<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>http://rethinksecurity.io/authors/joe-basirico/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/tips-for-landing-a-job-in-technology/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/authors/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/careers/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/guidance/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/professional-development/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/</loc>
    <lastmod>2023-02-22T15:11:55-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/first-100-days-pt3/</loc>
    <lastmod>2021-10-13T08:16:49-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/first-100-days-pt2/</loc>
    <lastmod>2021-09-07T12:32:42-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/appsec-engineering/</loc>
    <lastmod>2021-08-02T14:48:06-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/leadership/</loc>
    <lastmod>2021-08-02T14:48:06-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/first-100-days-pt1/</loc>
    <lastmod>2021-08-02T14:48:06-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/security-teams/</loc>
    <lastmod>2021-08-02T14:48:06-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/authors/jason-taylor/</loc>
    <lastmod>2021-06-24T14:21:38-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/appsec-strategy-for-aws-cloud-saas/</loc>
    <lastmod>2021-06-24T14:21:38-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/cloud/</loc>
    <lastmod>2021-06-24T14:21:38-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/training/</loc>
    <lastmod>2021-06-24T14:21:38-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/architecture/</loc>
    <lastmod>2021-05-20T20:14:46-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/system-design/</loc>
    <lastmod>2021-05-20T20:14:46-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/system-design-for-security/</loc>
    <lastmod>2021-05-20T20:14:46-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/appsec-vulnerability-cheatsheet/</loc>
    <lastmod>2021-05-11T21:11:58-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/cheatsheet/</loc>
    <lastmod>2021-05-11T21:11:58-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/ciso/</loc>
    <lastmod>2020-11-30T16:29:27-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/phase-one-of-appsec-engineering-awareness/</loc>
    <lastmod>2020-11-30T16:29:27-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/the-three-phases-of-appsec-engineering/</loc>
    <lastmod>2020-11-20T09:04:27-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/newsletters/</loc>
    <lastmod>2020-11-20T08:49:35-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/november-2020/</loc>
    <lastmod>2020-11-20T08:49:35-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/october-2020/</loc>
    <lastmod>2020-10-20T11:20:35-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/august-2020/</loc>
    <lastmod>2020-08-26T17:43:42-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/stop-acting-like-phishers/</loc>
    <lastmod>2020-08-26T17:27:52-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/phishing/</loc>
    <lastmod>2020-08-26T17:27:52-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/reducing-vulnerability-classes-to-near-zero/</loc>
    <lastmod>2020-08-26T17:11:59-06:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/july-2020/</loc>
    <lastmod>2020-07-22T10:19:01-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/databreach/</loc>
    <lastmod>2020-06-19T13:09:03-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/privacy/</loc>
    <lastmod>2020-06-19T13:09:03-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/you-have-an-obligation-to-fight-for-privacy/</loc>
    <lastmod>2020-06-19T13:09:03-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/building-a-security-team-of-500/</loc>
    <lastmod>2020-05-27T10:16:14-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/how-to-scale-an-application-security-program-pt2/</loc>
    <lastmod>2020-05-18T13:58:46-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/how-to-scale-an-application-security-program-pt1/</loc>
    <lastmod>2020-05-12T09:43:47-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/may-2020/</loc>
    <lastmod>2020-05-06T13:19:01-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/a-travelers-method-of-learning-technology/</loc>
    <lastmod>2020-05-01T19:45:36-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/learning/</loc>
    <lastmod>2020-05-01T19:45:36-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/every-application-fails-in-unique-but-predictable-ways-a-study-in-zoom/</loc>
    <lastmod>2020-04-19T09:29:57-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/hackers/</loc>
    <lastmod>2020-04-19T09:29:57-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/threat-modeling/</loc>
    <lastmod>2020-04-19T09:29:57-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/april-2020/</loc>
    <lastmod>2020-04-06T14:39:01-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/are-you-a-firefighter-or-a-building-inspector/</loc>
    <lastmod>2020-03-11T09:52:28-07:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/march-2020/</loc>
    <lastmod>2020-03-04T19:47:37-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/darkweb/</loc>
    <lastmod>2020-02-28T10:16:20-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/exploring-the-darkweb/</loc>
    <lastmod>2020-02-28T10:16:20-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/its-always-about-the-people/</loc>
    <lastmod>2020-02-13T09:03:06-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletter-posts/february-2020/</loc>
    <lastmod>2020-02-05T09:30:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/cybersecurity/</loc>
    <lastmod>2020-01-14T16:09:11-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/cyberwar/</loc>
    <lastmod>2020-01-14T16:09:11-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/defending-against-a-potential-for-iranian-cyber-response/</loc>
    <lastmod>2020-01-14T16:09:11-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/iran/</loc>
    <lastmod>2020-01-14T16:09:11-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/a-conversation-with-the-father-of-pki/</loc>
    <lastmod>2020-01-08T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/defense-in-depth-what-i-should-have-done-to-save-myself-from-injury/</loc>
    <lastmod>2019-12-16T12:42:30-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/newsletter-posts/december-2019/</loc>
    <lastmod>2019-12-15T19:30:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/it-will-go-wrong-what-will-you-do-when-it-does/</loc>
    <lastmod>2019-11-28T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/i-m-thankful-for-cisos/</loc>
    <lastmod>2019-11-27T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/a-hacker-s-manifesto-and-2tb-data-breach-from-cayman-national-bank-and-trust/</loc>
    <lastmod>2019-11-19T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/deconstructing-a-sexploitation-attack/</loc>
    <lastmod>2019-11-06T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/ransomware/</loc>
    <lastmod>2019-11-06T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/sexploitation/</loc>
    <lastmod>2019-11-06T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/spam/</loc>
    <lastmod>2019-11-06T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/you-are-spending-too-much-on-security/</loc>
    <lastmod>2019-11-01T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/security-takes-commitment/</loc>
    <lastmod>2019-10-23T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/none-of-us-knows-what-we-are-doing/</loc>
    <lastmod>2019-10-11T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/follow-the-money/</loc>
    <lastmod>2019-10-09T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/ics/scada/</loc>
    <lastmod>2019-10-02T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/we-are-in-the-midst-of-a-cyber-cold-war/</loc>
    <lastmod>2019-10-02T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/anonymous-is-a-better-sysadmin-than-you/</loc>
    <lastmod>2019-09-24T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/security-conferences/</loc>
    <lastmod>2019-09-24T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/why-the-apple-card-is-a-gorgeous-piece-of-garbage/</loc>
    <lastmod>2019-09-12T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/do-cloud-sync-products-protect-you-from-ransomware/</loc>
    <lastmod>2019-09-04T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/protecting-yourself-and-enterprise-from-ransomware-attacks/</loc>
    <lastmod>2019-08-29T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/inspiring-your-teams-in-security/</loc>
    <lastmod>2019-08-21T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/books/</loc>
    <lastmod>2019-08-20T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/getting-to-yes/</loc>
    <lastmod>2019-08-20T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/defcon/</loc>
    <lastmod>2019-08-13T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/defcon-there-has-never-been-a-better-time-to-get-into-security/</loc>
    <lastmod>2019-08-13T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/ai/</loc>
    <lastmod>2019-08-12T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/ai-in-security/</loc>
    <lastmod>2019-08-12T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/can-security-training-change-lives/</loc>
    <lastmod>2019-08-02T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/authentication/</loc>
    <lastmod>2019-07-15T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/google-s-global-adaptive-authentication/</loc>
    <lastmod>2019-07-15T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/apple/</loc>
    <lastmod>2019-07-10T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/privacy-as-a-differentiator/</loc>
    <lastmod>2019-07-10T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/tags/welcome/</loc>
    <lastmod>2019-07-04T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/where-to-begin/</loc>
    <lastmod>2019-07-04T21:56:59-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/posts/welcome/</loc>
    <lastmod>2019-07-03T12:43:00-08:00</lastmod>
  </url><url>
    <loc>http://rethinksecurity.io/about/</loc>
  </url><url>
    <loc>http://rethinksecurity.io/newsletters/</loc>
  </url><url>
    <loc>http://rethinksecurity.io/subscribe/</loc>
  </url><url>
    <loc>http://rethinksecurity.io/categories/</loc>
  </url>
</urlset>
