<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberwithdebra.com/2026/03/03/preparation-limits-the-damage-business-continuity-explained-%f0%9f%94%84/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/03/business_continuity-1.png</image:loc><image:title>business_continuity (1)</image:title></image:image><lastmod>2026-03-30T01:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/03/10/not-every-alert-is-what-it-seems-false-positives-and-false-negatives-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/03/false_positive_false_negative.png</image:loc><image:title>false_positive_false_negative</image:title></image:image><lastmod>2026-03-30T01:02:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/03/17/the-tools-no-one-approved-shadow-it-explained-%f0%9f%91%a5/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/03/shadow_it-1.png</image:loc><image:title>shadow_it (1)</image:title></image:image><lastmod>2026-03-30T01:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/03/24/when-one-person-does-it-all-separation-of-duties-explained-%e2%9a%96%ef%b8%8f/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/03/separation_of_duties.png</image:loc><image:title>separation_of_duties</image:title></image:image><lastmod>2026-03-30T01:01:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/03/31/where-you-test-matters-sandboxing-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/03/sandboxing.png</image:loc><image:title>sandboxing</image:title></image:image><lastmod>2026-03-30T01:01:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/02/24/not-all-risks-are-equal-risk-assessment-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/02/risk_assessment.png</image:loc><image:title>risk_assessment</image:title></image:image><lastmod>2026-02-21T03:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/02/17/security-beyond-the-screen-physical-security-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/02/physical_security.png</image:loc><image:title>physical_security</image:title></image:image><lastmod>2026-02-16T15:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/02/10/when-it-clicks-security-awareness-and-training-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/02/security_awareness_training-1.png</image:loc><image:title>security_awareness_training</image:title></image:image><lastmod>2026-02-08T15:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/01/13/security-beyond-your-walls-third-party-risk-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/01/third_party_risk_management.png</image:loc><image:title>third_party_risk_management</image:title></image:image><lastmod>2026-02-01T19:42:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/09/16/eyes-on-the-network-intrusion-detection-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/09/network_security_6.png</image:loc><image:title>network_security_6</image:title></image:image><lastmod>2026-02-01T19:40:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/09/23/every-device-matters-endpoint-security-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/09/endpoint_security.png</image:loc><image:title>endpoint_security</image:title></image:image><lastmod>2026-02-01T19:39:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/09/30/when-things-go-wrong-incident-response-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/09/incident_response.png</image:loc><image:title>incident_response</image:title></image:image><lastmod>2026-02-01T19:39:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/10/07/seeing-the-big-picture-siem-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/10/siem.png</image:loc><image:title>siem</image:title></image:image><lastmod>2026-02-01T19:38:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/10/14/closing-the-gaps-vulnerability-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/10/vulnerability_management.png</image:loc><image:title>vulnerability_management</image:title></image:image><lastmod>2026-02-01T19:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/10/21/never-assume-zero-trust-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/10/zero_trust.png</image:loc><image:title>zero_trust</image:title></image:image><lastmod>2026-02-01T19:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/10/28/working-smarter-soar-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/10/soar.png</image:loc><image:title>soar</image:title></image:image><lastmod>2026-02-01T19:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/11/04/keeping-data-in-data-loss-prevention-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/11/data_loss_prevention.png</image:loc><image:title>data_loss_prevention</image:title></image:image><lastmod>2026-02-01T19:34:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/11/11/right-access-right-time-identity-and-access-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/11/identity_access_management.png</image:loc><image:title>identity_access_management</image:title></image:image><lastmod>2026-02-01T19:34:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/11/18/proving-it-is-you-multi-factor-authentication-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/11/multi_factor_authentication.png</image:loc><image:title>multi_factor_authentication</image:title></image:image><lastmod>2026-02-01T19:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/11/25/breaking-the-chain-privileged-access-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/11/privileged_access_management.png</image:loc><image:title>privileged_access_management</image:title></image:image><lastmod>2026-02-01T19:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/12/02/strong-from-the-start-secure-configuration-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/12/secure_configuration.png</image:loc><image:title>secure_configuration</image:title></image:image><lastmod>2026-02-01T19:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/12/09/stay-updated-stay-protected-patch-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/12/patch_management.png</image:loc><image:title>patch_management</image:title></image:image><lastmod>2026-02-01T19:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/12/16/backups-are-not-enough-how-recovery-really-works/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/12/backup_and_recovery.png</image:loc><image:title>backup_and_recovery</image:title></image:image><lastmod>2026-02-01T19:30:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/12/23/what-christmas-taught-me-about-security/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/12/cwd-collagefull-copy.png</image:loc><image:title>CWD CollageFULL copy</image:title></image:image><lastmod>2026-02-01T19:30:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/01/20/data-before-decisions-data-classification-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/01/data_classification.png</image:loc><image:title>data_classification</image:title></image:image><lastmod>2026-02-01T19:29:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/01/27/knowing-what-youre-responsible-for-asset-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/01/asset_management-2.png</image:loc><image:title>asset_management</image:title></image:image><lastmod>2026-02-01T19:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2026/02/03/before-making-the-change-change-management-explained/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2026/02/change_management.png</image:loc><image:title>change_management</image:title></image:image><lastmod>2026-02-01T19:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/08/26/traffic-analysis-making-sense-of-the-digital-footprints-we-leave-behind/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/08/network_security_3.png</image:loc><image:title>network_security_3</image:title></image:image><lastmod>2026-01-20T13:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/08/12/network-security-101-how-that-free-wi-fi-fits-in/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/08/network_security_1.png</image:loc><image:title>network_security_1</image:title></image:image><lastmod>2026-01-20T13:42:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/09/02/scrambled-for-safety-encryption-in-everyday-network-security/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/09/network_security_4.png</image:loc><image:title>network_security_4</image:title></image:image><lastmod>2026-01-20T13:41:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/09/09/keep-it-contained-network-segmentation-in-action/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/09/network_security_5.png</image:loc><image:title>network_security_5</image:title></image:image><lastmod>2026-01-20T13:40:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/07/29/scam-likely-and-the-signals-we-miss-the-cyber-threat-intel-life-cycle-in-real-life/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/cyber_threat_intelligence_2.png</image:loc><image:title>cyber_threat_intelligence_2</image:title></image:image><lastmod>2025-09-06T15:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/08/19/firewalls-at-the-door-network-security-in-action/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/08/network_security_2.png</image:loc><image:title>network_security_2</image:title></image:image><lastmod>2025-08-24T19:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/08/05/frameworks-set-the-plan-intel-sharpens-the-response/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/08/cyber_defense_framework_vs_cyber_threat_intelligence-1.png</image:loc><image:title>cyber_defense_framework_vs_cyber_threat_intelligence (1)</image:title></image:image><lastmod>2025-08-04T02:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/meet-debra-olurin/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/img_3850.jpg</image:loc><image:title>IMG_3850</image:title></image:image><lastmod>2025-07-26T07:47:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberwithdebra.com/2025/07/22/skimmers-spoofs-and-smarts-an-everyday-intro-to-cyber-threat-intel/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/cyber_threat_intelligence_1.png</image:loc><image:title>cyber_threat_intelligence_1</image:title></image:image><lastmod>2025-07-26T07:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/07/15/from-printer-problems-to-flight-changes-what-cyber-defense-looks-like-in-real-life/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/cyber_defense_frameworks_2.png</image:loc><image:title>cyber_defense_frameworks_2</image:title></image:image><lastmod>2025-07-30T01:28:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/2025/07/08/what-meal-prepping-and-cybersecurity-have-in-common/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/cyber-defense-frameworks_1-5.png</image:loc><image:title>Cyber Defense Frameworks_1</image:title></image:image><lastmod>2025-07-26T07:39:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/connect/</loc><lastmod>2025-07-21T22:26:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberwithdebra.com/2025/07/01/welcome-to-cyber-with-debra%f0%9f%91%8b/</loc><image:image><image:loc>https://cyberwithdebra.com/wp-content/uploads/2025/07/copy-of-logo-cyberd-1.png</image:loc><image:title>Copy of Logo - CyberD (1)</image:title></image:image><lastmod>2025-07-26T07:50:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberwithdebra.com/blog/</loc><lastmod>2025-07-01T13:07:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberwithdebra.com/about/</loc><lastmod>2025-07-01T11:31:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberwithdebra.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-30T01:02:59+00:00</lastmod></url></urlset>
