressing the Latest Vulnerabilities in Data Centers: Top Concerns for Businesses</title>
			<pubDate><![CDATA[Sun, 13 Aug 2023 15:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/get-out-of-the-whirlpool-a-look-into-the-barracuda-esg-security-breach/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/get-out-of-the-whirlpool-a-look-into-the-barracuda-esg-security-breach/]]></link>
			<title>Get Out of the Whirlpool: A Look into the Barracuda ESG Security Breach</title>
			<pubDate><![CDATA[Sat, 12 Aug 2023 14:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/insight-into-codesys-vulnerabilities-a-look-into-industrial-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/insight-into-codesys-vulnerabilities-a-look-into-industrial-cybersecurity/]]></link>
			<title>Insight into CODESYS Vulnerabilities: A Look into Industrial Cybersecurity</title>
			<pubDate><![CDATA[Mon, 14 Aug 2023 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/safeguarding-critical-infrastructure-analyzing-the-cisa-and-nsa-esf-guidance/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/safeguarding-critical-infrastructure-analyzing-the-cisa-and-nsa-esf-guidance/]]></link>
			<title>Safeguarding Critical Infrastructure: Analyzing the CISA and NSA ESF Guidance</title>
			<pubDate><![CDATA[Fri, 11 Aug 2023 19:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/embracing-third-party-services-for-enhanced-security-operations-a-strategic-hybrid-approach/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/embracing-third-party-services-for-enhanced-security-operations-a-strategic-hybrid-approach/]]></link>
			<title>Embracing Third-Party Services for Enhanced Security Operations: A Strategic Hybrid Approach</title>
			<pubDate><![CDATA[Fri, 11 Aug 2023 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/safeguarding-wi-fi-settings-an-essential-step-in-information-technology-disposal/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/safeguarding-wi-fi-settings-an-essential-step-in-information-technology-disposal/]]></link>
			<title>Safeguarding Wi-Fi Settings: An Essential Step in Information Technology Disposal</title>
			<pubDate><![CDATA[Wed, 09 Aug 2023 13:06:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/the⁤-evolution-of-a-cyber-threat-unveiling-wormgpt-the-ai-chatbot-malware-writer/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/the⁤-evolution-of-a-cyber-threat-unveiling-wormgpt-the-ai-chatbot-malware-writer/]]></link>
			<title>Harnessing AI in Cybersecurity: The Double-Edged Sword of WormGPT</title>
			<pubDate><![CDATA[Tue, 08 Aug 2023 23:17:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/a-look-at-north-koreas-infiltration-of-russian-defense-systems/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/a-look-at-north-koreas-infiltration-of-russian-defense-systems/]]></link>
			<title>A Look at North Korea&#8217;s Infiltration of Russian Defense Systems</title>
			<pubDate><![CDATA[Tue, 08 Aug 2023 20:50:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/understanding-the-citrix-zero-day-vulnerability-an-expert-analysis-for-business-leaders/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/understanding-the-citrix-zero-day-vulnerability-an-expert-analysis-for-business-leaders/]]></link>
			<title>Understanding the Citrix Zero-Day Vulnerability: An Expert Analysis for Business Leaders</title>
			<pubDate><![CDATA[Tue, 08 Aug 2023 20:38:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/cyber⁤-attackers⁤-catch⁤-a-cloud-nine-unmasking-the-latest-mischief-through-cloudflare-tunnel/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/cyber⁤-attackers⁤-catch⁤-a-cloud-nine-unmasking-the-latest-mischief-through-cloudflare-tunnel/]]></link>
			<title>Cyber⁤ Attackers⁤ Catch⁤ a Cloud Nine: Unmasking the Latest Mischief through Cloudflare Tunnel!</title>
			<pubDate><![CDATA[Tue, 08 Aug 2023 18:31:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/leveraging-generative-ai-in-cybersecurity-a-look-into-foretraces-tim/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/leveraging-generative-ai-in-cybersecurity-a-look-into-foretraces-tim/]]></link>
			<title>Leveraging Generative AI in Cybersecurity: A Look into Foretrace&#8217;s &#8220;Tim&#8221;</title>
			<pubDate><![CDATA[Thu, 17 Aug 2023 21:22:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/deepening-the-darkness-shedding⁢-light-on-the-expanding⁤-realm-⁣of-the-dark-web/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/deepening-the-darkness-shedding⁢-light-on-the-expanding⁤-realm-⁣of-the-dark-web/]]></link>
			<title>Deepening the Darkness: Shedding⁢ Light on the Expanding⁤ Realm ⁣of the Dark Web</title>
			<pubDate><![CDATA[Mon, 07 Aug 2023 23:53:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/cvss-4-0-unleashing-the-cybersecurity-scoring-revolution-separating-the-scoremongers-from-the-scorebusters/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/cvss-4-0-unleashing-the-cybersecurity-scoring-revolution-separating-the-scoremongers-from-the-scorebusters/]]></link>
			<title>CVSS 4.0: Unleashing the Cybersecurity Scoring Revolution – Separating the Scoremongers from the Scorebusters!</title>
			<pubDate><![CDATA[Mon, 07 Aug 2023 22:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/the-wild⁤-west-of-cybersecurity-unveiling-the-rise-of-ransomware-amid-the-⁤zero-day-and-one-day-vulnerability-epidemic/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/the-wild⁤-west-of-cybersecurity-unveiling-the-rise-of-ransomware-amid-the-⁤zero-day-and-one-day-vulnerability-epidemic/]]></link>
			<title>The Wild⁤ West of Cybersecurity: Unveiling the Rise of ‍Ransomware Amid the ⁤Zero-Day and One-Day Vulnerability Epidemic</title>
			<pubDate><![CDATA[Mon, 07 Aug 2023 22:39:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/breaking-free-from-cyber-extortion-decrypting-the-dangers-of-ransom-payments/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/breaking-free-from-cyber-extortion-decrypting-the-dangers-of-ransom-payments/]]></link>
			<title>Breaking Free from Cyber Extortion: Decrypting the Dangers​ of Ransom Payments</title>
			<pubDate><![CDATA[Mon, 07 Aug 2023 13:22:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/the-cyber-counterattack-unveiling⁤-the-essence-of-delaney-brownes-cyber-assault/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/the-cyber-counterattack-unveiling⁤-the-essence-of-delaney-brownes-cyber-assault/]]></link>
			<title>The Cyber Counterattack: Unveiling⁤ the Essence of Delaney Browne&#8217;s Cyber Assault</title>
			<pubDate><![CDATA[Mon, 07 Aug 2023 13:12:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/how-many-cybersecurity-architects-does-it-take-to-change-a-lightbulb/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/how-many-cybersecurity-architects-does-it-take-to-change-a-lightbulb/]]></link>
			<title>How many cybersecurity architects does it take to change a lightbulb?</title>
			<pubDate><![CDATA[Sun, 06 Aug 2023 20:32:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/unlocking-the-cyber-future⁢-when-ai-meets-humanity-in-the-battle-⁢against-cybercrime/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/unlocking-the-cyber-future⁢-when-ai-meets-humanity-in-the-battle-⁢against-cybercrime/]]></link>
			<title>Unlocking the Cyber Future:⁢ When AI Meets ‌Humanity in the Battle ⁢Against Cybercrime</title>
			<pubDate><![CDATA[Sun, 06 Aug 2023 18:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/navigating-state-sponsored-threats-a-business-leaders-guide-to-staying-ahead/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/navigating-state-sponsored-threats-a-business-leaders-guide-to-staying-ahead/]]></link>
			<title>Navigating State-Sponsored Threats: A Business Leader&#8217;s Guide to Staying Ahead</title>
			<pubDate><![CDATA[Fri, 25 Aug 2023 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/the-art-of-communicating-with-your-ciso-cracking-the-code-to-get-your-cybersecurity-messages-across/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/the-art-of-communicating-with-your-ciso-cracking-the-code-to-get-your-cybersecurity-messages-across/]]></link>
			<title>The‌ Art of Communicating with your CISO: Cracking​ the Code to ​Get Your​ Cybersecurity Messages Across</title>
			<pubDate><![CDATA[Sun, 06 Aug 2023 13:09:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/the-sound-of-security-unmasking-the-villains-in-the-world-of-voice-deepfakes/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/the-sound-of-security-unmasking-the-villains-in-the-world-of-voice-deepfakes/]]></link>
			<title>The Sound of Security:‌ Unmasking the Villains in​ the World of Voice Deepfakes</title>
			<pubDate><![CDATA[Sun, 06 Aug 2023 13:02:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/strategic-budgeting-and-resource-allocation-unlocking-the-secret-to-safeguarding-your-organizations-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/strategic-budgeting-and-resource-allocation-unlocking-the-secret-to-safeguarding-your-organizations-cybersecurity/]]></link>
			<title>Strategic Budgeting and Resource Allocation: Unlocking the Secret to Safeguarding Your Organization&#8217;s Cybersecurity</title>
			<pubDate><![CDATA[Sat, 05 Aug 2023 00:01:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/about-me/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/about-me/]]></link>
			<title>About Me</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 21:20:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/assessing-and-managing-cyber-risks-a-guide-for-business-leaders/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/assessing-and-managing-cyber-risks-a-guide-for-business-leaders/]]></link>
			<title>Assessing and Managing Cyber Risks: A Introduction for Business Leaders</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 20:27:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/lessons-learned-from-burger-kings-data-leak-incident/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/lessons-learned-from-burger-kings-data-leak-incident/]]></link>
			<title>Security Is King &#8211; Lessons Learned From Burger King&#8217;s Data Leak Incident</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 20:26:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/request-a-post-topic/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/request-a-post-topic/]]></link>
			<title>Ask A Cybersecurity Architect</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 20:18:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/cybersecurity-threats-protecting-your-organization-from-the-greatest-risks/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/cybersecurity-threats-protecting-your-organization-from-the-greatest-risks/]]></link>
			<title>Cybersecurity Threats: Protecting Your Organization from the Greatest Risks</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 19:04:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/critical-care-in-crisis-ransomware-attack-halt-services-at-prospect-medical-holdings-facilities/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/critical-care-in-crisis-ransomware-attack-halt-services-at-prospect-medical-holdings-facilities/]]></link>
			<title>Analysis: Critical Care in Crisis &#8211; Ransomware in the Medical Sector</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:58:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/mysterious-team-bangladesh-targeting-india-lessons-for-businesses-in-addressing-similar-cybersecurity-challenges/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/mysterious-team-bangladesh-targeting-india-lessons-for-businesses-in-addressing-similar-cybersecurity-challenges/]]></link>
			<title>Analysis: &#8220;Mysterious Team Bangladesh&#8221; Hactivism Attacks &#8211; Lessons for Businesses in Addressing Similar Cybersecurity Challenges</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:49:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/industrial-control-systems-vulnerabilities-soar-key-lessons-for-businesses-to-strengthen-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/industrial-control-systems-vulnerabilities-soar-key-lessons-for-businesses-to-strengthen-cybersecurity/]]></link>
			<title>Industrial Control Systems (ICS) Vulnerabilities Trend Upward &#8211; Key Lessons for Businesses to Strengthen Cybersecurity</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:48:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/apt31-suspected-in-attacks-on-air-gapped-systems-lessons-for-businesses/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/apt31-suspected-in-attacks-on-air-gapped-systems-lessons-for-businesses/]]></link>
			<title>Analysis: APT31 Attacks on Air-Gapped Systems &#8211; Lessons for Businesses</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:47:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/new-sec-rules-a-paradigm-shift-towards-enhanced-cybersecurity-disclosure/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/new-sec-rules-a-paradigm-shift-towards-enhanced-cybersecurity-disclosure/]]></link>
			<title>New SEC Rules and the Impact on Enhanced Cybersecurity Disclosure</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:47:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/unveiling-the-malware-proxy-service-socksescort-lessons-learned-and-business-considerations/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/unveiling-the-malware-proxy-service-socksescort-lessons-learned-and-business-considerations/]]></link>
			<title>Analysis: AVrecon &#038; Malware Proxy Service SocksEscort &#8211; Lessons Learned and Business Considerations</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:46:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/patchwork-hackers-target-chinese-research-organizations-using-eyeshell-backdoor/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/patchwork-hackers-target-chinese-research-organizations-using-eyeshell-backdoor/]]></link>
			<title>Analysis: Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:45:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/when-your-teammate-is-a-machine-assessing-ai-in-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/when-your-teammate-is-a-machine-assessing-ai-in-cybersecurity/]]></link>
			<title>Is Your Teammate is a Machine? &#8211; Assessing Business Use of AI Impacts On Cybersecurity</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/lessons-learned-from-the-russian-midnight-blizzard-hackers-targeting-microsoft-teams-a-cybersecurity-perspective/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/lessons-learned-from-the-russian-midnight-blizzard-hackers-targeting-microsoft-teams-a-cybersecurity-perspective/]]></link>
			<title>Lessons Learned from the Russian &#8216;Midnight Blizzard&#8217; Hackers Targeting Microsoft Teams: A Cybersecurity Architecture Perspective</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:43:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/strengthening-uefi-security-lessons-learned-and-strategies-for-businesses/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/strengthening-uefi-security-lessons-learned-and-strategies-for-businesses/]]></link>
			<title>UEFI Security: Lessons learned and strategies for businesses</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:41:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/addressing-cybersecurity-challenges-in-the-era-of-artificial-intelligence/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/addressing-cybersecurity-challenges-in-the-era-of-artificial-intelligence/]]></link>
			<title>Artificial Intelligence &#8211; AI Powered Cybersecurity Challenges and How To Address Them</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:41:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/is-ai-a-security-nightmare-or-the-future-of-defense/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/is-ai-a-security-nightmare-or-the-future-of-defense/]]></link>
			<title>AI &#8211; A Security Nightmare, Or Cybersecurity Enabler?</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/vulcan-cyber-launches-predictive-risk-prioritization-through-new-ml-capability/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/vulcan-cyber-launches-predictive-risk-prioritization-through-new-ml-capability/]]></link>
			<title>Vulcan Cyber &#8211; New ML Capability for Predictive Risk Prioritization</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:39:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/russian-cyberspies-defeat-microsoft-2fa-policy-with-fake-teams-messages/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/russian-cyberspies-defeat-microsoft-2fa-policy-with-fake-teams-messages/]]></link>
			<title>Russian Cyberspies, Microsoft 2FA Compromised, Oh My</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:38:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/uk-calls-artificial-intelligence-a-chronic-risk-to-its-national-security/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/uk-calls-artificial-intelligence-a-chronic-risk-to-its-national-security/]]></link>
			<title>Artificial Intelligence &#8211; &#8220;Chronic Risk&#8221; per UK &#8211; What It Means For You</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:37:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/google-microsoft-take-refuge-in-rust-languages-better-security/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/google-microsoft-take-refuge-in-rust-languages-better-security/]]></link>
			<title>Rust in Peace &#8211; A Better Programming Language (From A Cybersecurity Perspective)</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:31:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecurityshawn.com/teach-a-man-to-phish-and-hes-set-for-life/]]></guid>
			<link><![CDATA[https://cybersecurityshawn.com/teach-a-man-to-phish-and-hes-set-for-life/]]></link>
			<title>Here Phishy Phishy Phishy &#8211; How To Address Phishing in 2023</title>
			<pubDate><![CDATA[Fri, 04 Aug 2023 15:30:45 +0000]]></pubDate>
		</item>
				</channel>
</rss>
