<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://the-security-brief.com/2025/12/24/living-with-security-debt/</loc><lastmod>2025-12-24T19:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/22/from-firefighting-to-forward-looking-building-a-high-impact-security-team/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-22T18:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/17/cloud-resilience-lessons-from-2025-outages/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-22T10:59:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/19/why-representation-matters-in-stem-careers/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/create-a-highly-detailed-high-resolution-image-depicting-a-diverse-group.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-depicting-a-diverse-group</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-18T20:30:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/posts/</loc><lastmod>2025-12-18T19:37:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://the-security-brief.com/2025/12/18/when-shared-responsibility-means-no-responsibility/</loc><lastmod>2025-12-18T09:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/16/ai-at-the-gate-how-attackers-defenders-are-using-ai-in-2025/</loc><lastmod>2025-12-16T19:56:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/15/what-the-uk-cyber-security-resilience-bill-really-means-for-your-organisation/</loc><lastmod>2025-12-15T23:36:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/14/understanding-modern-threat-actors-perspectives-strategies/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/create-a-high-resolution-highly-detailed-image-representing-modern-threat-actors.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-representing-modern-threat-actors</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-11T18:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/13/transforming-security-from-blocker-to-business-enabler/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-11T17:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/11/40m-voters-exposed-security-lessons-from-a-major-breach/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/create-a-highly-detailed-sharp-focused-image-depicting-a-digital-landscape.png</image:loc><image:title>create-a-highly-detailed-sharp-focused-image-depicting-a-digital-landscape</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-11T10:27:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/12/12/enhancing-incident-response-through-effective-communication/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-10T21:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/09/28/jlr-cyberattack-lessons-from-a-major-manufacturing-crisis/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T12:37:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/09/27/ai-enhanced-phishing-new-challenges-for-cybersecurity/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T11:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/08/05/breaking-the-firewall-a-young-womans-guide-to-thriving-in-stem/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/08/create-a-high-resolution-highly-detailed-image-that-captures-a-young-2.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-that-captures-a-young</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/08/create-a-high-resolution-highly-detailed-image-that-captures-a-young-1.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-that-captures-a-young</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/08/create-a-high-resolution-highly-detailed-image-that-captures-a-young.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-that-captures-a-young</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-04T21:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/06/25/the-hidden-cost-of-convenience-how-shadow-it-threatens-enterprise-security/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/06/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-25T19:32:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/06/03/cyber-security-careers-find-your-ideal-role-today/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/06/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-image-representing-the-diverse-universe.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-representing-the-diverse-universe</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-03T18:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/about/</loc><lastmod>2025-05-22T11:04:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://the-security-brief.com/2025/05/12/essential-tips-to-secure-your-social-media-accounts/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-12T20:41:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/04/28/cyber-security-trends-for-2025-ai-crime-and-compliance/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/04/create-a-highly-detailed-featured-image-depicting-the-evolution-of.png</image:loc><image:title>create-a-highly-detailed-featured-image-depicting-the-evolution-of</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-04-27T13:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/04/21/the-dangers-of-byod-risks-every-company-must-address/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/04/byod.png</image:loc><image:title>BYOD</image:title></image:image><lastmod>2025-04-20T13:06:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/04/14/why-cyber-security-teams-need-mitre-attck-framework/</loc><lastmod>2025-04-13T15:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/04/07/supply-chain-security-protecting-against-cyber-threats/</loc><lastmod>2025-04-06T18:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/03/31/understanding-security-operations-centres-the-backbone-of-modern-cyber-security/</loc><lastmod>2025-03-30T18:41:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/03/24/crowdstrike-outage-lessons-from-the-july-2024-incident/</loc><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://the-security-brief.com/wp-content/uploads/2025/03/blue-screen-of-death-windows.png</image:loc><image:title>blue-screen-of-death-windows</image:title></image:image><lastmod>2025-03-24T20:02:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/03/22/how-to-stay-safe-online-5-simple-steps/</loc><lastmod>2025-03-22T17:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com/2025/03/22/about-me-welcome-to-the-security-brief/</loc><lastmod>2025-03-22T16:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://the-security-brief.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-12-24T19:09:17+00:00</lastmod></url></urlset>
