<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securitysandman.com/2026/04/02/building-enterprise-sso-for-my-multi-tenant-saas-ai-agent-platform/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-174925.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-174925</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-163709.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-163709</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-163357-1.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-163357</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-163357.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-163357</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-071836.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-071836</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-071638.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-071638</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-071400.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-071400</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/04/api-tenant-management-flow-2026-04-02-071218.png</image:loc><image:title>API Tenant Management Flow-2026-04-02-071218</image:title></image:image><lastmod>2026-04-02T19:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2026/03/29/exploring-ai-spec-development-for-sso-idp-auth-code-problems/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-42.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-41.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-40.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-39.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-38.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-37.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-36.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-35.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-29T20:19:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2026/03/23/kicking-tires-on-spec-ai-development/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-34.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/spec-driven-ai-agents.png</image:loc><image:title>spec-driven-ai-agents</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-33.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-32.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-31.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-30.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-29.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-28.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-27.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/how-a-plumbus-is-made.png</image:loc><image:title>How a plumbus is made</image:title></image:image><lastmod>2026-03-24T13:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2026/03/16/fresh-snow-outside-fresh-threats-inside-practical-agentic-ai-hardening/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-25.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-23.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-21.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-20.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-17.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-16T18:58:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2026/03/11/your-ai-agent-is-the-attacker-claude-opencode-threats-and-security-designs/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-12T03:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/12/09/microsoft-ignite-2025-cybersecurity-announcements-impact-analysis/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-10T23:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/11/04/seeing-the-ai-security-forest-through-the-trees/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/shaded_gap_multi_overall-1.png</image:loc><image:title>shaded_gap_multi_overall</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_software_engineering-1.png</image:loc><image:title>pie_Software_Engineering</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_overall_average-1.png</image:loc><image:title>pie_overall_average</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_service_customer_ops.png</image:loc><image:title>pie_Service_Customer_Ops</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_marketing__sales-1.png</image:loc><image:title>pie_Marketing_&amp;_Sales</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_finance-1.png</image:loc><image:title>pie_Finance</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_legal_compliance.png</image:loc><image:title>pie_Legal_Compliance</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/shaded_gap_multi_overall.png</image:loc><image:title>shaded_gap_multi_overall</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/11/pie_product_design.png</image:loc><image:title>pie_Product_Design</image:title></image:image><lastmod>2025-11-04T06:25:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/10/26/is-claude-code-secure-lets-find-out/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/path-hijack-multi-agent.drawio.png</image:loc><image:title>path-hijack-multi-agent.drawio</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/agent-ai-plugin-attack.drawio-1.png</image:loc><image:title>agent-ai-plugin-attack.drawio (1)</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/multi-agent-isolation.png</image:loc><image:title>multi-agent-isolation</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/screenshot-2025-10-25-134050.png</image:loc><image:title>Screenshot 2025-10-25 134050</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/screenshot-2025-10-25-134758-1.png</image:loc><image:title>Screenshot 2025-10-25 134758</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/screenshot-2025-10-25-134009.png</image:loc><image:title>Screenshot 2025-10-25 134009</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/screenshot-2025-10-25-134758.png</image:loc><image:title>Screenshot 2025-10-25 134758</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/path-hjacking.png</image:loc><image:title>path-hjacking</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-27T22:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/10/24/anthropics-security-layers-explained-what-you-lose-on-basic-plans-and-what-you-gain-at-enterprise/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/anthropic-layer-security-blog.png</image:loc><image:title>anthropic-layer-security-blog</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/10/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-24T16:13:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/07/31/ai-red-teaming-man-in-the-vector-attack-custom-tooling/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-31T18:16:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/06/10/vector-drift-prompt-injection-and-the-hidden-ai-rag-attack-surface/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-46.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-45.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-44.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-43.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-42.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-41.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-40.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-38.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-37.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-36.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-10T22:59:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/06/02/a-security-architects-guide-to-threat-modeling-ai-agent-design/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/chatgpt-image-jun-2-2025-07_08_38-am-1.png</image:loc><image:title>ChatGPT Image Jun 2, 2025, 07_08_38 AM</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/chatgpt-image-jun-2-2025-07_36_23-am.png</image:loc><image:title>ChatGPT Image Jun 2, 2025, 07_36_23 AM</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/chatgpt-image-jun-2-2025-07_08_38-am.png</image:loc><image:title>ChatGPT Image Jun 2, 2025, 07_08_38 AM</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-31.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-30.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-29.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-28.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-27.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-25.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-09T16:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/06/07/chaos-complexity-and-the-hidden-structure-of-hash-functions-in-proof-of-work/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/06/image-39.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-07T17:23:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/about-secsandman/</loc><lastmod>2025-02-18T15:08:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/daily-cyber-news/</loc><lastmod>2025-02-17T20:55:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/2025/02/09/breaches-cost-you-millions-build-ai-detection-capabilities/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/screenshot-2025-02-10-at-3.51.02e280afpm.png</image:loc><image:title>Screenshot 2025-02-10 at 3.51.02 PM</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/02/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-13T23:27:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2022/02/02/psa-cloud-providers-fix-this-insecure-secrets-mgmt-trend/</loc><lastmod>2025-02-11T15:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2022/02/06/automating-aws-guard-duty-with-terraform/</loc><lastmod>2025-02-11T15:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2022/02/08/appdec-protecting-cicd-with-yubikey-protected-ssh-keys/</loc><lastmod>2025-02-11T15:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2022/02/21/end2end-okta-ad-oidc-vault/</loc><lastmod>2025-02-11T00:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2024/02/29/change-healthcare-its-literally-in-the-name/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/02/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/02/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-11T00:48:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2024/10/11/abusing-ai-for-password-guessing-and-social-engineering/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/dallc2b7e-2024-10-11-15.09.34-a-cartoon-style-illustration-showing-a-social-media-user-surrounded-by-floating-personal-information-like-profile-details-messages-and-icons-all-v.webp</image:loc><image:title>DALL·E 2024-10-11 15.09.34 - A cartoon-style illustration showing a social media user surrounded by floating personal information, like profile details, messages, and icons, all v</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/dallc2b7e-2024-10-11-14.45.14-an-abstract-digital-illustration-depicting-the-concept-of-jailbreaking-or-breaking-through-ai-guardrails.-imagine-a-figure-or-symbol-pushing-through.webp</image:loc><image:title>DALL·E 2024-10-11 14.45.14 - An abstract digital illustration depicting the concept of 'jailbreaking' or breaking through AI guardrails. Imagine a figure or symbol pushing through</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/dallc2b7e-2024-10-11-12.55.42-a-detailed-illustration-showing-a-human-and-an-ai-working-together-to-generate-a-predictive-algorithm.-the-human-is-seated-at-a-desk-thinking-and-typ.webp</image:loc><image:title>DALL·E 2024-10-11 12.55.42 - A detailed illustration showing a human and an AI working together to generate a predictive algorithm. The human is seated at a desk, thinking and typ</image:title></image:image><lastmod>2025-02-11T00:48:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2024/11/03/training-ai-to-predict-your-competitors-next/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/11/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/11/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/11/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2024/10/ai-tuning-hacker-page-3.drawio.png</image:loc><image:title>ai-tuning-hacker-Page-3.drawio</image:title></image:image><lastmod>2025-02-11T00:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2025/01/06/from-known-to-unknown-shifting-cybersecurity-to-proactive-ai-detection/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/01/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/01/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/01/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-11T00:37:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/legal-stuff/</loc><lastmod>2024-10-21T21:43:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/2021/08/28/cd-projekt-red-packet-analysis-for-malware-on-xbox-one-x/</loc><lastmod>2022-02-08T13:52:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2022/01/27/appsec-pwnkit-cve-2021-4034/</loc><lastmod>2022-01-27T20:42:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/09/12/azure-app-service-cool-feature-or-dangerous-back-channel/</loc><lastmod>2021-10-27T13:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/09/02/devsec-mitigating-supply-chain-software-attacks-with-yubikey-signed-git-commits-sort-of/</loc><lastmod>2021-09-02T19:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/08/22/cloudsec-retroactively-tag-assets-lamba-scripts/</loc><lastmod>2021-08-28T15:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/08/21/netsec-detecting-unusual-traffic-in-the-cloud-using-flowlogs-lambdas/</loc><lastmod>2021-08-28T15:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/07/31/pen-testing-azure-firewall-idps-threat-intel-features-azure-lab-2/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2021/07/screen-shot-2021-07-31-at-4.20.11-pm.png</image:loc><image:title>Screen Shot 2021-07-31 at 4.20.11 PM</image:title></image:image><lastmod>2021-08-28T14:12:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/07/23/securing-cloud-networks-with-hub-n-spoke-and-azure-firewall-lab-1/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2021/07/azurelabsnetworktopology.jpeg</image:loc><image:title>AzureLabsNetworkTopology</image:title></image:image><lastmod>2021-08-28T14:12:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/28/public-cloud-web-shells-a-serious-malware-and-dlp-issue/</loc><lastmod>2021-05-05T20:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/20/how-to-compromise-kubernetes-full-red-team-vs-blue-team-demo/</loc><image:image><image:loc>https://securitysandman.com/wp-content/uploads/2021/04/k8.png</image:loc><image:title>k8</image:title></image:image><lastmod>2021-05-04T21:53:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/04/writing-buffer-overflows-and-reverse-engineering-compiled-binaries/</loc><lastmod>2021-04-28T22:25:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/gcp-study-guide-wip/</loc><lastmod>2021-04-21T14:24:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/aws-study-guide-wip/</loc><lastmod>2021-04-21T13:54:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/2021/04/01/youre-leaking-to-public-cloud-apis/</loc><lastmod>2021-04-21T13:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/04/example-post/</loc><lastmod>2021-04-21T13:09:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/04/example-post-2/</loc><lastmod>2021-04-21T13:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/12/falco-ioc-detection-on-k8-wip/</loc><lastmod>2021-04-21T13:08:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/2021/04/12/example-post-3/</loc><lastmod>2021-04-21T13:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securitysandman.com/threat-model/</loc><lastmod>2021-04-19T13:38:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/k8-study-guide/</loc><lastmod>2021-04-19T13:18:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/blog/</loc><lastmod>2021-04-13T22:14:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/cheat-sheets-and-tools/</loc><lastmod>2021-04-13T21:23:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/cloud-security-tools-tbd/</loc><lastmod>2021-04-12T21:03:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/kwydn-strategy/</loc><lastmod>2021-04-06T18:32:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/manual-linux-enumerations/</loc><lastmod>2021-04-06T18:20:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/manual-windows-enumeration/</loc><lastmod>2021-04-06T18:17:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/oscp-guide/</loc><lastmod>2021-04-06T17:51:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/k8-security-tools/</loc><lastmod>2021-04-06T14:47:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/kubernetes/</loc><lastmod>2021-04-06T04:52:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/cloud-saas/</loc><lastmod>2021-04-05T20:57:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com/contact/</loc><lastmod>2021-04-05T04:05:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securitysandman.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-02T19:50:34+00:00</lastmod></url></urlset>
