<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2026-04-01-when-your-source-maps-ship-your-source/</loc>
    <lastmod>2026-04-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2026-03-06-agentic-ai-security/</loc>
    <lastmod>2026-03-06T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2026-03-05-you-have-a-soc-you-have-runbooks-youre-still-not-ready-for-this/</loc>
    <lastmod>2026-03-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2026-02-16-ai-governance-architecture/</loc>
    <lastmod>2026-02-16T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-12-12-postquantum-readiness/</loc>
    <lastmod>2025-12-12T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-11-07-cloud-runtime-exposure/</loc>
    <lastmod>2025-11-07T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-10-21-softwarechain/</loc>
    <lastmod>2025-10-21T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-09-09-identity-governance-meets-machines/</loc>
    <lastmod>2025-09-09T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-08-14-ai-agents-get-privileges/</loc>
    <lastmod>2025-08-14T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-07-16-industry40/</loc>
    <lastmod>2025-07-16T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-06-25-mitre_atlas/</loc>
    <lastmod>2025-06-25T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-06-18-mastering-threat-modelling-for-ai/</loc>
    <lastmod>2025-06-18T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-06-12-ai-on-the-offensive/</loc>
    <lastmod>2025-06-12T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-05-15-federated-learning-security-ai/</loc>
    <lastmod>2025-05-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-05-15-federated-learning/</loc>
    <lastmod>2025-05-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-04-11-securing-the-edge-ai/</loc>
    <lastmod>2025-04-11T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-03-17-zero-trust-for-ai/</loc>
    <lastmod>2025-03-17T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-02-12-hardware-enforced-ai-security/</loc>
    <lastmod>2025-02-12T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2025-01-14-adversarial-robustness-pipelines/</loc>
    <lastmod>2025-01-14T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-12-19-architecture-01-mach/</loc>
    <lastmod>2024-12-19T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-09-15-on-secure-mobile-os/</loc>
    <lastmod>2024-09-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-08-26-securing-iot/</loc>
    <lastmod>2024-08-26T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-08-05-micro-segmentation/</loc>
    <lastmod>2024-08-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-07-20-quantum-computing/</loc>
    <lastmod>2024-07-20T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-07-11-beyond-cryptocurrency/</loc>
    <lastmod>2024-07-11T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-06-24-serverless-architecture/</loc>
    <lastmod>2024-06-24T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-05-17-the-security-of-ai-06-incidentresponse/</loc>
    <lastmod>2024-05-17T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-04-05-the-security-of-ai-05-inexplicability/</loc>
    <lastmod>2024-04-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-03-21-the-security-of-ai-04-securing-the-model-development-pipeline/</loc>
    <lastmod>2024-03-21T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-03-05-the-security-of-ai-03-inversion-attacks/</loc>
    <lastmod>2024-03-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-02-27-the-security-of-ai-02-data-poisoning/</loc>
    <lastmod>2024-02-27T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-02-09-the-security-of-ai-01-prompt-injection/</loc>
    <lastmod>2024-02-09T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-01-26-securinggenerativeai/</loc>
    <lastmod>2024-01-26T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-01-25-aws-iam-container-security/</loc>
    <lastmod>2024-01-25T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2024-01-16-aws-container-security/</loc>
    <lastmod>2024-01-16T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-11-15-cultivating-cyber-resilience/</loc>
    <lastmod>2023-11-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-09-12-pentesting-and-the-soc/</loc>
    <lastmod>2023-09-12T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-08-12-ciso-series-fantastic-organisation/</loc>
    <lastmod>2023-08-12T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-07-31-ciso-series-fantastic-communication/</loc>
    <lastmod>2023-07-31T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-07-21-ciso-series-first-two-weeks/</loc>
    <lastmod>2023-07-21T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-06-25-setting-cybersecurity-priorities-for-your-team/</loc>
    <lastmod>2023-06-25T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-06-05-3rd-party-risk-assessments/</loc>
    <lastmod>2023-06-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-05-29-ai-and-ml-for-cybersecurity-in-financial-services/</loc>
    <lastmod>2023-05-29T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-04-19-creating-and-supporting-cybersecurity-teams/</loc>
    <lastmod>2023-04-19T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-04-11-cyber-risks-in-supply-chain-management/</loc>
    <lastmod>2023-04-11T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-03-23-reclaiming-our-online-privacy/</loc>
    <lastmod>2023-03-23T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-02-22-robust-security-operations-teams/</loc>
    <lastmod>2023-02-22T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2023-01-02-secure-summits-cybersecurity-in-mountain-sports/</loc>
    <lastmod>2023-01-02T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2022-12-15-the-power-of-threat-intelligence/</loc>
    <lastmod>2022-12-15T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/2022-10-17-threat-modelling-in-the-development-pipeline/</loc>
    <lastmod>2022-10-17T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/about/</loc>
    <lastmod>2000-01-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/</loc>
    <lastmod>2026-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/allposts/</loc>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/posts/</loc>
    <lastmod>2026-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>http://allthingsonsecurity.com/references/</loc>
  </url>
  
</urlset>