<?xml version="1.0" encoding="utf-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://infosecinstitute.com/authors/keatron-evans/</loc><lastmod>2025-07-23T00:54:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-prathab-packiaraj/</loc><lastmod>2025-07-23T00:54:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jason-welsh/</loc><lastmod>2025-07-23T00:54:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ryan-fitzpatrick/</loc><lastmod>2025-07-23T00:54:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/matt-campagnola/</loc><lastmod>2025-07-23T00:54:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nick-valenteen/</loc><lastmod>2025-07-23T00:54:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-english/</loc><lastmod>2025-07-23T00:54:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/j-kenneth-magee/</loc><lastmod>2025-07-23T00:54:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/denise-duffy/</loc><lastmod>2025-07-23T00:54:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ross-casanova/</loc><lastmod>2025-07-23T00:54:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mike-meyers/</loc><lastmod>2025-07-23T00:54:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-wagnon/</loc><lastmod>2025-07-23T00:54:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kevin-carter/</loc><lastmod>2025-07-23T00:54:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-mcmillen/</loc><lastmod>2025-07-23T00:54:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/gina-napier/</loc><lastmod>2025-07-23T00:54:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aaron-saray/</loc><lastmod>2025-07-23T00:54:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-bandler/</loc><lastmod>2025-07-23T00:54:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/carolyn-ahlers/</loc><lastmod>2025-07-23T00:54:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/howard-poston/</loc><lastmod>2025-11-19T13:45:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/emmanuel-tsukerman/</loc><lastmod>2025-07-23T00:54:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/martin-dubois/</loc><lastmod>2025-07-23T00:54:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/manuel-leos-rivas/</loc><lastmod>2025-07-23T00:54:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/christopher-stevens/</loc><lastmod>2025-07-23T00:54:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ben-jacobson/</loc><lastmod>2025-07-23T00:54:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/hans-petrich/</loc><lastmod>2025-07-23T00:54:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/april-powers/</loc><lastmod>2025-07-23T00:54:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris-bingham/</loc><lastmod>2025-07-23T00:54:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-myers/</loc><lastmod>2025-07-23T00:54:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/marc-quibell/</loc><lastmod>2025-07-23T00:54:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/luciana-obregon/</loc><lastmod>2025-07-23T00:54:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joseph-south/</loc><lastmod>2025-07-23T00:54:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/larry-ricker/</loc><lastmod>2025-07-23T00:54:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/geoffrey-hill/</loc><lastmod>2025-07-23T00:54:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chrys-thorsen/</loc><lastmod>2025-07-23T00:54:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jasmine-jackson/</loc><lastmod>2025-07-23T00:54:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/austin-songer/</loc><lastmod>2025-07-23T00:54:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mark-viglione/</loc><lastmod>2025-07-23T00:54:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/debra-baker/</loc><lastmod>2025-07-23T00:54:55+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/cicero-chimbanda/</loc><lastmod>2025-07-23T00:54:55+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/amber-schroader/</loc><lastmod>2025-07-23T00:54:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dave-hatter/</loc><lastmod>2025-07-23T00:54:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/matt-carey/</loc><lastmod>2025-07-23T00:54:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/matt-tesauro/</loc><lastmod>2025-07-23T00:54:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mitko-katsev/</loc><lastmod>2025-07-23T00:54:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ralph-obrien/</loc><lastmod>2025-07-23T00:54:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nikolas-behar/</loc><lastmod>2025-07-23T00:54:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-morel/</loc><lastmod>2025-07-23T00:54:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stephanie-domas/</loc><lastmod>2025-07-23T00:55:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/vladimir-de-turckheim/</loc><lastmod>2025-07-23T00:55:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ted-harrington/</loc><lastmod>2025-07-23T00:55:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kurt-pomeroy/</loc><lastmod>2025-07-23T00:55:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sean-flaherty/</loc><lastmod>2025-07-23T00:55:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/latoya-jamison/</loc><lastmod>2025-07-23T00:55:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tonya-davis/</loc><lastmod>2023-07-14T12:48:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/petre-venesz/</loc><lastmod>2025-07-23T00:55:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris-sienko/</loc><lastmod>2025-07-23T00:49:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jeff-peters/</loc><lastmod>2026-04-02T16:40:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/megan-sawle/</loc><lastmod>2025-07-23T00:49:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tyler-schultz/</loc><lastmod>2025-07-23T00:49:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/darren-dalasta/</loc><lastmod>2025-07-23T00:49:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kenneth-magee/</loc><lastmod>2025-07-23T00:49:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jeremy-martin/</loc><lastmod>2025-07-23T00:49:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/giuseppe-bonfa/</loc><lastmod>2025-07-23T00:49:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/russ-mcree/</loc><lastmod>2025-07-23T00:49:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stephen-bradshaw/</loc><lastmod>2025-07-23T00:49:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alec-waters/</loc><lastmod>2024-01-26T21:13:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mourad-ben-lakhoua/</loc><lastmod>2025-07-23T00:49:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/azim-poonawala/</loc><lastmod>2025-07-23T00:49:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tom-olzak/</loc><lastmod>2025-07-23T00:49:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yiannis-kakavas/</loc><lastmod>2025-07-23T00:49:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tasos-laskos/</loc><lastmod>2025-07-23T00:49:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrew-whitaker/</loc><lastmod>2025-07-23T00:49:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/brian-greenberg/</loc><lastmod>2025-07-23T00:49:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ken-johnson/</loc><lastmod>2025-07-23T00:49:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mark-wireman/</loc><lastmod>2025-07-23T00:49:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/walter-goulet/</loc><lastmod>2024-01-19T20:52:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/arvind-doraiswamy/</loc><lastmod>2025-07-23T00:49:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nicolas-krassas/</loc><lastmod>2025-07-23T00:49:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dan-morrill/</loc><lastmod>2025-07-23T00:49:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/len-marzigliano/</loc><lastmod>2025-07-23T00:49:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ian-palmer/</loc><lastmod>2025-07-23T00:49:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/prateek-gianchandani/</loc><lastmod>2025-07-23T00:49:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/deepanker-verma/</loc><lastmod>2025-07-23T00:49:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/carl-benedict/</loc><lastmod>2025-07-23T00:49:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/hari-krishnan/</loc><lastmod>2025-07-23T00:49:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/arthur-reese/</loc><lastmod>2025-07-23T00:49:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/parul-garg/</loc><lastmod>2025-07-23T00:49:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mike-sheward/</loc><lastmod>2025-07-23T00:49:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/satish-b/</loc><lastmod>2025-07-23T00:49:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sudhanshu-chauhan/</loc><lastmod>2025-07-23T00:49:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jethro-inwald/</loc><lastmod>2025-07-23T00:49:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/brad-haines/</loc><lastmod>2025-07-23T00:49:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-fox/</loc><lastmod>2025-07-23T00:49:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/quequero/</loc><lastmod>2025-07-23T00:49:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/anonymous/</loc><lastmod>2025-07-23T00:49:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tim-heard/</loc><lastmod>2025-07-23T00:49:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yasser-aboukir/</loc><lastmod>2025-07-23T00:49:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/anthony-kasza/</loc><lastmod>2025-07-23T00:49:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/scott-miller/</loc><lastmod>2025-07-23T00:49:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jose-abreu/</loc><lastmod>2025-07-23T00:49:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mcgraw-hill/</loc><lastmod>2024-01-19T21:14:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/israel-torres/</loc><lastmod>2025-07-23T00:49:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tamir-lkhamsuren/</loc><lastmod>2025-07-23T00:49:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jay-turla/</loc><lastmod>2025-07-23T00:49:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rupesh-hankare/</loc><lastmod>2025-07-23T00:49:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rishi-narang/</loc><lastmod>2025-07-23T00:49:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rorot/</loc><lastmod>2025-07-23T00:49:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chong-rong-hwa/</loc><lastmod>2025-07-23T00:49:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kyriakos-economou/</loc><lastmod>2025-07-23T00:49:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joshua/</loc><lastmod>2025-07-23T00:49:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/adrian-stolarski/</loc><lastmod>2025-07-23T00:49:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ahmed-mohamed/</loc><lastmod>2025-07-23T00:49:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/darmawan-salihun/</loc><lastmod>2025-07-23T00:49:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dejan-lukan/</loc><lastmod>2025-11-18T20:12:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/irfan-shakeel/</loc><lastmod>2025-07-23T00:49:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/akash-mahajan/</loc><lastmod>2025-07-23T00:49:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/carl-j-mueller/</loc><lastmod>2025-07-23T00:49:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/frank-siemons/</loc><lastmod>2025-07-23T00:49:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nk-mccarthy/</loc><lastmod>2025-07-23T00:49:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sofiane-chafai/</loc><lastmod>2025-07-23T00:49:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shaun-peapell/</loc><lastmod>2025-07-23T00:49:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/soufiane-tahiri/</loc><lastmod>2025-07-23T00:49:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/carol-smith/</loc><lastmod>2025-07-23T00:49:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/raj-chandel/</loc><lastmod>2025-07-23T00:49:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ayoub-faouzi/</loc><lastmod>2025-07-23T00:49:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dame-jovanoski/</loc><lastmod>2025-07-23T00:49:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/darril-gibson/</loc><lastmod>2025-07-23T00:49:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/pierluigi-paganini/</loc><lastmod>2025-11-18T20:01:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/d12d0x34x/</loc><lastmod>2025-07-23T00:49:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-lambert/</loc><lastmod>2025-07-23T00:49:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/victor-marak/</loc><lastmod>2025-07-23T00:49:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/daniel-dimov/</loc><lastmod>2025-07-23T00:49:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/devesh-bhatt/</loc><lastmod>2025-07-23T00:49:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stuart-gentry/</loc><lastmod>2025-07-23T00:49:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aparajit-i/</loc><lastmod>2025-07-23T00:49:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/lucas-stolarski/</loc><lastmod>2025-07-23T00:49:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrew-sandoval/</loc><lastmod>2025-07-23T00:49:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dan-manolescu/</loc><lastmod>2025-07-23T00:49:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/pavitra-shankdhar/</loc><lastmod>2025-07-23T00:49:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aditya-balapure/</loc><lastmod>2025-07-23T00:49:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/wm-arthur-conklin/</loc><lastmod>2025-07-23T00:49:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/terry-komperda/</loc><lastmod>2025-07-23T00:49:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/infosec/</loc><lastmod>2025-07-23T00:49:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dimitar-kostadinov/</loc><lastmod>2025-07-23T00:49:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/audi-1/</loc><lastmod>2025-07-23T00:49:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ivan-dimov/</loc><lastmod>2025-07-23T00:49:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/emanuele-de-lucia/</loc><lastmod>2025-07-23T00:49:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ard3n7/</loc><lastmod>2025-07-23T00:49:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/daniel-gold/</loc><lastmod>2025-07-23T00:49:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-coulter/</loc><lastmod>2025-07-23T00:49:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ninjs3c/</loc><lastmod>2025-07-23T00:49:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jesse-valentin/</loc><lastmod>2025-07-23T00:49:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/vp-prabhakaran/</loc><lastmod>2025-07-23T00:49:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kamal-b/</loc><lastmod>2025-07-23T00:49:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/adrian-birsan/</loc><lastmod>2025-07-23T00:49:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/gadi007/</loc><lastmod>2025-07-23T00:49:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ajay-yadav/</loc><lastmod>2025-07-23T00:49:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/bhavesh-naik/</loc><lastmod>2025-07-23T00:49:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/keith-debus/</loc><lastmod>2025-07-23T00:49:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/flavio-de-cristofaro/</loc><lastmod>2025-07-23T00:49:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alexander-polyakov/</loc><lastmod>2025-07-23T00:49:55+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dawid-czagan/</loc><lastmod>2025-07-23T00:49:55+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-g-laskey/</loc><lastmod>2025-07-23T00:49:55+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/vipereye/</loc><lastmod>2025-07-23T00:49:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shashank/</loc><lastmod>2025-07-23T00:49:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/m-g/</loc><lastmod>2025-07-23T00:49:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sudeep-singh/</loc><lastmod>2025-07-23T00:49:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jonathan-lampe/</loc><lastmod>2025-07-23T00:49:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/lysa-myers/</loc><lastmod>2025-07-23T00:49:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stephan-jukic/</loc><lastmod>2025-07-23T00:49:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/karthik/</loc><lastmod>2025-07-23T00:49:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/warlock/</loc><lastmod>2025-07-23T00:49:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/laurent-mathieu/</loc><lastmod>2025-07-23T00:49:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alex-horan/</loc><lastmod>2025-07-23T00:49:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/steve-lynch/</loc><lastmod>2025-07-23T00:49:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/d12d0x34x2/</loc><lastmod>2025-07-23T00:49:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-barnes/</loc><lastmod>2025-07-23T00:49:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/daniel-regalado/</loc><lastmod>2025-07-23T00:50:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nutan-panda/</loc><lastmod>2025-07-23T00:50:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/souhail-hammou/</loc><lastmod>2025-07-23T00:50:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chintan-gurjar/</loc><lastmod>2025-07-23T00:50:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/interference-security/</loc><lastmod>2025-07-23T00:50:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/anthony-freed/</loc><lastmod>2025-07-23T00:50:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mohit-rawat/</loc><lastmod>2025-07-23T00:50:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/hussam-khrais/</loc><lastmod>2025-07-23T00:50:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/coder-geek/</loc><lastmod>2025-07-23T00:50:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shubham-mittal/</loc><lastmod>2025-07-23T00:50:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/amar-nath/</loc><lastmod>2025-07-23T00:50:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris.stoneff</loc><lastmod>2025-05-08T15:54:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/secrat/</loc><lastmod>2025-07-23T00:50:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-clawson/</loc><lastmod>2025-07-23T00:50:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris-stoneff/</loc><lastmod>2025-07-23T00:50:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/revers3r/</loc><lastmod>2025-07-23T00:50:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/srinivas/</loc><lastmod>2025-11-18T20:05:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/gaurav-kwatra/</loc><lastmod>2025-07-23T00:50:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/osanda-jayathissa/</loc><lastmod>2025-07-23T00:50:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tobias-mccurry/</loc><lastmod>2025-07-23T00:50:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/adam-laub/</loc><lastmod>2025-07-23T00:50:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/calum-macleod/</loc><lastmod>2025-07-23T00:50:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tony-pepper/</loc><lastmod>2025-07-23T00:50:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jayanthi/</loc><lastmod>2025-07-23T00:50:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tim-varkalis/</loc><lastmod>2025-07-23T00:50:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nikhil-kumar/</loc><lastmod>2025-07-23T00:50:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kurt-ellzey/</loc><lastmod>2025-07-23T00:50:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/diederik-perk-and-peter-rietveld/</loc><lastmod>2025-07-23T00:50:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/pranshu-bajpai/</loc><lastmod>2025-07-23T00:50:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dan-virgillito/</loc><lastmod>2025-07-23T00:50:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/breaking-technology/</loc><lastmod>2025-07-23T00:50:08+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/scott-hammer/</loc><lastmod>2025-07-23T00:50:08+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-kerpan/</loc><lastmod>2025-07-23T00:50:08+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/apoorv-srivastava/</loc><lastmod>2025-07-23T00:50:09+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kenneth-leeser/</loc><lastmod>2025-07-23T00:50:09+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/richard-sands/</loc><lastmod>2025-07-23T00:50:09+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ajay-patel/</loc><lastmod>2025-07-23T00:50:09+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kevin-jones/</loc><lastmod>2025-07-23T00:50:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joseph-rex/</loc><lastmod>2025-07-23T00:50:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/fabio-natalucci/</loc><lastmod>2025-07-23T00:50:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alex-berger/</loc><lastmod>2025-07-23T00:50:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ali-qamar/</loc><lastmod>2025-07-23T00:50:11+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tim-obrien/</loc><lastmod>2025-07-23T00:50:11+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aj-kumar/</loc><lastmod>2024-01-26T21:07:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/poojitha-trivedi/</loc><lastmod>2025-07-23T00:50:11+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/daniel-brecht/</loc><lastmod>2025-07-23T00:50:11+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jamal-chahir/</loc><lastmod>2025-07-23T00:50:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shaman-vilen/</loc><lastmod>2025-07-23T00:50:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tri-sumarno/</loc><lastmod>2025-07-23T00:50:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/edwin-covert/</loc><lastmod>2025-07-23T00:50:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sharon-solomon/</loc><lastmod>2025-07-23T00:50:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/peter-lindley/</loc><lastmod>2025-07-23T00:50:13+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aurelius/</loc><lastmod>2025-07-23T00:50:13+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ashiq-ja/</loc><lastmod>2025-07-23T00:50:13+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/satyam-singh/</loc><lastmod>2025-07-23T00:50:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jatin-jain/</loc><lastmod>2025-07-23T00:50:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/theodoros-arambatzis/</loc><lastmod>2025-07-23T00:50:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joey-cusimano/</loc><lastmod>2025-07-23T00:50:15+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ahmed-lekssays/</loc><lastmod>2025-07-23T00:50:15+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mike-fleck/</loc><lastmod>2025-07-23T00:50:15+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/charlie-greenberg/</loc><lastmod>2025-07-23T00:50:16+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sean-wade/</loc><lastmod>2025-07-23T00:50:16+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ryan-mazerik/</loc><lastmod>2025-07-23T00:50:16+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/s.-o</loc><lastmod>2025-07-23T00:50:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jim-evans/</loc><lastmod>2025-07-23T00:50:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ryan-fahey/</loc><lastmod>2025-07-23T00:50:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-kidd/</loc><lastmod>2025-07-23T00:50:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aleksander-czarnowski/</loc><lastmod>2025-07-23T00:50:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/farhan-khan/</loc><lastmod>2025-07-23T00:50:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/lavasoft/</loc><lastmod>2025-07-23T00:50:19+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/secure-data-mgt/</loc><lastmod>2025-07-23T00:50:19+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mattia-reggiani/</loc><lastmod>2025-07-23T00:50:20+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joey-song/</loc><lastmod>2025-07-23T00:50:20+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-balaban/</loc><lastmod>2025-07-23T00:50:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrei-antipov/</loc><lastmod>2025-07-23T00:50:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/hashim-shaikh/</loc><lastmod>2025-07-23T00:50:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/navdeep-sethi/</loc><lastmod>2025-07-23T00:50:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/arvind-vishwakarma/</loc><lastmod>2025-07-23T00:50:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aditya-gupta/</loc><lastmod>2025-07-23T00:50:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yash-tiwari/</loc><lastmod>2025-07-23T00:50:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yassine-aboukir/</loc><lastmod>2025-07-23T00:50:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/venkat-reddy/</loc><lastmod>2025-07-23T00:50:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jamie-shterev/</loc><lastmod>2025-07-23T00:50:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ravi-das/</loc><lastmod>2025-07-23T00:50:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris-st-jean/</loc><lastmod>2025-07-23T00:50:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/raghu-chakravartula/</loc><lastmod>2025-07-23T00:50:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nikos-danopoulos/</loc><lastmod>2025-07-23T00:50:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sahil-dhar/</loc><lastmod>2025-07-23T00:50:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ifeanyi-egede/</loc><lastmod>2025-07-23T00:50:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/secvulture/</loc><lastmod>2025-07-23T00:50:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tyra-appleby/</loc><lastmod>2025-07-23T00:50:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stephen-moramarco/</loc><lastmod>2025-07-23T00:50:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/randi-sherman/</loc><lastmod>2025-07-23T00:50:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/penny-hoelscher/</loc><lastmod>2025-07-23T00:50:26+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/susan-morrow/</loc><lastmod>2025-11-18T20:08:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ki-nang-yip/</loc><lastmod>2025-07-23T00:50:26+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/justin-king/</loc><lastmod>2025-07-23T00:50:26+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kondah-hamza/</loc><lastmod>2025-07-23T00:50:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/salman-shahid/</loc><lastmod>2025-07-23T00:50:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nikolaos-kamarinakis/</loc><lastmod>2025-07-23T00:50:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yimi-hu/</loc><lastmod>2025-07-23T00:50:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aaditya-purani/</loc><lastmod>2025-07-23T00:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/krist-rash/</loc><lastmod>2025-07-23T00:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jim-acord/</loc><lastmod>2025-07-23T00:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/winston-m/</loc><lastmod>2025-07-23T00:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chiragh-dewan/</loc><lastmod>2025-07-23T00:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/achraf-belaarch/</loc><lastmod>2025-07-23T00:50:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrea-giuseppe/</loc><lastmod>2025-07-23T00:50:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-schwass/</loc><lastmod>2025-07-23T00:50:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/suraj-prakash/</loc><lastmod>2025-07-23T00:50:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mahwish-khan/</loc><lastmod>2025-07-23T00:50:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrei/</loc><lastmod>2024-01-10T16:07:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/claudio-dodt/</loc><lastmod>2025-07-23T00:50:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sumit-bhattacharya/</loc><lastmod>2025-07-23T00:50:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/yaron-ziner/</loc><lastmod>2025-07-23T00:50:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/priyanka-pareek/</loc><lastmod>2025-07-23T00:50:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/harpreet-singh/</loc><lastmod>2025-07-23T00:50:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/security-ninja/</loc><lastmod>2025-07-23T00:50:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrea-pierini/</loc><lastmod>2025-07-23T00:50:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/eslam-elkobia/</loc><lastmod>2025-07-23T00:50:31+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/antonio-cocomazzi/</loc><lastmod>2025-07-23T00:50:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/olusegun-ogunsina/</loc><lastmod>2025-07-23T00:50:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/miller-henley/</loc><lastmod>2025-07-23T00:50:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/graeme-messina/</loc><lastmod>2025-07-23T00:50:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/fakhar-imam/</loc><lastmod>2025-07-23T00:50:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sayaala/</loc><lastmod>2025-12-01T21:49:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kieran-sullivan/</loc><lastmod>2025-07-23T00:50:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nitesh-malviya/</loc><lastmod>2025-07-23T00:50:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/lester-obbayi/</loc><lastmod>2025-07-23T00:50:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jennifer-jeffers/</loc><lastmod>2025-07-23T00:50:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/aroosa-ashraf/</loc><lastmod>2025-07-23T00:50:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/uladzislau-murashka/</loc><lastmod>2025-07-23T00:50:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sara-a/</loc><lastmod>2025-07-23T00:50:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/hannah-george/</loc><lastmod>2025-07-23T00:50:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/pedro-tavares/</loc><lastmod>2025-11-18T20:11:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kapil-kulkarni/</loc><lastmod>2025-07-23T00:50:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/suresh-khutale/</loc><lastmod>2025-07-23T00:50:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jenna-hulbert/</loc><lastmod>2025-07-23T00:50:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/anand-varia/</loc><lastmod>2025-07-23T00:50:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/preetam-kaushik/</loc><lastmod>2025-07-23T00:50:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/richard-azu/</loc><lastmod>2025-07-23T00:50:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rob-valentine/</loc><lastmod>2025-07-23T00:50:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/beth-osborne/</loc><lastmod>2025-10-05T16:12:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/greg-belding/</loc><lastmod>2025-07-23T00:50:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-henshell/</loc><lastmod>2025-07-23T00:50:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/brian-hickey/</loc><lastmod>2025-07-23T00:50:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rodika-tollefson/</loc><lastmod>2025-07-23T00:50:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/nick-congleton/</loc><lastmod>2025-07-23T00:50:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/varvara/</loc><lastmod>2025-07-23T00:50:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/adeolu-owokade/</loc><lastmod>2025-07-23T00:50:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/muhammad-furqan/</loc><lastmod>2025-07-23T00:50:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-mallory/</loc><lastmod>2025-07-23T00:50:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shubham-vashist/</loc><lastmod>2025-07-23T00:50:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/youness-zougar/</loc><lastmod>2025-07-23T00:50:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kristin-zurovitch/</loc><lastmod>2025-07-23T00:50:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/camille-raymond/</loc><lastmod>2025-07-23T00:50:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tolulope-ogunsina/</loc><lastmod>2025-07-23T00:50:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-burke/</loc><lastmod>2025-07-23T00:50:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/paris-arau/</loc><lastmod>2025-07-23T00:50:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/laszlo-szijjarto/</loc><lastmod>2025-07-23T00:50:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/christine-mckenzie/</loc><lastmod>2025-07-23T00:50:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/daniel-goldberg/</loc><lastmod>2025-07-23T00:50:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/liviu-arsene/</loc><lastmod>2025-07-23T00:50:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/infosec-institute/</loc><lastmod>2025-07-23T00:50:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/olivia-scott/</loc><lastmod>2024-01-10T16:07:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/james-herrin/</loc><lastmod>2025-07-23T00:50:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/matthew-jones/</loc><lastmod>2025-07-23T00:50:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/karen-walsh/</loc><lastmod>2025-07-23T00:50:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tiffany-lewis/</loc><lastmod>2025-07-23T00:50:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shachar-shamir/</loc><lastmod>2025-07-23T00:50:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/rahni-sumler/</loc><lastmod>2025-07-23T00:50:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mosimilolu-odusanya/</loc><lastmod>2025-07-23T00:50:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/gilad-maayan/</loc><lastmod>2025-07-23T00:50:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/thomas-herrell/</loc><lastmod>2025-07-23T00:50:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/mehmat-khalid/</loc><lastmod>2025-07-23T00:50:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/letspen-test/</loc><lastmod>2025-07-23T00:50:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alissa-knight/</loc><lastmod>2024-01-10T16:07:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/robert-johnson/</loc><lastmod>2025-07-23T00:50:46+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/marcel-deniau/</loc><lastmod>2025-07-23T00:50:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/john-dickson/</loc><lastmod>2025-07-23T00:50:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/sam-fay/</loc><lastmod>2025-07-23T00:50:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/shreya-verma/</loc><lastmod>2025-07-23T00:50:47+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-bisson/</loc><lastmod>2025-07-23T00:50:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/a-s/</loc><lastmod>2025-07-23T00:50:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/cyber-pop-up/</loc><lastmod>2025-07-23T00:50:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jeff-mccollum/</loc><lastmod>2025-07-23T00:50:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/brian-ruddock/</loc><lastmod>2025-07-23T00:50:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chloe-polancich/</loc><lastmod>2025-07-23T00:50:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/bernard-brode/</loc><lastmod>2025-07-23T00:50:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/anastasios-arampatzis/</loc><lastmod>2025-07-23T00:50:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/kimberly-doyle/</loc><lastmod>2025-07-23T00:50:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ben-hartwig/</loc><lastmod>2025-07-23T00:50:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/bianca-gonzalez/</loc><lastmod>2025-07-23T00:50:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/alex-morgan/</loc><lastmod>2025-07-23T00:50:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/elise-chan/</loc><lastmod>2025-07-23T00:50:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/david-strom/</loc><lastmod>2025-07-23T00:50:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/waqas/</loc><lastmod>2025-07-23T00:50:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/patrick-mcsweeney/</loc><lastmod>2025-07-23T00:50:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jerri-l.-clairday</loc><lastmod>2025-07-23T00:50:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/riya-sander/</loc><lastmod>2025-07-23T00:50:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/snehal-antani/</loc><lastmod>2025-07-23T00:50:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/drew-robb/</loc><lastmod>2025-07-23T00:50:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dirk-schrader/</loc><lastmod>2025-07-23T00:50:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/danny-bradbury/</loc><lastmod>2025-07-23T00:50:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/jerich-beason/</loc><lastmod>2025-07-23T00:50:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ali-hadley/</loc><lastmod>2025-07-23T00:50:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ning-wang/</loc><lastmod>2025-07-23T00:50:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/j.r.-cunningham</loc><lastmod>2025-07-23T00:51:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/louis-livingston-garcia/</loc><lastmod>2025-07-23T00:51:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ronan-mahony/</loc><lastmod>2025-07-23T00:51:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ellen-pincus/</loc><lastmod>2025-07-23T00:51:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/andrew-fogelis/</loc><lastmod>2025-07-23T00:51:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/seth-robinson/</loc><lastmod>2025-07-23T00:51:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/emily-matzelle/</loc><lastmod>2025-07-23T00:51:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ryan-miner/</loc><lastmod>2025-07-23T00:51:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/michelle-moore-phd/</loc><lastmod>2025-07-23T00:51:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/adam-kohnke/</loc><lastmod>2025-07-23T00:51:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/harman-singh/</loc><lastmod>2025-07-23T00:51:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/isla-sibanda/</loc><lastmod>2025-07-23T00:51:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/ken-chikwanha/</loc><lastmod>2025-07-23T00:51:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/james-stanger/</loc><lastmod>2025-07-23T00:51:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/chris-stevens/</loc><lastmod>2025-07-23T00:51:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/lee-li/</loc><lastmod>2025-07-23T00:51:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/simon-puleo/</loc><lastmod>2025-07-23T00:51:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/dave-wreski/</loc><lastmod>2025-07-23T00:51:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/emma-waite/</loc><lastmod>2025-07-23T00:51:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/joe-south/</loc><lastmod>2025-07-23T00:51:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/brooke-charles/</loc><lastmod>2025-07-23T00:51:07+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/stephan-miller/</loc><lastmod>2025-07-23T00:46:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/tayla-carpenter/</loc><lastmod>2025-12-10T04:32:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/authors/</loc><lastmod>2025-07-23T01:06:02+00:00</lastmod></url></urlset>