<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cisoperspective.com/about/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/contact-us.png</image:loc><image:title>contact-us</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/andy-about2a.png</image:loc><image:title>Andy-About2a</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/andy-about1a.png</image:loc><image:title>Andy-About1a</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/tcp-top.png</image:loc><image:title>TCP-top</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/aboutus3.png</image:loc><image:title>AboutUs3</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/aboutus2.png</image:loc><image:title>AboutUs2</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/09/aboutus1.png</image:loc><image:title>AboutUs1</image:title></image:image><lastmod>2025-09-06T14:29:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisoperspective.com/2025/06/19/chatgpt-for-offensive-security-five-attacks/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/06/gpt2-blog.png</image:loc><image:title>GPT2-blog</image:title></image:image><lastmod>2025-08-22T01:52:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/07/03/breaking-the-kill-chain-a-defensive-approach/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/killchain-blog.png</image:loc><image:title>KillChain-Blog</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-22T01:47:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/07/09/how-photo-deepfakes-are-made-with-stable-diffusion-a-complete-guide/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/deepfakes-blog.png</image:loc><image:title>Deepfakes-Blog</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/a.i.png</image:loc><image:title>A.I.</image:title></image:image><lastmod>2025-08-22T01:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/07/21/what-is-sovereign-sase-architecture-benefits-and-how-it-works/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/copy-of-ssase-thumbnail-1000-x-1000-px.png</image:loc><image:title>Copy of SSASE Thumbnail (1000 x 1000 px)</image:title></image:image><lastmod>2025-08-22T01:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/08/01/zero-trust-architecture-nist-800-207-explained-principles-components-and-workflow/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/08/copy-of-copy-of-ssase-thumbnail-1000-x-1000-px.png</image:loc><image:title>Copy of Copy of SSASE Thumbnail (1000 x 1000 px)</image:title></image:image><lastmod>2025-08-22T01:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/08/21/zero-trust-in-practice-mapping-nist-800-207-to-real-world-technologies/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/08/youtube-thumbnail-zta2-1000-x-1000-px.png</image:loc><image:title>YouTube Thumbnail - ZTA2 (1000 x 1000 px)</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/08/maxresdefault.jpg</image:loc><image:title>maxresdefault</image:title></image:image><lastmod>2025-08-22T01:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/01/10/2024-verizon-data-breach-investigations-report-key-trends-and-lessons-learned/</loc><lastmod>2025-08-10T12:26:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/05/20/what-is-zero-trust-network-access-ztna-the-zero-trust-model-framework-and-technologies-explained/</loc><lastmod>2025-08-09T14:46:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/07/13/next-gen-firewall-sizing-5-things-to-look-for/</loc><lastmod>2025-08-09T14:45:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/04/22/8-endpoint-security-considerations-for-your-next-gen-av-part-2/</loc><lastmod>2025-08-09T14:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/03/16/10-endpoint-security-considerations-for-your-next-gen-av-part-1/</loc><lastmod>2025-08-09T14:44:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2023/08/13/t-mobile-data-breach-timeline-analysis-and-lessons-learned/</loc><lastmod>2025-08-09T14:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/08/31/accomplishing-zero-trust-security-using-sdp/</loc><lastmod>2025-08-09T14:44:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2023/11/07/the-iran-cyber-threat-what-you-need-to-know/</loc><lastmod>2025-08-09T14:43:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/06/08/understanding-software-bill-of-materials-sbom-and-its-role-in-software-supply-chain/</loc><lastmod>2025-08-09T14:41:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/05/28/2567/</loc><lastmod>2025-08-09T14:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/05/18/how-to-become-a-product-manager/</loc><lastmod>2025-08-09T14:37:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/05/05/exploits-explained-how-log4j-buffer-overflows-and-other-exploits-work/</loc><lastmod>2025-08-09T14:36:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/04/28/what-is-aiops-and-mlops-artificial-intelligence-for-it-operations-explained/</loc><lastmod>2025-08-09T14:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/04/03/what-is-xdr-vs-edr-vs-mdr-breaking-down-extended-detection-and-response/</loc><lastmod>2025-08-09T14:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/04/13/hacking-two-factor-authentication-four-methods-for-bypassing-2fa-and-mfa/</loc><lastmod>2025-08-09T14:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/03/05/what-is-machine-learning-a-i-models-algorithm-and-learning-explained/</loc><lastmod>2025-08-09T14:30:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/02/23/all-you-need-to-know-about-open-source-intelligence-osint/</loc><lastmod>2025-08-09T13:45:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/02/21/cyber-security-kill-chain-active-reconnaissance-overview-methodology-and-tools/</loc><lastmod>2025-08-09T13:44:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/02/04/what-is-sase-here-is-all-you-need-to-know/</loc><lastmod>2025-08-09T13:44:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/01/15/how-to-use-canary-tokens/</loc><lastmod>2025-08-09T13:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2025/01/07/five-ways-to-defend-against-firewall-evaders/</loc><lastmod>2025-08-09T13:42:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/12/07/five-reasons-not-to-virtualize-your-network-perimeter/</loc><lastmod>2025-08-09T13:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/11/07/5-effective-tricks-to-secure-your-sd-wan/</loc><lastmod>2025-08-09T13:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/10/03/attck-matrix-the-enemies-playbook/</loc><lastmod>2025-08-09T13:33:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/2024/09/19/securing-your-aws-vpc-with-a-next-gen-firewall/</loc><lastmod>2025-08-09T13:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisoperspective.com/contact/</loc><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/08/contact-us.png</image:loc><image:title>Contact-Us</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/contact-us3.png</image:loc><image:title>Contact-Us3</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/contact-us2-trimmed.png</image:loc><image:title>Contact-Us2-Trimmed</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/contact-us-trimmed.png</image:loc><image:title>Contact-Us-Trimmed</image:title></image:image><image:image><image:loc>https://cisoperspective.com/wp-content/uploads/2025/07/business-people-shaking-hands-agreement.jpg</image:loc><image:title>Business people shaking hands in agreement</image:title><image:caption>Business people shaking hands in agreement</image:caption></image:image><lastmod>2025-08-02T02:46:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisoperspective.com/articles/</loc><lastmod>2025-07-31T17:41:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisoperspective.com/youtube/</loc><lastmod>2023-02-25T03:22:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisoperspective.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-09-06T14:29:11+00:00</lastmod></url></urlset>
