<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securingtheuniverse.com/2026/03/09/lg-oled-evo-ai-c5-55-review-a-smart-bright-gamer-ready-oled-for-2025/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-10T01:18:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/03/09/project-sport-limo-upgraded-obd2-adapter-obdlink-cx/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-1-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-10T00:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/about-the-author-blog/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/333097452_1572350906503786_3964732253061368952_n.jpg</image:loc><image:title>333097452_1572350906503786_3964732253061368952_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/57390184_10155854484556386_4052420305132453888_n.jpg</image:loc><image:title>57390184_10155854484556386_4052420305132453888_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/93186146_10156712322446386_2950981435336425472_n.jpg</image:loc><image:title>93186146_10156712322446386_2950981435336425472_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/36988-c1405-56757356_10155827647771386_3204714793080455168_n.jpg</image:loc><image:title>56757356_10155827647771386_3204714793080455168_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/95a49-aec7e-56290962_659625874474812_58075903531417600_n.jpg</image:loc><image:title>56290962_659625874474812_58075903531417600_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/19a8c-c29bb-46506229_588587218245345_7470124179983958016_o.jpg</image:loc><image:title>46506229_588587218245345_7470124179983958016_o</image:title></image:image><lastmod>2026-02-11T22:42:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securingtheuniverse.com/2026/02/09/turning-leftover-parts-into-three-wins-two-family-pc-builds-a-storage-upgrade-for-mine/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/02/giuse-gmfb1p9t3i8-unsplash.jpg</image:loc><image:title>giuse-gMFb1P9T3I8-unsplash</image:title></image:image><lastmod>2026-02-10T02:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/24/new-pc-build/</loc><lastmod>2026-02-06T14:49:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/01/19/review-ac-infinity-airtap-t4-and-controller-63/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-19-114709.png</image:loc><image:title>Screenshot 2026-01-19 114709</image:title></image:image><lastmod>2026-01-19T18:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/01/13/improving-zigbee-networks-and-next-homeassistant-projects/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-09-100416.png</image:loc><image:title>Screenshot 2026-01-09 100416</image:title></image:image><lastmod>2026-01-13T17:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/01/13/review-unifi-device-bridge-switch/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-13-091535.png</image:loc><image:title>Screenshot 2026-01-13 091535</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-13-090140-1.png</image:loc><image:title>Screenshot 2026-01-13 090140</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-13-090428.png</image:loc><image:title>Screenshot 2026-01-13 090428</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-13-090140.png</image:loc><image:title>Screenshot 2026-01-13 090140</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-12-163000.png</image:loc><image:title>Screenshot 2026-01-12 163000</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-12-162747.png</image:loc><image:title>Screenshot 2026-01-12 162747</image:title></image:image><lastmod>2026-01-13T16:16:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/01/12/frankensteinpc-gaming-nas-build-with-leftover-parts/</loc><lastmod>2026-01-12T17:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2026/01/05/home-assistant-project-zigbee-sensor-network/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-05-134725.png</image:loc><image:title>Screenshot 2026-01-05 134725</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-05-105747-1.png</image:loc><image:title>Screenshot 2026-01-05 105747</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-05-105747.png</image:loc><image:title>Screenshot 2026-01-05 105747</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2026/01/screenshot-2026-01-05-100901.png</image:loc><image:title>Screenshot 2026-01-05 100901</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/12/screenshot-2026-01-02-090440.png</image:loc><image:title>Screenshot 2026-01-02 090440</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/61xacnujgl._ac_sl1500_.jpg</image:loc><image:title>61X+ACNuJGL._AC_SL1500_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/41qvo5dboql._ac_sl1500_.jpg</image:loc><image:title>41qVo5DBOQL._AC_SL1500_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/61ua89xoxjl._ac_sl1500_.jpg</image:loc><image:title>61UA89xOXjL._AC_SL1500_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/jakub-zerdzicki-g65agou6jxc-unsplash.jpg</image:loc><image:title>jakub-zerdzicki-G65aGou6Jxc-unsplash</image:title></image:image><lastmod>2026-01-05T20:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/12/12/planning-my-next-homelab-upgrade-choosing-the-right-nas-strategy/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/12/denny-muller-1ql31aacapa-unsplash.jpg</image:loc><image:title>denny-muller-1qL31aacAPA-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/12/alex-cheung-gqdpafwdsyk-unsplash.jpg</image:loc><image:title>alex-cheung-gQdPafWDSyk-unsplash</image:title></image:image><lastmod>2025-12-12T17:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/24/2024-election-interference-explained/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/deactivated-account-nsbsfmvurt8-unsplash.jpg</image:loc><image:title>deactivated-account-nSbsfmvURt8-unsplash</image:title></image:image><lastmod>2025-11-26T17:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/10/creating-a-panic-safe-room-from-a-techie/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/screenshot-2024-12-09-103425.png</image:loc><image:title>Screenshot 2024-12-09 103425</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/pxl_20240826_2032082737792134385239566710.webp</image:loc><image:title>pxl_20240826_2032082737792134385239566710</image:title></image:image><lastmod>2025-11-26T17:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/19/example-cybersecurity-incident-playbook-for-healthcare-organizations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/mario-verduzco-rn6n5lh1bda-unsplash.jpg</image:loc><image:title>mario-verduzco-Rn6n5Lh1BdA-unsplash</image:title></image:image><lastmod>2025-11-26T17:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/04/02/cybersecurity-in-2025-analyzing-recent-attacks-and-their-implications/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/04/possessed-photography-_e1pqxkukmw-unsplash.jpg</image:loc><image:title>possessed-photography-_E1PQXKUkMw-unsplash</image:title></image:image><lastmod>2025-11-26T17:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/11/17/review-roku-indoor-camera-se/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/x2flw5ruuejdzsv74xyzct.jpg</image:loc><image:title>X2FLw5ruuejdZsv74xyZcT</image:title></image:image><lastmod>2025-11-17T16:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/11/12/unifying-your-smart-home-setting-up-home-assistant/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-12-104840.png</image:loc><image:title>Screenshot 2025-11-12 104840</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/home-assistant-dashboard.png</image:loc><image:title>home-assistant-dashboard</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/jakub-zerdzicki-bk5zria9ou8-unsplash-1.jpg</image:loc><image:title>jakub-zerdzicki-bk5ZrIA9OU8-unsplash (1)</image:title></image:image><lastmod>2025-11-12T18:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/11/10/new-unifi-network-continued-improvements/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/thomas-jensen-isg-ruel0uw-unsplash.jpg</image:loc><image:title>thomas-jensen-ISG-rUel0Uw-unsplash</image:title></image:image><lastmod>2025-11-11T16:12:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/11/10/unifi-innerspace-managing-floorplans-and-network-coverage/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-10-134605-1.png</image:loc><image:title>screenshot-2025-11-10-134605</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-10-134605-e1762808847628.png</image:loc><image:title>Screenshot 2025-11-10 134605</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-10-131208.png</image:loc><image:title>Screenshot 2025-11-10 131208</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-10-130251.png</image:loc><image:title>Screenshot 2025-11-10 130251</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/screenshot-2025-11-10-125917.png</image:loc><image:title>Screenshot 2025-11-10 125917</image:title></image:image><lastmod>2025-11-10T21:08:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/11/06/review-unifi-u7-pro-access-point/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/thomas-jensen-ish9yqysd08-unsplash.jpg</image:loc><image:title>thomas-jensen-iSh9yqYSd08-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/1-1-300x300-1.jpg</image:loc><image:title>1-1-300x300</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/1708344749_1805878-1.jpg</image:loc><image:title>1708344749_1805878</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/will-network-10_31_25.jpeg</image:loc><image:title>Will Network 10_31_25</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/11/1708344749_1805878.jpg</image:loc><image:title>1708344749_1805878</image:title></image:image><lastmod>2025-11-06T16:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/10/31/updated-network-diagram-after-full-unifi-build/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/guerrillabuzz-2ivaduud2qu-unsplash.jpg</image:loc><image:title>guerrillabuzz-2IVaDuuD2QU-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/chatgpt-image-oct-31-2025-03_31_10-pm.png</image:loc><image:title>ChatGPT Image Oct 31, 2025, 03_31_10 PM</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/will-network-10_31_25.png</image:loc><image:title>Will Network 10_31_25</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/screenshot-2025-10-31-151610.png</image:loc><image:title>Screenshot 2025-10-31 151610</image:title></image:image><lastmod>2025-10-31T21:44:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/10/30/review-tripp-lite-smart1500lcdt-ups/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/71mhwb6aewl._ac_sl1500_.jpg</image:loc><image:title>71MHwB6AewL._AC_SL1500_</image:title></image:image><lastmod>2025-10-31T03:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/10/29/review-unifi-10g-poe-adapter-60w-and-its-benefits-for-the-unifi-e7-access-point/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/uacc-poe-10g-ubiquiti-uacc-poe-10g-10g-poe-adapter-60w.png</image:loc><image:title>[UACC-PoE++-10G] Ubiquiti UACC-PoE++-10G 10G PoE++ Adapter (60W)</image:title></image:image><lastmod>2025-10-30T15:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/10/28/network-upgrade-time-from-nighthawk-to-unifi-wi-fi-7-power-and-a-review-of-the-e7/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/chatgpt-image-oct-28-2025-02_01_39-pm.png</image:loc><image:title>ChatGPT Image Oct 28, 2025, 02_01_39 PM</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/chatgpt-image-oct-28-2025-01_57_50-pm.png</image:loc><image:title>ChatGPT Image Oct 28, 2025, 01_57_50 PM</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/screenshot-2025-10-28-134016.png</image:loc><image:title>Screenshot 2025-10-28 134016</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/chatgpt-image-oct-28-2025-01_48_49-pm.png</image:loc><image:title>ChatGPT Image Oct 28, 2025, 01_48_49 PM</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/871bcc6f-491c-41b9-adc5-161f74a2e9c5.png</image:loc><image:title>871bcc6f-491c-41b9-adc5-161f74a2e9c5</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/10/screenshot-2025-10-22-135139.png</image:loc><image:title>Screenshot 2025-10-22 135139</image:title></image:image><lastmod>2025-10-28T23:49:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/09/10/review-legion-go-8apu1/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/09/gsmarena_001.jpg</image:loc><image:title>gsmarena_001</image:title></image:image><lastmod>2025-09-10T18:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/06/25/digital-frontlines-how-a-u-s-israel-iran-conflict-could-reshape-the-global-it-and-cybersecurity-landscape/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/06/duncan-kidd-cju-bkskm1k-unsplash.jpg</image:loc><image:title>duncan-kidd-Cju-BkSkM1k-unsplash</image:title></image:image><lastmod>2025-06-25T18:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/04/29/y2k38-the-next-digital-apocalypse/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/04/micha-frank-jmfldingy18-unsplash.jpg</image:loc><image:title>micha-frank-JmFldiNGY18-unsplash</image:title></image:image><lastmod>2025-04-29T18:15:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/04/15/build-your-own-smart-network-lab-fun-projects-with-unifi-and-windows-servers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/04/thomas-jensen-isg-ruel0uw-unsplash.jpg</image:loc><image:title>thomas-jensen-ISG-rUel0Uw-unsplash</image:title></image:image><lastmod>2025-04-15T18:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/26/cve-2025-2783-chrome-zero-day/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/growtika-fiao0rcvwbe-unsplash.jpg</image:loc><image:title>growtika-fiao0RcVWBE-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/rubaitul-azad-kfusp6tgnbq-unsplash.jpg</image:loc><image:title>rubaitul-azad-kfuSP6TgnbQ-unsplash</image:title></image:image><lastmod>2025-03-26T15:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/24/review-unifi-u7-in-wall/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/screenshot-2025-03-24-104426.png</image:loc><image:title>Screenshot 2025-03-24 104426</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/screenshot-2025-03-20-094241.png</image:loc><image:title>Screenshot 2025-03-20 094241</image:title></image:image><lastmod>2025-03-24T16:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/18/new-gpu-time-review-asus-tuf-gaming-geforce-rtx-5070-ti-oc-edition/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/title.jpg</image:loc><image:title>title</image:title></image:image><lastmod>2025-03-18T17:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/10/new-shoes-for-the-bmw/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/screenshot-2025-03-10-111324.png</image:loc><image:title>Screenshot 2025-03-10 111324</image:title></image:image><lastmod>2025-03-10T17:15:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/05/new-graphics-card-msi-rtx-5070-12g-gaming-trio-oc-12gb-review-and-tips-for-finding-purchasing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/screenshot-2025-03-05-095307.png</image:loc><image:title>Screenshot 2025-03-05 095307</image:title></image:image><lastmod>2025-03-06T17:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/03/04/the-shift-in-u-s-cybersecurity-strategy-towards-russia-implications-and-concerns/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/michael-parulava-l4jrg4c7928-unsplash.jpg</image:loc><image:title>michael-parulava-L4jrg4c7928-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/03/jossuha-theophile-nn7fhyaiij8-unsplash.jpg</image:loc><image:title>jossuha-theophile-nN7fHyaiIJ8-unsplash</image:title></image:image><lastmod>2025-03-04T22:50:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/02/18/2025-tax-refund-guide-what-to-expect-delays-and-tips-for-a-faster-refund/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/02/kelly-sikkema-xou52juvuxa-unsplash.jpg</image:loc><image:title>kelly-sikkema-xoU52jUVUXA-unsplash</image:title></image:image><lastmod>2025-02-18T19:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/02/18/chinese-cyber-espionage-targeting-u-s-telecommunications-in-2025/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/02/aay-umtklckrbmu-unsplash.jpg</image:loc><image:title>aay-umTkLCKRbmU-unsplash</image:title></image:image><lastmod>2025-02-18T19:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/02/03/new-nest-camera-and-google-home-nest-tips-tricks-and-advanced-projects/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/02/bence-boros-anapphjfrhm-unsplash.jpg</image:loc><image:title>bence-boros-anapPhJFRhM-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/02/screenshot-2025-02-03-100543.png</image:loc><image:title>Screenshot 2025-02-03 100543</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/02/screenshot-2025-02-03-091910.png</image:loc><image:title>Screenshot 2025-02-03 091910</image:title></image:image><lastmod>2025-02-03T18:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/01/21/shadow-it-a-comprehensive-guide-for-2025/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/warren-4l-e7u6c5ek-unsplash.jpg</image:loc><image:title>warren-4l-e7U6c5ek-unsplash</image:title></image:image><lastmod>2025-01-21T17:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/01/16/the-security-concerns-surrounding-tiktok-a-comprehensive-analysis/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/timur-shakerzianov-vqx2_qwknqq-unsplash.jpg</image:loc><image:title>timur-shakerzianov-vqx2_QWknqQ-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/ben-white-9cvyepoaykc-unsplash.jpg</image:loc><image:title>ben-white-9cvYePOAyKc-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/solen-feyissa-qkeevyu0d7u-unsplash-1.jpg</image:loc><image:title>solen-feyissa-QKEeVYu0d7U-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/solen-feyissa-qkeevyu0d7u-unsplash.jpg</image:loc><image:title>solen-feyissa-QKEeVYu0d7U-unsplash</image:title></image:image><lastmod>2025-01-16T17:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2025/01/13/top-it-and-cybersecurity-trends-releases-and-challenges-for-2025/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/windows-myomvppr5fu-unsplash.jpg</image:loc><image:title>windows-MYomVPpR5FU-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/darren-halstead-b_vxfdzvw3g-unsplash.jpg</image:loc><image:title>darren-halstead-B_vXFdzvw3g-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/jerry-zhang-w5sqn_etciq-unsplash.jpg</image:loc><image:title>jerry-zhang-w5sqN_etcIQ-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/d-c-tr-nh-bi5jpnk5se0-unsplash.jpg</image:loc><image:title>d-c-tr-nh-BI5JpNK5sE0-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/alex-shute-2emdp4dpote-unsplash.jpg</image:loc><image:title>alex-shute-2eMDp4dpotE-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/alex-machado-80sv993luki-unsplash.jpg</image:loc><image:title>alex-machado-80sv993lUKI-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2025/01/boliviainteligente-hkprwdyrrp8-unsplash.jpg</image:loc><image:title>boliviainteligente-HKpRWdyRrp8-unsplash</image:title></image:image><lastmod>2025-01-14T21:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/30/strengthening-cybersecurity-for-ephi-key-takeaways-from-the-december-27-2024-ocr-proposal/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/natanael-melchor-43lwvc-eqpm-unsplash.jpg</image:loc><image:title>natanael-melchor-43LwvC-eQPM-unsplash</image:title></image:image><lastmod>2024-12-30T16:20:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/26/enhance-your-drive-installing-paddle-shifter-extensions-on-a-bmw/</loc><lastmod>2024-12-28T16:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/27/unlocking-the-potential-of-your-2017-bmw-750i-xdrive-a-comprehensive-guide-to-software-and-performance-tuning/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/screenshot-2024-12-27-102744.png</image:loc><image:title>Screenshot 2024-12-27 102744</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/screenshot-2024-12-27-102545.png</image:loc><image:title>Screenshot 2024-12-27 102545</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/screenshot-2024-12-27-101303.png</image:loc><image:title>Screenshot 2024-12-27 101303</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/maxim-hopman-fdaxitugdny-unsplash.jpg</image:loc><image:title>maxim-hopman-FdAXItuGDnY-unsplash</image:title></image:image><lastmod>2024-12-28T15:59:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/08/02/project-sport-limo-custom-cold-air-intake-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/wnebpqzx5y73ktqub57o.jpg</image:loc><image:title>Screenshot</image:title><image:caption>Screenshot</image:caption></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01594055671.jpeg</image:loc><image:title>01594055671</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01594055669.jpeg</image:loc><image:title>01594055669</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01594055673.jpeg</image:loc><image:title>01594055673</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/air-boxes.jpeg</image:loc><image:title>Air Boxes</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01511214377.jpeg</image:loc><image:title>01511214377</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01511214381.jpeg</image:loc><image:title>01511214381</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01511214672.jpeg</image:loc><image:title>01511214672</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/01511214680.jpeg</image:loc><image:title>01511214680</image:title></image:image><lastmod>2024-12-28T15:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/13/the-ultimate-guide-to-it-grab-ready-bags-essential-tools-and-devices-for-quick-fixes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/alice-donovan-rouse-z9f_yk4nmf8-unsplash.jpg</image:loc><image:title>alice-donovan-rouse-z9F_yK4Nmf8-unsplash</image:title></image:image><lastmod>2024-12-13T20:43:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/06/review-shark-ai-ultra-xl-robot-self-empty-vacuum/</loc><lastmod>2024-12-06T22:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/05/it-begins-chinese-cyberattack-on-us-telecom-providers-an-in-depth-analysis/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/ariel-oal07ai4otk-unsplash.jpg</image:loc><image:title>ariel-Oal07Ai4oTk-unsplash</image:title></image:image><lastmod>2024-12-05T17:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/12/04/healthcare-it-remote-patient-monitoring-overview-and-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/12/national-cancer-institute-nfvdkihxylu-unsplash.jpg</image:loc><image:title>national-cancer-institute-NFvdKIhxYlU-unsplash</image:title></image:image><lastmod>2024-12-04T21:26:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/11/15/__trashed/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/giuse-gmfb1p9t3i8-unsplash-1.jpg</image:loc><image:title>giuse-gMFb1P9T3I8-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/giuse-gmfb1p9t3i8-unsplash.jpg</image:loc><image:title>giuse-gMFb1P9T3I8-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20210121_195319177.mp_.webp</image:loc><image:title>pxl_20210121_195319177.mp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20211113_182602350-1.webp</image:loc><image:title>pxl_20211113_182602350</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20210121_204421444.webp</image:loc><image:title>pxl_20210121_204421444</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20211113_182602350.webp</image:loc><image:title>pxl_20211113_182602350</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20220204_002934940.webp</image:loc><image:title>pxl_20220204_002934940</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20220204_003009202-1.webp</image:loc><image:title>pxl_20220204_003009202</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/pxl_20220204_003009202.webp</image:loc><image:title>pxl_20220204_003009202</image:title></image:image><lastmod>2024-11-15T22:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/11/11/happy-veterans-day/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/104891917_10156918081876386_792206995936057182_n-2.jpg</image:loc><image:title>104891917_10156918081876386_792206995936057182_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/15073290_1234353199963074_9048168876135934806_n.jpg</image:loc><image:title>15073290_1234353199963074_9048168876135934806_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/104891917_10156918081876386_792206995936057182_n-1.jpg</image:loc><image:title>104891917_10156918081876386_792206995936057182_n-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/104891917_10156918081876386_792206995936057182_n.jpg</image:loc><image:title>104891917_10156918081876386_792206995936057182_n</image:title></image:image><lastmod>2024-11-11T15:03:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/11/07/understanding-botnets-in-2024-what-they-are-what-they-do-and-how-to-protect-against-them/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/11/shubham-dhage-t9rkvi3n0nm-unsplash.jpg</image:loc><image:title>shubham-dhage-T9rKvI3N0NM-unsplash</image:title></image:image><lastmod>2024-11-07T18:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/11/06/cybersecurity-in-the-age-of-political-change-how-a-trump-vs-harris-presidency-could-shape-the-future-of-cyber-defense/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/11/mick-haupt-i8tsxlbsuvs-unsplash.jpg</image:loc><image:title>mick-haupt-i8TSxlBSuvs-unsplash</image:title></image:image><lastmod>2024-11-06T16:49:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/10/28/building-cybersecurity-culture-in-healthcare-a-comprehensive-guide/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/10/brooke-cagle-g1kr4ozfoac-unsplash.jpg</image:loc><image:title>brooke-cagle-g1Kr4Ozfoac-unsplash</image:title></image:image><lastmod>2024-10-28T17:49:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/09/30/review-bmws-my-bmw-app-a-convenient-link-between-you-and-your-car/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/tom-muller-4bfgptkgcyi-unsplash-1.jpg</image:loc><image:title>tom-muller-4BFgPtKGCYI-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/tom-muller-4bfgptkgcyi-unsplash.jpg</image:loc><image:title>tom-muller-4BFgPtKGCYI-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/unnamed.png</image:loc><image:title>unnamed</image:title></image:image><lastmod>2024-09-30T15:49:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/09/27/the-tech-layoff-wave-implications-for-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/seo-galaxy-djpbppuevsa-unsplash.jpg</image:loc><image:title>seo-galaxy-dJpBpPUevSA-unsplash</image:title></image:image><lastmod>2024-09-27T20:29:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/09/05/enhancing-network-security-with-internal-honeypots-in-unifi-a-detailed-guide/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/screenshot-2024-09-05-114707.png</image:loc><image:title>Screenshot 2024-09-05 114707</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/screenshot-2024-09-05-114531.png</image:loc><image:title>Screenshot 2024-09-05 114531</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/screenshot-2024-09-05-114423.png</image:loc><image:title>Screenshot 2024-09-05 114423</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/arwin-neil-baichoo-yqzrdgu-kai-unsplash.jpg</image:loc><image:title>arwin-neil-baichoo-yQzrDgU-KAI-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/screenshot-2024-09-05-112054.png</image:loc><image:title>Screenshot 2024-09-05 112054</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/screenshot-2024-09-05-111841.png</image:loc><image:title>Screenshot 2024-09-05 111841</image:title></image:image><lastmod>2024-09-05T23:52:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/09/03/qr-codes-impact-uses-and-security-considerations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/mitya-ivanov-2hwkorix3ii-unsplash.jpg</image:loc><image:title>mitya-ivanov-2HWkORIX3II-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/screenshot-2024-08-30-143556.png</image:loc><image:title>Screenshot 2024-08-30 143556</image:title></image:image><lastmod>2024-09-03T17:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/08/27/home-network-updates-unifi-usg-pro-4-and-cloud-key-rack-and-future-plans/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/screenshot-2024-08-26-105719.png</image:loc><image:title>Screenshot 2024-08-26 105719</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/61kww-ylnpl.jpg</image:loc><image:title>Version 1.0.0</image:title><image:caption>Version 1.0.0</image:caption></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/1703008813_1800357.jpg</image:loc><image:title>1703008813_1800357</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/screenshot-2024-08-26-094713-1.png</image:loc><image:title>Screenshot 2024-08-26 094713</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/screenshot-2024-08-26-094713.png</image:loc><image:title>Screenshot 2024-08-26 094713</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/pxl_20240312_1238340074080425624927166263.webp</image:loc><image:title>pxl_20240312_1238340074080425624927166263</image:title></image:image><lastmod>2024-08-30T18:28:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/08/07/the-intersection-of-global-warming-and-cybersecurity-a-comprehensive-analysis/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/08/chris-leboutillier-tujud0awapi-unsplash.jpg</image:loc><image:title>chris-leboutillier-TUJud0AWAPI-unsplash</image:title></image:image><lastmod>2024-08-07T19:35:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/27/project-sport-limo-is-paid-off/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/983721f1-904c-44d5-94b1-d4b7d0559717.jpg</image:loc><image:title>983721f1-904c-44d5-94b1-d4b7d0559717</image:title></image:image><lastmod>2024-07-27T20:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/26/happy-system-administrators-day-honoring-the-unsung-heroes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/adi-goldstein-hli3r6lkibo-unsplash.jpg</image:loc><image:title>adi-goldstein-Hli3R6LKibo-unsplash</image:title></image:image><lastmod>2024-07-26T20:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/23/unpacking-the-crowdstrike-incident-impact-lessons-learned-and-future-preparedness/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/5575-crowdstrike-reveals-that-suspected-russian-hackers-made-failed-attempt-to-breach-it.jpg</image:loc><image:title>5575-crowdstrike-reveals-that-suspected-russian-hackers-made-failed-attempt-to-breach-it</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/milad-fakurian-t_ikf_cnvsy-unsplash.jpg</image:loc><image:title>milad-fakurian-t_IkF_CNvSY-unsplash</image:title></image:image><lastmod>2024-07-23T16:51:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/18/building-a-new-anti-phishing-security-awareness-campaign-for-healthcare-organizations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/scott-graham-5fnmwej4taa-unsplash.jpg</image:loc><image:title>scott-graham-5fNmWej4tAA-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/jakub-zerdzicki-ykglx_cwtdw-unsplash.jpg</image:loc><image:title>jakub-zerdzicki-ykgLX_CwtDw-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/tingey-injury-law-firm-dzpc4uy8zty-unsplash.jpg</image:loc><image:title>tingey-injury-law-firm-DZpc4UY8ZtY-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/eric-prouzet-vsknojzr3m8-unsplash.jpg</image:loc><image:title>eric-prouzet-vSKnoJZr3m8-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/sara-kurfess-9eid2zc_veo-unsplash.jpg</image:loc><image:title>sara-kurfess-9Eid2zc_Veo-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/natanael-melchor-43lwvc-eqpm-unsplash.jpg</image:loc><image:title>natanael-melchor-43LwvC-eQPM-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/matt-seymour-dbzln1bt_su-unsplash.jpg</image:loc><image:title>matt-seymour-DbZLN1BT_sU-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/kasia-derenda-fl3rf_t8dms-unsplash.jpg</image:loc><image:title>kasia-derenda-Fl3Rf_t8dMs-unsplash</image:title></image:image><lastmod>2024-07-18T18:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/18/optimizing-performance-running-an-e30-fuel-blend-in-your-bmw-n63tu-engine/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/screenshot-2024-07-18-085631.png</image:loc><image:title>Screenshot 2024-07-18 085631</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-07-01-090619.png</image:loc><image:title>Screenshot 2024-07-01 090619</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/oip.jpg</image:loc><image:title>OIP</image:title></image:image><lastmod>2024-07-18T15:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/07/11/securing-ai-chatbots-balancing-innovation-with-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/07/volodymyr-hryshchenko-v5vqwc9gyeu-unsplash.jpg</image:loc><image:title>volodymyr-hryshchenko-V5vqWC9gyEU-unsplash</image:title></image:image><lastmod>2024-07-11T17:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/26/new-certificates-fortinet-fca-fortigate-7-4-operator-and-fortinet-certified-associate-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-26-113213.png</image:loc><image:title>Screenshot 2024-06-26 113213</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-26-113141.png</image:loc><image:title>Screenshot 2024-06-26 113141</image:title></image:image><lastmod>2024-06-26T17:33:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/25/new-certificate-fortinet-certified-fundamentals-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-25-162735.png</image:loc><image:title>Screenshot 2024-06-25 162735</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-25-162648.png</image:loc><image:title>Screenshot 2024-06-25 162648</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-25-162554.png</image:loc><image:title>Screenshot 2024-06-25 162554</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-25-162505.png</image:loc><image:title>Screenshot 2024-06-25 162505</image:title></image:image><lastmod>2024-06-25T22:30:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/21/project-sport-limo-trunk-upgrades/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-21-110216.png</image:loc><image:title>Screenshot 2024-06-21 110216</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-21-105626.png</image:loc><image:title>Screenshot 2024-06-21 105626</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2024-06-21-102441.png</image:loc><image:title>Screenshot 2024-06-21 102441</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/813jkx-ejgl._ac_sx679_.jpg</image:loc><image:title>813JKx-EJGL._AC_SX679_</image:title></image:image><lastmod>2024-06-24T13:36:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/19/updated-network-diagram/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/will-network-2.jpeg</image:loc><image:title>will-network-2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/will-network-1.jpeg</image:loc><image:title>will-network-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/will-network.jpeg</image:loc><image:title>will-network</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/media.jpg</image:loc><image:title>media</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/charlesdeluvio-owkxt1ikc5g-unsplash.jpg</image:loc><image:title>charlesdeluvio-OWkXt1ikC5g-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/will-network.png</image:loc><image:title>will-network</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/screenshot-2023-12-20-142150.webp</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><lastmod>2024-06-20T13:35:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/14/enhancing-mesh-wi-fi-networks-review-asus-ma-25-coax-to-ethernet-moca-adapter/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/jandira-sonnendeck-ipdswpg-1i0-unsplash.jpg</image:loc><image:title>jandira-sonnendeck-ipdSwpg-1i0-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/51lsdvsbeul._ac_sl1000_.jpg</image:loc><image:title>51lsdvsbeul._ac_sl1000_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/81rgtfrijjl._ac_sl1500_.jpg</image:loc><image:title>81rgtfrijjl._ac_sl1500_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/91llhus3xyl._ac_sx679_.jpg</image:loc><image:title>91llhus3xyl._ac_sx679_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/490e5226-1b74-424c-acb3-58b98805e7f4.jpg</image:loc><image:title>490e5226-1b74-424c-acb3-58b98805e7f4</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/661353_526277_05_package_comping.jpg</image:loc><image:title>661353_526277_05_package_comping</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/516sufdmctl._ac_sx522_.jpg</image:loc><image:title>516sufdmctl._ac_sx522_</image:title></image:image><lastmod>2024-06-17T17:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/17/review-corsair-void-rgb-elite-wireless-gaming-headset/</loc><lastmod>2024-06-17T16:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/07/review-bmw-display-key/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/bmw_display_key_remote_1493913917_615x400.jpg</image:loc><image:title>bmw_display_key_remote_1493913917_615x400</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/bmw_display_key_remote_1493913773_615x400-1.jpg</image:loc><image:title>bmw_display_key_remote_1493913773_615x400-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/bmw-display-key-main-status-screen2-768x400-1.jpg</image:loc><image:title>bmw-display-key-main-status-screen2-768x400-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/bmw_display_key_remote_1493913773_615x400.jpg</image:loc><image:title>bmw_display_key_remote_1493913773_615x400</image:title></image:image><lastmod>2024-06-07T16:04:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/05/battling-the-menace-of-an-evolved-knight-ransomware-safeguarding-healthcare-and-businesses/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/henry-hustava-j_ch0mwbnds-unsplash.jpg</image:loc><image:title>henry-hustava-j_ch0mwbnds-unsplash</image:title></image:image><lastmod>2024-06-05T16:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/04/new-to-me-work-laptop-review-rog-strix-scar-15-g533qs/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/xi2tjud9.png</image:loc><image:title>xi2tjud9</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/pjj2yquz8rw61.jpg</image:loc><image:title>pjj2yquz8rw61</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/asus-rog-strix-scar-15-g533-26-976x650-1.webp</image:loc><image:title>asus-rog-strix-scar-15-g533-26-976x650-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/asus-rog-strix-scar-15-g533qs-2021-review-12170321071648.webp</image:loc><image:title>asus-rog-strix-scar-15-g533qs-2021-review-12170321071648</image:title></image:image><lastmod>2024-06-04T22:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/06/03/cybersecurity-in-may-2024-key-developments-in-hacks-vulnerabilities-and-new-technologies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/06/fabio-oyxis2kalvg-unsplash.jpg</image:loc><image:title>fabio-oyxis2kalvg-unsplash</image:title></image:image><lastmod>2024-06-03T17:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/05/16/bmw-7-series-racechip-tuning-project-sport-limo/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/05/s_gallery_recumbent.jpg</image:loc><image:title>s_gallery_recumbent</image:title></image:image><lastmod>2024-05-23T15:33:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/05/03/the-rise-of-the-dead-internet-a-new-era-of-bots-and-its-cybersecurity-implications/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/05/mathew-macquarrie-u6onpbmuzas-unsplash.jpg</image:loc><image:title>mathew-macquarrie-u6OnpbMuZAs-unsplash</image:title></image:image><lastmod>2024-05-03T22:34:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/05/01/2024-25-cryptocurrency-forecast-the-current-state-of-mining-and-my-crypto-portfolio/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/05/kanchanara-fssggtbox9y-unsplash.jpg</image:loc><image:title>kanchanara-fssggtbox9y-unsplash</image:title></image:image><lastmod>2024-05-01T17:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/04/29/critical-security-alert-exploitation-of-cve-2024-27956-in-valvepress-automatic-plugin-for-wordpress/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/souvik-banerjee-wprnem_6dg-unsplash.jpg</image:loc><image:title>souvik-banerjee-wprnem_6dg-unsplash</image:title></image:image><lastmod>2024-04-29T17:36:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/03/21/bmw-updates/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-21-102130.png</image:loc><image:title>screenshot-2024-03-21-102130</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-21-092914-1.png</image:loc><image:title>screenshot-2024-03-21-092914-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-21-092914.png</image:loc><image:title>screenshot-2024-03-21-092914</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/71bsmpyiqtl.__ac_sx300_sy300_ql70_fmwebp_.webp</image:loc><image:title>71bsmpyiqtl.__ac_sx300_sy300_ql70_fmwebp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/616wycujnas.__ac_sx300_sy300_ql70_fmwebp_.webp</image:loc><image:title>616wycujnas.__ac_sx300_sy300_ql70_fmwebp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/610h8sq9ttl.__ac_sx300_sy300_ql70_fmwebp_.webp</image:loc><image:title>610h8sq9ttl.__ac_sx300_sy300_ql70_fmwebp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/61pxbfueivl.__ac_sx300_sy300_ql70_fmwebp_.webp</image:loc><image:title>61pxbfueivl.__ac_sx300_sy300_ql70_fmwebp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/71rzvi4ispl._ac_sx466_.jpg</image:loc><image:title>71rzvi4ispl._ac_sx466_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/41fo6vqcigl.__ac_sx300_sy300_ql70_fmwebp_.webp</image:loc><image:title>41fo6vqcigl.__ac_sx300_sy300_ql70_fmwebp_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/81rmzghxzml.__ac_sy300_sx300_ql70_fmwebp_.webp</image:loc><image:title>81rmzghxzml.__ac_sy300_sx300_ql70_fmwebp_</image:title></image:image><lastmod>2024-04-15T17:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/04/14/bmw-7-series-diy-rear-seat-entertainment-package/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/01639354832.jpeg</image:loc><image:title>01639354832</image:title></image:image><lastmod>2026-01-19T23:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/05/29/my-new-car-a-review-of-the-2017-bmw-750i-xdrive/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/maxresdefault.jpg</image:loc><image:title>maxresdefault</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230427_020558961.jpg</image:loc><image:title>pxl_20230427_020558961</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230426_221049051.jpg</image:loc><image:title>pxl_20230426_221049051</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230426_221015805.jpg</image:loc><image:title>pxl_20230426_221015805</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230427_020028514.jpg</image:loc><image:title>pxl_20230427_020028514</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230506_204628624.jpg</image:loc><image:title>pxl_20230506_204628624</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/718b3a5b946bc249b20cd72cd4971997.jpg</image:loc><image:title>718b3a5b946bc249b20cd72cd4971997</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230427_020548518.jpg</image:loc><image:title>pxl_20230427_020548518</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/used-2017-bmw-7-series-750i.jpg</image:loc><image:title>used-2017-bmw-7-series-750i</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/pxl_20230426_221838220.jpg</image:loc><image:title>pxl_20230426_221838220</image:title></image:image><lastmod>2024-04-14T15:40:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/07/new-exhaust-for-the-bimmer/</loc><lastmod>2024-04-14T15:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/04/11/review-unifi-usw-ultra-60w-8-port-managed-switch/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/screenshot-2024-04-11-104452.png</image:loc><image:title>screenshot-2024-04-11-104452</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/screenshot-2024-04-11-074746.png</image:loc><image:title>screenshot-2024-04-11-074746</image:title></image:image><lastmod>2024-04-11T17:04:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/04/10/new-house-new-security-system/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/image.jpg</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/screenshot-2024-04-10-090732.png</image:loc><image:title>screenshot-2024-04-10-090732</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/screenshot-2023-12-20-142150.jpg</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/screenshot-2023-12-20-142150.jpg</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/pxl_20240126_0150114978707815972274628478.jpg</image:loc><image:title>pxl_20240126_0150114978707815972274628478</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/screenshot-2024-01-25-154756.png</image:loc><image:title>screenshot-2024-01-25-154756</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/alan-j-hendry-knt4zd8hpb0-unsplash.jpg</image:loc><image:title>alan-j-hendry-KNt4zd8HPb0-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/img_20191031_152018.webp</image:loc><image:title>img_20191031_152018</image:title></image:image><lastmod>2024-04-10T15:34:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/04/05/navigating-cybersecurity-in-2024-trends-challenges-and-preparedness/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/04/boliviainteligente-i5th1b4emos-unsplash.jpg</image:loc><image:title>boliviainteligente-i5th1b4emos-unsplash</image:title></image:image><lastmod>2024-04-05T16:41:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/03/28/rags-to-riches-quick-upgrade-for-grandpa/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/media.jpg</image:loc><image:title>media</image:title></image:image><lastmod>2024-03-31T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/03/26/password-spraying-attacks-microsofts-recent-hack-and-proper-defense/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/jakob-rosen-hl-jq0aikg0-unsplash-1.jpg</image:loc><image:title>jakob-rosen-hL-jQ0aIkg0-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/jakob-rosen-hl-jq0aikg0-unsplash.jpg</image:loc><image:title>jakob-rosen-hl-jq0aikg0-unsplash</image:title></image:image><lastmod>2024-03-26T17:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/03/21/googles-enhanced-real-time-url-protection-a-game-changer-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/rubaitul-azad-kfusp6tgnbq-unsplash.jpg</image:loc><image:title>rubaitul-azad-kfusp6tgnbq-unsplash</image:title></image:image><lastmod>2024-03-21T17:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/03/12/unifi-48-poe-switch-gen-1-review-and-office-photo-dump/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-12-110332.png</image:loc><image:title>screenshot-2024-03-12-110332</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2023-12-20-142150.jpg</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-12-075852.png</image:loc><image:title>screenshot-2024-03-12-075852</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/03/screenshot-2024-03-12-075147.png</image:loc><image:title>screenshot-2024-03-12-075147</image:title></image:image><lastmod>2024-03-12T17:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/27/600th-post-blackcats-unitedhealth-group-cyberattack-a-wake-up-call-for-healthcare-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/hannah-troupe-0fqneb1vjam-unsplash-1.jpg</image:loc><image:title>hannah-troupe-0fqneb1vjam-unsplash-1</image:title></image:image><lastmod>2024-02-27T18:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/23/the-face-of-cyber-warfare-understanding-the-dynamics/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/ux-gun-5mj4po7kifc-unsplash.jpg</image:loc><image:title>ux-gun-5mj4po7kifc-unsplash</image:title></image:image><lastmod>2024-02-23T16:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/22/safeguarding-americas-gateways-biden-harris-administrations-cybersecurity-initiative-for-u-s-ports/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/david-everett-strickler-igcbfrmd11i-unsplash.jpg</image:loc><image:title>david-everett-strickler-igcbfrmd11i-unsplash</image:title></image:image><lastmod>2024-02-22T19:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/19/safeguarding-business-communication-a-comprehensive-guide-against-hackers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/lars-kienle-ilxx7xnbrf8-unsplash.jpg</image:loc><image:title>lars-kienle-ilxx7xnbrf8-unsplash</image:title></image:image><lastmod>2024-02-19T18:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/categories/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/pickawood-yblitay8bpa-unsplash.jpg</image:loc><image:title>pickawood-YbLitAY8bPA-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/dmitri-popov-441562-unsplash.jpg</image:loc><image:title>dmitri-popov-441562-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/bernard-hermant-546917-unsplash.jpg</image:loc><image:title>bernard-hermant-546917-unsplash</image:title></image:image><lastmod>2024-02-16T22:13:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securingtheuniverse.com/2024/02/12/navigating-the-augmented-reality-security-landscape-challenges-and-solutions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/jessica-lewis-thepaintedsquare-deyfdybvqha-unsplash.jpg</image:loc><image:title>jessica-lewis-thepaintedsquare-deyfdybvqha-unsplash</image:title></image:image><lastmod>2024-02-12T19:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/05/more-office-updates/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/pxl_20240128_190008990-1.jpg</image:loc><image:title>pxl_20240128_190008990-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/pxl_20240128_190008990.jpg</image:loc><image:title>pxl_20240128_190008990</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/pxl_20240128_185838256.jpg</image:loc><image:title>pxl_20240128_185838256</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/pxl_20240128_1856562635985786521531764506-1.jpg</image:loc><image:title>pxl_20240128_1856562635985786521531764506-1</image:title></image:image><lastmod>2024-02-11T03:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/08/google-search-scams-an-overview/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/mitchell-luo-jz4ca36oj_m-unsplash.jpg</image:loc><image:title>mitchell-luo-jz4ca36oj_m-unsplash</image:title></image:image><lastmod>2024-02-06T14:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/17/unifi-gateway-lite-review-a-compact-powerhouse/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/1a8a8826-89ab-4304-a00f-77b38b2956be.png</image:loc><image:title>1a8a8826-89ab-4304-a00f-77b38b2956be</image:title></image:image><lastmod>2024-02-06T14:40:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/10/cooling-a-unifi-cloud-key-plus/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/2-1.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/download.webp</image:loc><image:title>download</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2024-02-06T14:40:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/02/02/certification-completed-google-cybersecurity-professional/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/02/google-cybersecurity-professional.jpeg</image:loc><image:title>google-cybersecurity-professional</image:title></image:image><lastmod>2024-02-03T15:54:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/12/07/new-network-diagram-and-tips-for-creating-one/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/screenshot-2023-12-20-142150.png</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/screenshot-2023-12-20-142150.png</image:loc><image:title>screenshot-2023-12-20-142150</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/screenshot-2023-12-18-115234.png</image:loc><image:title>screenshot-2023-12-18-115234</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/screenshot-2023-12-12-141355.png</image:loc><image:title>screenshot-2023-12-12-141355</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/network-1.jpg</image:loc><image:title>network-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/will-network-diagram-1.png</image:loc><image:title>will-network-diagram-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/will-network-diagram.jpg</image:loc><image:title>will-network-diagram</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/will-network-diagram.png</image:loc><image:title>will-network-diagram</image:title></image:image><lastmod>2024-01-28T18:50:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/26/new-credential-completed-ibm-data-fundamentals/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/screenshot-2024-01-26-132230.png</image:loc><image:title>screenshot-2024-01-26-132230</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/image-1-1.png</image:loc><image:title>image-1-1</image:title></image:image><lastmod>2024-01-26T20:24:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/24/new-credential-completed-ibm-cloud-computing-fundamentals/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-01-24T19:12:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/02/the-solarwinds-backdoor-disaster/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/dima-pechurin-jubjyfvcv00-unsplash.jpg</image:loc><image:title>dima-pechurin-jubjyfvcv00-unsplash</image:title></image:image><lastmod>2024-01-09T15:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/03/protect-yourself-from-vishing-phone-scams-understanding-prevention-and-a-closer-look-at-a-common-script/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/icons8-team-r-enaopw8rs-unsplash.jpg</image:loc><image:title>icons8-team-r-enaopw8rs-unsplash</image:title></image:image><lastmod>2024-01-09T15:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2024/01/09/example-document-strengthening-financial-security-navigating-nist-sp-800-53-input-controls-for-centralized-accounting-systems/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2024/01/ibrahim-boran-iykqhp5cgq4-unsplash.jpg</image:loc><image:title>ibrahim-boran-iykqhp5cgq4-unsplash</image:title></image:image><lastmod>2024-01-09T15:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/contact/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/37815069_10155351234516386_2445122240207912960_o.jpg</image:loc><image:title>37815069_10155351234516386_2445122240207912960_o</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/28167878_10155017019061386_3639797235942759405_n.jpg</image:loc><image:title>28167878_10155017019061386_3639797235942759405_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/37814042_10155351197816386_1041389853993861120_n.jpg</image:loc><image:title>37814042_10155351197816386_1041389853993861120_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-01-04T15:01:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securingtheuniverse.com/2023/12/26/happy-holidays-2/</loc><lastmod>2023-12-26T15:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/12/19/unifi-identity-review-elevating-network-security-with-intuitive-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/ben-sweet-2lowvivhz-e-unsplash.jpg</image:loc><image:title>ben-sweet-2LowviVHZ-E-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/63b40a92093c6b2f3767e4e6_tmcv8t-y_400x400.png</image:loc><image:title>63b40a92093c6b2f3767e4e6_tMCv8T-y_400x400</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/3158190942721_271732ea67e258059607_512.png</image:loc><image:title>3158190942721_271732ea67e258059607_512</image:title></image:image><lastmod>2023-12-19T23:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/12/04/my-past-current-project-cars-2/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/530784_10151175861421386_234603595_n.jpg</image:loc><image:title>530784_10151175861421386_234603595_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/12/14606470_10153768465081386_5941623088618652490_n.jpg</image:loc><image:title>14606470_10153768465081386_5941623088618652490_n</image:title></image:image><lastmod>2023-12-04T17:55:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/30/unveiling-googles-cutting-edge-retvec-revolutionizing-text-vectorization-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/fly-d-c5pxrfejq3w-unsplash-1.jpg</image:loc><image:title>fly-d-c5pxrfejq3w-unsplash-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/steve-johnson-zpoodqc8ymw-unsplash-1.jpg</image:loc><image:title>steve-johnson-zpoodqc8ymw-unsplash-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/fly-d-c5pxrfejq3w-unsplash.jpg</image:loc><image:title>fly-d-c5pxrfejq3w-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/steve-johnson-zpoodqc8ymw-unsplash.jpg</image:loc><image:title>steve-johnson-zpoodqc8ymw-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/mitchell-luo-uzqq8oi7pxk-unsplash.jpg</image:loc><image:title>mitchell-luo-uzqq8oi7pxk-unsplash</image:title></image:image><lastmod>2023-11-30T21:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/27/unveiling-the-world-of-password-cracking-tools-harnessing-the-power-of-graphics-cards/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/rc-xyz-nft-gallery-enxyf6cexyu-unsplash.jpg</image:loc><image:title>rc-xyz-nft-gallery-enxyf6cexyu-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/tr8423-figure-a-how-an-8-character-password-could-be-cracked-in-just-a-few-minutes-1024x538-1.jpg</image:loc><image:title>2023 Password Table</image:title></image:image><lastmod>2023-11-27T20:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/20/navigating-the-risks-and-challenges-of-biometric-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/brands-people-swqrd5s0fwc-unsplash.jpg</image:loc><image:title>brands-people-swqrd5s0fwc-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/onur-binay-uw_8vsrocsc-unsplash.jpg</image:loc><image:title>onur-binay-uw_8vsrocsc-unsplash</image:title></image:image><lastmod>2023-11-20T19:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/11/14/2023-security-overview-recent-attacks-rising-trends-and-what-to-expect-in-2024/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/11/vertex-designs-8pfj0hni4fo-unsplash.jpg</image:loc><image:title>vertex-designs-8pfj0hni4fo-unsplash</image:title></image:image><lastmod>2023-11-14T13:56:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/25/revealing-hidden-passwords-in-browsers-offensive-defensive/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/tim-mielke-sewtzj90k7a-unsplash.jpg</image:loc><image:title>tim-mielke-sewtzj90k7a-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/towfiqu-barbhuiya-em5w9_xj3uu-unsplash.jpg</image:loc><image:title>towfiqu-barbhuiya-em5w9_xj3uu-unsplash</image:title></image:image><lastmod>2023-10-25T14:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/20/understanding-baseline-configuration-and-preventing-configuration-drift/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/absolutvision-82tpeld0_e4-unsplash.jpg</image:loc><image:title>absolutvision-82tpeld0_e4-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/fly-d-c5pxrfejq3w-unsplash.jpg</image:loc><image:title>fly-d-c5pxrfejq3w-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/ralfs-blumbergs-exf9shcto0-unsplash.jpg</image:loc><image:title>ralfs-blumbergs-exf9shcto0-unsplash</image:title></image:image><lastmod>2023-10-20T13:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/19/strengthening-your-security-using-windows-defender-credential-guard-to-protect-privileged-credentials/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/dan-nelson-ah-heguoe9k-unsplash.jpg</image:loc><image:title>dan-nelson-ah-heguoe9k-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/towfiqu-barbhuiya-fna5pazqhmm-unsplash.jpg</image:loc><image:title>towfiqu-barbhuiya-fna5pazqhmm-unsplash</image:title></image:image><lastmod>2023-10-19T13:10:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/18/getting-started-with-proxmox-your-gateway-to-virtualization/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/kelvin-han-ml0bdrx8go0-unsplash.jpg</image:loc><image:title>kelvin-han-ml0bdrx8go0-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/sigmund-aiic6wcqkqc-unsplash.jpg</image:loc><image:title>sigmund-aiic6wcqkqc-unsplash</image:title></image:image><lastmod>2023-10-18T13:14:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/15/new-logo/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/giphy.gif</image:loc><image:title>giphy</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/new-logo-2023-2.jpg</image:loc><image:title>New Logo 2023</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/small-round-logo-2023.jpg</image:loc><image:title>small-round-logo-2023</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/new-logo-2023-1.jpg</image:loc><image:title>new-logo-2023-1</image:title></image:image><lastmod>2023-10-15T16:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/14/review-2022-sony-85-class-bravia-xr-x95k-4k-hdr-mini-led-google-tv/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/387495464_1044255120107342_6241274245519849564_n.jpg</image:loc><image:title>387495464_1044255120107342_6241274245519849564_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/370269986_6781879231850717_6747070980064776632_n-1.jpg</image:loc><image:title>370269986_6781879231850717_6747070980064776632_n-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/387641439_1317302885576116_3951587102923789702_n-1.jpg</image:loc><image:title>387641439_1317302885576116_3951587102923789702_n-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/387641439_1317302885576116_3951587102923789702_n.jpg</image:loc><image:title>387641439_1317302885576116_3951587102923789702_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/10/370269986_6781879231850717_6747070980064776632_n.jpg</image:loc><image:title>370269986_6781879231850717_6747070980064776632_n</image:title></image:image><lastmod>2023-10-14T18:01:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/cloud-security-products/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/c-dustin-k-iog-bqf8e-unsplash-1.jpg</image:loc><image:title>c-dustin-K-Iog-Bqf8E-unsplash</image:title></image:image><lastmod>2023-10-14T17:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/10/12/new-house-new-lab/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/08/pxl_20230717_011008544.mp_-1.jpg</image:loc><image:title>pxl_20230717_011008544.mp_-1</image:title></image:image><lastmod>2023-10-14T17:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/07/it-installation-tips-for-wiring-cabling/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b648a-ebab7-scott-blake-1143102-unsplash.jpg</image:loc><image:title>scott-blake-1143102-unsplash</image:title></image:image><lastmod>2023-09-11T19:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/business-impact-assessments-vulnerability-assessments-penetration-tests-and-risk-assessments/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/jordan-vkx0kgkx9va-unsplash.jpg</image:loc><image:title>jordan-vkx0kgKx9VA-unsplash</image:title></image:image><lastmod>2023-05-30T20:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/05/27/exploring-cutting-edge-healthcare-technologies-software-hardware-and-procedures/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/national-cancer-institute-nfvdkihxylu-unsplash.jpg</image:loc><image:title>national-cancer-institute-nfvdkihxylu-unsplash</image:title></image:image><lastmod>2023-05-28T12:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/05/22/mastering-the-art-of-managing-costs-and-risks-in-cloud-and-hybrid-services/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/vladimir-anikeev-im8zyyasw6g-unsplash.jpg</image:loc><image:title>vladimir-anikeev-im8zyyasw6g-unsplash</image:title></image:image><lastmod>2023-05-22T19:22:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/05/02/cybersecurity-on-a-budget/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/05/kelly-sikkema-3-tc_5lrorm-unsplash.jpg</image:loc><image:title>kelly-sikkema-3-tc_5lrorm-unsplash</image:title></image:image><lastmod>2023-05-02T20:18:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/04/18/cybersecurity-tools-of-the-trade/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/04/cesar-carlevarino-aragon-nl_df0klepc-unsplash.jpg</image:loc><image:title>cesar-carlevarino-aragon-nl_df0klepc-unsplash</image:title></image:image><lastmod>2023-04-18T14:58:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/04/12/windows-server-overview-installation-setup-backups-and-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/04/taylor-vick-m5tzztfcofs-unsplash-1.jpg</image:loc><image:title>taylor-vick-m5tzztfcofs-unsplash-1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/04/taylor-vick-m5tzztfcofs-unsplash.jpg</image:loc><image:title>taylor-vick-m5tzztfcofs-unsplash</image:title></image:image><lastmod>2023-04-12T14:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/04/10/security-threats-involved-with-the-return-of-in-office-work/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/04/redd-f-5u_28ojjgms-unsplash.jpg</image:loc><image:title>redd-f-5u_28ojjgms-unsplash</image:title></image:image><lastmod>2023-04-10T14:11:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/04/05/cybersecurity-managing-remote-international-employees/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/04/lucas-george-wendt-iym2pcy0f8c-unsplash.jpg</image:loc><image:title>lucas-george-wendt-iym2pcy0f8c-unsplash</image:title></image:image><lastmod>2023-04-05T18:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/03/24/it-management-how-to-effectively-gauge-it-employees-skills-utilize-them-and-manage-their-career-and-professional-growth/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/03/priscilla-du-preez-432_ufglmta-unsplash.jpg</image:loc><image:title>priscilla-du-preez-432_ufglmta-unsplash</image:title></image:image><lastmod>2023-03-24T15:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/03/23/compliance-pci-dss-payment-card-industry-data-security-standard/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/03/avery-evans-rjqe64nmc_o-unsplash.jpg</image:loc><image:title>avery-evans-rjqe64nmc_o-unsplash</image:title></image:image><lastmod>2023-03-23T16:16:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/03/22/creating-enforcing-and-updating-phishing-campaigns/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/03/james-wheeler-hjhgcu_ibsq-unsplash.jpg</image:loc><image:title>james-wheeler-hjhgcu_ibsq-unsplash</image:title></image:image><lastmod>2023-03-22T14:02:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/03/02/it-management-essentials/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/03/jo-szczepanska-5airb5f464a-unsplash.jpg</image:loc><image:title>jo-szczepanska-5airb5f464a-unsplash</image:title></image:image><lastmod>2023-03-02T18:03:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/25/msp-sales-marketing-tips/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/cytonn-photography-n95vmlxqm2i-unsplash.jpg</image:loc><image:title>cytonn-photography-n95vmlxqm2i-unsplash</image:title></image:image><lastmod>2023-02-25T15:59:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/23/social-medias-effect-on-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/dole777-eqspi11rf68-unsplash.jpg</image:loc><image:title>dole777-eqspi11rf68-unsplash</image:title></image:image><lastmod>2023-02-23T14:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/19/cybersecurity-threats-to-the-healthcare-industry/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/fly-d-mt7lxzpjk7u-unsplash.jpg</image:loc><image:title>fly-d-mt7lxzpjk7u-unsplash</image:title></image:image><lastmod>2023-02-19T15:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/12/social-engineering-and-ai-understanding-the-art-of-manipulation-and-how-to-protect-yourself/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/alex-chumak-zguburggmdy-unsplash.jpg</image:loc><image:title>alex-chumak-zguburggmdy-unsplash</image:title></image:image><lastmod>2023-02-12T16:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/07/the-future-of-cybersecurity-threats-and-how-ai-can-help/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/clint-patterson-dyeufb8kqjk-unsplash.jpg</image:loc><image:title>clint-patterson-dyeufb8kqjk-unsplash</image:title></image:image><lastmod>2023-02-07T19:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/05/self-review-an-overview-of-chatgpt/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/possessed-photography-u3sowvixhky-unsplash.jpg</image:loc><image:title>possessed-photography-u3sowvixhky-unsplash</image:title></image:image><lastmod>2023-02-05T16:06:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2023/02/04/the-guard-by-compliancy-group-an-in-depth-review/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2023/02/tobias-tullius-4dky7d3lkkm-unsplash.jpg</image:loc><image:title>tobias-tullius-4dky7d3lkkm-unsplash</image:title></image:image><lastmod>2023-02-04T16:20:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/12/05/certification-path-started/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/12/ben-mullins-oxv3bzr7jxi-unsplash.jpg</image:loc><image:title>ben-mullins-oxv3bzr7jxi-unsplash</image:title></image:image><lastmod>2022-12-05T15:22:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/12/27/meraki-go-small-builds-need-love-too/</loc><lastmod>2022-07-11T14:42:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/01/24/second-build-using-cisco-meraki-go-products/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/01/pxl_20220124_160148873-2.jpg</image:loc><image:title>PXL_20220124_160148873</image:title></image:image><lastmod>2022-07-11T14:42:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/06/29/surveillance-system-storage-upgrade-12-tb/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/06/71awztf1xpl._ac_sx679_.jpg</image:loc><image:title>71awztf1xpl._ac_sx679_</image:title></image:image><lastmod>2022-07-11T14:38:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/11/17/scored-an-evga-3090-ftw-hybrid-kit/</loc><lastmod>2022-06-02T22:46:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/05/11/what-happens-when-i-get-bored/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/05/pxl_20220513_005820713-1.jpg</image:loc><image:title>PXL_20220513_005820713</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/05/pxl_20220513_005820713.jpg</image:loc><image:title>PXL_20220513_005820713</image:title></image:image><lastmod>2022-05-13T01:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/04/22/new-home-network/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/04/pxl_20220424_182639849-1.jpg</image:loc><image:title>PXL_20220424_182639849</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/04/image_editor_output_image812079324-1650824913187.jpg</image:loc><image:title>image_editor_output_image812079324-1650824913187</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/04/pxl_20220424_182545355.jpg</image:loc><image:title>PXL_20220424_182545355</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/04/pxl_20220424_182502339.jpg</image:loc><image:title>PXL_20220424_182502339</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/04/pxl_20220424_182639849.jpg</image:loc><image:title>PXL_20220424_182639849</image:title></image:image><lastmod>2022-04-26T14:49:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/04/04/now-offering-paid-services/</loc><lastmod>2022-04-04T15:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/03/04/russia-ukraine-war-how-to-strengthen-u-s-based-company-cybersecurity/</loc><lastmod>2022-03-04T14:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/03/03/review-netgear-prosafe-gs105-gigabit-switch/</loc><lastmod>2022-03-03T17:19:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/02/26/modem-router-overheating-throw-some-fans-on-it/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/pxl_20220226_181004206-1.jpg</image:loc><image:title>PXL_20220226_181004206</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/pxl_20220226_181004206.jpg</image:loc><image:title>PXL_20220226_181004206</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/pxl_20220226_180243323.jpg</image:loc><image:title>PXL_20220226_180243323</image:title></image:image><lastmod>2022-02-27T13:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/02/03/office-updates/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/fb_img_1644097571457.jpg</image:loc><image:title>FB_IMG_1644097571457</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/fb_img_1644097559492.jpg</image:loc><image:title>FB_IMG_1644097559492</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/02/pxl_20220203_165253738.jpg</image:loc><image:title>PXL_20220203_165253738</image:title></image:image><lastmod>2022-02-05T21:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/01/26/why-the-united-states-cyberwar-not-only-exists-but-is-hidden-from-public-view/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2022/01/ux-gun-5mj4po7kifc-unsplash.jpg</image:loc><image:title>ux-gun-5Mj4PO7KIFc-unsplash</image:title></image:image><lastmod>2022-02-03T18:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/01/26/it-governance-frameworks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/01/dayne-topkin-sk-c-om9jz8-unsplash.jpg</image:loc><image:title>dayne-topkin-Sk-C-om9Jz8-unsplash</image:title></image:image><lastmod>2022-02-03T18:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2022/01/28/so-you-want-to-become-your-own-isp/</loc><lastmod>2022-02-03T18:01:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/07/02/dna-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/ousa-chea-552189-unsplash.jpg</image:loc><image:title>ousa-chea-552189-unsplash</image:title></image:image><lastmod>2022-01-26T15:17:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/risk-management-and-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/bernard-hermant-ihcshrzxfs4-unsplash.jpg</image:loc><image:title>bernard-hermant-IhcSHrZXFs4-unsplash</image:title></image:image><lastmod>2021-10-25T14:02:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/risk-management-framework/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/pine-watt-3_xwxya43he-unsplash.jpg</image:loc><image:title>pine-watt-3_Xwxya43hE-unsplash</image:title></image:image><lastmod>2021-10-25T13:42:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/09/11/mining-build-part-2-my-mining-days-are-over/</loc><lastmod>2021-09-11T17:24:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/08/11/the-upcoming-switch-from-google-hangouts-to-chat/</loc><lastmod>2021-08-11T15:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/07/19/finished-my-masters-degree-certifications-here-i-come/</loc><lastmod>2021-07-19T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/05/graduation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/fb_img_1622913879229-1.jpg</image:loc><image:title>FB_IMG_1622913879229.jpg</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/fb_img_1622913881973.jpg</image:loc><image:title>FB_IMG_1622913881973.jpg</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/fb_img_1622913875694.jpg</image:loc><image:title>FB_IMG_1622913875694.jpg</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/fb_img_1622913879229.jpg</image:loc><image:title>FB_IMG_1622913879229.jpg</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/fb_img_1622913884993.jpg</image:loc><image:title>FB_IMG_1622913884993.jpg</image:title></image:image><lastmod>2021-06-05T21:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/thomas-rids-cyber-war-will-not-take-place-and-its-references-to-neuromancer-and-cyberpunk-2077/</loc><lastmod>2021-06-04T12:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/covid-19s-impact-on-phishing-attacks-2/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/03/prasesh-shiwakoti-lomash-mohihqdmuyy-unsplash-1.jpg</image:loc><image:title>prasesh-shiwakoti-lomash-moHiHqdmUYY-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/solarwinds-and-twitters-recent-hacks/</loc><lastmod>2021-06-04T11:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/acl-audit-command-language/</loc><lastmod>2021-06-04T11:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/systems-development-life-cycle-sdlc/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/yomex-owo-bm7vm8t4bqs-unsplash-1.jpg</image:loc><image:title>yomex-owo-Bm7Vm8T4BQs-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/reasons-it-projects-fail/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/chuttersnap-cgxdjyp6-nu-unsplash-1.jpg</image:loc><image:title>chuttersnap-cGXdjyP6-NU-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/phishing-emails-how-to-prove/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/stephen-phillips-hostreviews-co-uk-3mhgvrk4tjm-unsplash-1.jpg</image:loc><image:title>stephen-phillips-hostreviews-co-uk-3Mhgvrk4tjM-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/how-does-single-sign-on-authenticate-across-different-systems/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/dan-nelson-ah-heguoe9k-unsplash.jpg</image:loc><image:title>dan-nelson-ah-HeguOe9k-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/security-controls-cp-9-information-system-backup-and-mp-4-media-storage/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/chris-leipelt-4ugupo3ydkk-unsplash.jpg</image:loc><image:title>chris-leipelt-4UgUpo3YdKk-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/nist-national-vulnerability-database-nvd-18-low-security-impact-controls-for-a-universitys-administration-office/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/mikael-kristenson-3avlwp-7bg8-unsplash.jpg</image:loc><image:title>mikael-kristenson-3aVlWP-7bg8-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/verizons-data-breach-investigation-reports/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/quino-al-8gweaaxjjti-unsplash.jpg</image:loc><image:title>quino-al-8gWEAAXJjtI-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/the-core-competencies-of-a-security-manager-physical-cyber/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/ruthson-zimmerman-ws4wd-vj9m0-unsplash.jpg</image:loc><image:title>ruthson-zimmerman-Ws4wd-vJ9M0-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/review-adt-pulse-home-security-system-qolsys-iq-panel-2-qolsys-iq-motion-qolsys-mini-dw-s-qolsys-iq-smoke-skybell-slim-video-doorbell-vivotek-ib8360-w-wireless-mini-bullet-network-camera/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/maxresdefault.jpg</image:loc><image:title>maxresdefault</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/img_20191031_151939-1.jpg</image:loc><image:title>IMG_20191031_151939</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/img_20191031_152011.jpg</image:loc><image:title>IMG_20191031_152011</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/img_20191031_151958.jpg</image:loc><image:title>IMG_20191031_151958</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/73268239_413266186022234_5752242561297154048_n.jpg</image:loc><image:title>73268239_413266186022234_5752242561297154048_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/img_20191101_054858.jpg</image:loc><image:title>IMG_20191101_054858</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/74617619_758538237926604_5251608769409843200_n.jpg</image:loc><image:title>74617619_758538237926604_5251608769409843200_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/qolsys-iq-smoke-2-medium.png</image:loc><image:title>Qolsys-IQ-Smoke-2-MEDIUM</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/74822336_409447519979267_6824167330663104512_n.jpg</image:loc><image:title>74822336_409447519979267_6824167330663104512_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/qs1231840_media-001.jpg</image:loc><image:title>QS1231840_media-001</image:title></image:image><lastmod>2021-06-04T11:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/computer-digital-forensics-the-6-step-process/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/6e0fc-4b744-agence-olloweb-520914-unsplash.jpg</image:loc><image:title>agence-olloweb-520914-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/web-dev-gen-zs-influence/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/dafa1-86c48-helena-lopes-592971-unsplash.jpg</image:loc><image:title>helena-lopes-592971-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/passwords-storing-securing-sending/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/18d48-beee1-paulius-dragunas-627082-unsplash.jpg</image:loc><image:title>paulius-dragunas-627082-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/intrusion-prevention/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jose-fontano-246362-unsplash.jpg</image:loc><image:title>jose-fontano-246362-unsplash</image:title></image:image><lastmod>2021-06-04T11:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/brutus-password-cracking-tool-how-to-boost-password-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/dayne-topkin-78982-unsplash.jpg</image:loc><image:title>dayne-topkin-78982-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/computer-forensics-tools-of-the-trade/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/austin-chan-275638-unsplash.jpg</image:loc><image:title>austin-chan-275638-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/the-wait-is-over-wpa3-is-here/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-268378-unsplash1.jpg</image:loc><image:title>rawpixel-268378-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/data-backup-and-recovery-plans-for-businesses/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/01/camille-orgel-551599-unsplash.jpg</image:loc><image:title>camille-orgel-551599-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/potential-problems-with-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/10/james-pond-191266-unsplash.jpg</image:loc><image:title>james-pond-191266-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/04/things-not-to-do-when-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/09/david-von-diemar-745969-unsplash.jpg</image:loc><image:title>david-von-diemar-745969-unsplash</image:title></image:image><lastmod>2021-06-04T11:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/the-wpa2-handshake-and-wpa3/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/stephen-phillips-hostreviews-co-uk-lr_wx_klopm-unsplash-1.jpg</image:loc><image:title>stephen-phillips-hostreviews-co-uk-LR_wX_klOPM-unsplash</image:title></image:image><lastmod>2021-06-01T15:30:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/reducing-wireless-signal-range-for-increased-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/mika-baumeister-gwwkv06wyfy-unsplash-1.jpg</image:loc><image:title>mika-baumeister-gwWkv06WYFY-unsplash</image:title></image:image><lastmod>2021-06-01T15:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/webapp-fuzzing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/taras-shypka-ifsvn82xfgo-unsplash-1.jpg</image:loc><image:title>taras-shypka-iFSvn82XfGo-unsplash</image:title></image:image><lastmod>2021-06-01T15:07:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/javascript-and-vbscript/</loc><lastmod>2021-06-01T15:05:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/what-is-python/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/hitesh-choudhary-d9zow2rem8u-unsplash-1.jpg</image:loc><image:title>hitesh-choudhary-D9Zow2REm8U-unsplash</image:title></image:image><lastmod>2021-06-01T14:59:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/why-and-how-enumeration-is-a-more-intrusive-process-than-port-scanning-or-footprinting/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/brands-people-swqrd5s0fwc-unsplash-1.jpg</image:loc><image:title>brands-people-sWQrD5s0fWc-unsplash</image:title></image:image><lastmod>2021-06-01T14:57:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/nmap-exercise/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/timo-wielink-4zk45jnyqs4-unsplash-1.jpg</image:loc><image:title>timo-wielink-4Zk45jNyQS4-unsplash</image:title></image:image><lastmod>2021-06-01T14:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/website-footprinting-exercise/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/06/nino-liverani-eayqalqifeq-unsplash.jpg</image:loc><image:title>nino-liverani-EayqAlQiFeQ-unsplash</image:title></image:image><lastmod>2021-06-01T14:49:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/reverse-dns-lookups/</loc><lastmod>2021-06-01T14:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/06/01/the-bad-news-about-viruses-is-that-theres-no-foolproof-method-of-preventing-them-from-attaching-themselves-to-computers-no-matter-how-skilled-you-are-as-a-security-professional/</loc><lastmod>2021-06-01T14:42:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/05/25/im-now-a-member-of-the-bellevue-university-xi-chapter-of-omega-nu-lambda-national-honor-society-3-9-gpa-with-10-days-until-graduation/</loc><lastmod>2021-05-27T13:02:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/05/23/cybr650-blog-5-passwords-storing-securing-sending/</loc><lastmod>2021-05-23T16:04:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/05/14/cybr650-blog-4-smartphones-smart-or-not/</loc><lastmod>2021-05-14T18:53:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/04/24/project-mining-preparation/</loc><lastmod>2021-05-01T21:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/05/01/cybr650-blog-3-what-makes-a-good-security-manager/</loc><lastmod>2021-05-01T20:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/04/21/digital-forensics-no-longer-just-a-tool-for-professionals/</loc><lastmod>2021-04-21T14:23:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/04/06/cybr650-blog-2-personal-disaster-recovery-plans-and-home-security-systems-how-to-prepare-for-the-dangers-of-tomorrow/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/04/n-i-f-t-y-a-r-t-9hnsqn4tveg-unsplash-1.jpg</image:loc><image:title>n-i-f-t-y-a-r-t-9HnSQn4TVEg-unsplash</image:title></image:image><lastmod>2021-04-06T16:02:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/22/cybr650-blog-1-threat-modeling-in-cloud-computing/</loc><lastmod>2021-03-22T15:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/the-common-good-approach-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/03/ekaterina-z-nsyjufznqg0-unsplash-1.jpg</image:loc><image:title>ekaterina-z-nsYJUfzNQg0-unsplash</image:title></image:image><lastmod>2021-03-12T18:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/cyberspace-and-geopolitics-assessing-global-cybersecurity-norms/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/03/artem-bryzgalov-r2cajgq0gsi-unsplash.jpg</image:loc><image:title>artem-bryzgalov-r2CAjGQ0gSI-unsplash</image:title></image:image><lastmod>2021-03-12T18:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/south-koreas-cybersecurity-threats/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/03/shawn-ang-nq4tcjz77r0-unsplash-1.jpg</image:loc><image:title>shawn-ang-nq4tcJz77r0-unsplash</image:title></image:image><lastmod>2021-03-12T18:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/software-development-in-house-or-third-party/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/03/fotis-fotopoulos-duhkov44prg-unsplash-1.jpg</image:loc><image:title>fotis-fotopoulos-DuHKoV44prg-unsplash</image:title></image:image><lastmod>2021-03-12T18:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/change-control-systems/</loc><lastmod>2021-03-12T18:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/03/12/accentures-project-i6/</loc><lastmod>2021-03-12T18:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/10/17/additional-suggestions-for-a-successful-cloud-migration/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/10/ross-findon-303091-unsplash.jpg</image:loc><image:title>ross-findon-303091-unsplash</image:title></image:image><lastmod>2021-02-10T17:24:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/10/10/cloud-adoption/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/10/samuel-ferrara-503838-unsplash.jpg</image:loc><image:title>samuel-ferrara-503838-unsplash</image:title></image:image><lastmod>2021-02-10T17:22:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/09/27/public-and-private-clouds-pros-and-cons/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/09/tom-barrett-369215-unsplash.jpg</image:loc><image:title>tom-barrett-369215-unsplash</image:title></image:image><lastmod>2021-02-10T17:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/09/12/business-benefits-of-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/09/aidan-bartos-313782-unsplash.jpg</image:loc><image:title>aidan-bartos-313782-unsplash</image:title></image:image><lastmod>2021-02-10T16:54:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/09/04/cloud-computing-models/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/09/mike-enerio-34556-unsplash.jpg</image:loc><image:title>mike-enerio-34556-unsplash</image:title></image:image><lastmod>2021-02-10T16:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/08/29/cloud-computing-day-1/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/08/samuel-zeller-699374-unsplash.jpg</image:loc><image:title>samuel-zeller-699374-unsplash</image:title></image:image><lastmod>2021-02-10T16:42:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/05/30/end-of-semester-wrap-up/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/05/jeshoots-com-436787-unsplash.jpg</image:loc><image:title>jeshoots-com-436787-unsplash</image:title></image:image><lastmod>2021-02-10T16:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/05/22/what-makes-a-great-all-in-one-printergreat/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/05/plotter-2138990_1920.jpg</image:loc><image:title>plotter-2138990_1920</image:title></image:image><lastmod>2021-02-10T16:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/05/15/security-software-recommendations-for-mobile-devices/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/05/hector-martinez-110928-unsplash.jpg</image:loc><image:title>hector-martinez-110928-unsplash</image:title></image:image><lastmod>2021-02-10T16:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/05/09/what-to-look-for-in-a-gaming-laptop/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/05/michal-kubalczyk-505207-unsplash.jpg</image:loc><image:title>michal-kubalczyk-505207-unsplash</image:title></image:image><lastmod>2021-02-10T16:07:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/05/01/what-is-the-best-internet-provider-for-gaming/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/05/chris-liverani-563711-unsplash.jpg</image:loc><image:title>chris-liverani-563711-unsplash</image:title></image:image><lastmod>2021-02-10T16:05:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/04/25/virtualization-an-overview/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/04/maria-badasian-539444-unsplash.jpg</image:loc><image:title>maria-badasian-539444-unsplash</image:title></image:image><lastmod>2021-02-10T16:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/04/18/pc-maintenance-tips/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/04/luke-hodde-715277-unsplash.jpg</image:loc><image:title>luke-hodde-715277-unsplash</image:title></image:image><lastmod>2021-02-10T16:02:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/04/10/windows-10-easy-ways-to-improve-your-pcs-performance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/04/vasanth-737064-unsplash.jpg</image:loc><image:title>vasanth-737064-unsplash</image:title></image:image><lastmod>2021-02-10T15:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/04/04/ssds-and-gamers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/04/jakob-owens-557723-unsplash.jpg</image:loc><image:title>jakob-owens-557723-unsplash</image:title></image:image><lastmod>2021-02-10T15:57:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/03/27/upgrading-your-computers-ram/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/03/carlos-irineu-da-costa-456879-unsplash.jpg</image:loc><image:title>carlos-irineu-da-costa-456879-unsplash</image:title></image:image><lastmod>2021-02-10T15:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/03/20/cost-effective-pc-upgrades-for-beginners/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/03/alexandru-bogdan-ghita-481900-unsplash.jpg</image:loc><image:title>alexandru-bogdan-ghita-481900-unsplash</image:title></image:image><lastmod>2021-02-10T15:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/02/27/what-is-snmp-and-why-use-it/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/02/niklas-veenhuis-139076-unsplash.jpg</image:loc><image:title>niklas-veenhuis-139076-unsplash</image:title></image:image><lastmod>2021-02-10T15:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/02/20/tips-for-boosting-your-wireless-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/02/robert-hickerson-38585-unsplash.jpg</image:loc><image:title>robert-hickerson-38585-unsplash</image:title></image:image><lastmod>2021-02-10T15:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/02/13/tips-for-building-a-business-cloud-infrastructure/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/02/hunters-race-408744-unsplash.jpg</image:loc><image:title>hunters-race-408744-unsplash</image:title></image:image><lastmod>2021-02-10T15:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/02/07/how-to-improve-a-wi-fi-network-at-home/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/02/bernard-hermant-667645-unsplash.jpg</image:loc><image:title>bernard-hermant-667645-unsplash</image:title></image:image><lastmod>2021-02-10T15:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/01/31/the-many-benefits-of-ipv6/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/01/hao-wang-217034-unsplash.jpg</image:loc><image:title>hao-wang-217034-unsplash</image:title></image:image><lastmod>2021-02-10T15:45:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/01/24/tips-for-upgrading-vlan-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/01/james-sutton-187816-unsplash.jpg</image:loc><image:title>james-sutton-187816-unsplash</image:title></image:image><lastmod>2021-02-10T15:44:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/01/16/developing-a-naming-convention-for-your-network/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/01/chuttersnap-413007-unsplash.jpg</image:loc><image:title>chuttersnap-413007-unsplash</image:title></image:image><lastmod>2021-02-10T15:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/01/11/protecting-your-smart-gadgets/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/01/fabian-grohs-672016-unsplash.jpg</image:loc><image:title>fabian-grohs-672016-unsplash</image:title></image:image><lastmod>2021-02-10T15:40:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/01/03/how-to-properly-set-up-an-ethernet-connection/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/01/john-towner-128480-unsplash.jpg</image:loc><image:title>john-towner-128480-unsplash</image:title></image:image><lastmod>2021-02-10T15:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2016/12/16/ethernets-future-science-fiction-or-reality/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2016/12/craig-sybert-774140-unsplash.jpg</image:loc><image:title>craig-sybert-774140-unsplash</image:title></image:image><lastmod>2021-02-10T15:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2016/12/06/bluetooth-upgrades/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2016/12/jonas-jacobsson-455519-unsplash.jpg</image:loc><image:title>jonas-jacobsson-455519-unsplash</image:title></image:image><lastmod>2021-02-10T15:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2016/12/02/mozillas-firefox-triumphant-return/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2016/12/guido-jansen-400639-unsplash.jpg</image:loc><image:title>guido-jansen-400639-unsplash</image:title></image:image><lastmod>2021-02-10T15:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/02/10/nist-special-publication-800-30-powerpoint/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/02/charles-deluvio-wn7dozuh3rs-unsplash.jpg</image:loc><image:title>charles-deluvio-wn7dOzUh3Rs-unsplash</image:title></image:image><lastmod>2021-02-10T15:15:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/02/10/syrian-electronic-army-and-anonymous/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2021/02/tarik-haiga-bxelnnmn88y-unsplash-1.jpg</image:loc><image:title>tarik-haiga-BxELNNMN88Y-unsplash</image:title></image:image><lastmod>2021-02-10T15:11:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/02/10/fake-news-and-its-deterrents/</loc><lastmod>2021-02-10T15:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/01/22/pc-upgrade-time/</loc><lastmod>2021-01-22T18:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2021/01/13/covid-19s-impact-on-phishing-attacks/</loc><lastmod>2021-01-13T15:37:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/28/how-to-fixing-google-chromes-print-issues-and-google-cloud-prints-demise-12-31-2020/</loc><lastmod>2020-12-28T16:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/24/rtx-3090-arrived-review-in-progress/</loc><lastmod>2020-12-24T16:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/30/review-logitech-c920s-pro-hd-webcam/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/71fjrw0wzhl._ac_sl1500_.jpg</image:loc><image:title>71fjRW0WzhL._AC_SL1500_</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191030_095907.jpg</image:loc><image:title>IMG_20191030_095907</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191030_094808.jpg</image:loc><image:title>IMG_20191030_094808</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191030_094800.jpg</image:loc><image:title>IMG_20191030_094800</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191030_094752.jpg</image:loc><image:title>IMG_20191030_094752</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191030_092446.jpg</image:loc><image:title>IMG_20191030_092446</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/capture-1.jpg</image:loc><image:title>Capture</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/capture2-1.jpg</image:loc><image:title>Capture2</image:title></image:image><lastmod>2020-12-23T19:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/17/troubleshooting-multiple-displays-in-windows-10/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/tadas-sar-t01gzhbsymq-unsplash.jpg</image:loc><image:title>tadas-sar-T01GZhBSyMQ-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/display4.png</image:loc><image:title>display4</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/display3.png</image:loc><image:title>display3</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/display2.png</image:loc><image:title>display2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/display1.png</image:loc><image:title>display1</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/display.png</image:loc><image:title>display</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/clint-patterson-exfrr9kkzle-unsplash.jpg</image:loc><image:title>clint-patterson-exfrR9KkzlE-unsplash</image:title></image:image><lastmod>2020-12-23T17:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/03/04/sending-an-email-in-zendesk/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b78c6-89439-john-schnobrich-520019-unsplash.jpg</image:loc><image:title>john-schnobrich-520019-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/80dd4-89ff8-capture2.png</image:loc><image:title>Capture2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/081a5-7da8f-capture.jpg</image:loc><image:title>Capture</image:title></image:image><lastmod>2020-12-23T17:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/18/e-commerce-inventory-kitting-bundling/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/5ad1f-f43e2-samuel-zeller-118195-unsplash.jpg</image:loc><image:title>samuel-zeller-118195-unsplash</image:title></image:image><lastmod>2020-12-23T17:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/17/tips-for-creating-an-effective-project-schedule/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/dfb78-71d94-rawpixel-552391-unsplash.jpg</image:loc><image:title>rawpixel-552391-unsplash</image:title></image:image><lastmod>2020-12-23T17:08:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/12/calculating-server-rack-wattage-btu/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3a5a4-945c3-imgix-391808-unsplash.jpg</image:loc><image:title>imgix-391808-unsplash</image:title></image:image><lastmod>2020-12-23T17:05:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/28/selecting-an-isp-for-business/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2299c-2b3cb-rawpixel-567016-unsplash.jpg</image:loc><image:title>rawpixel-567016-unsplash</image:title></image:image><lastmod>2020-12-23T17:03:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/23/relocating-it-systems-checklist/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/glenn-carstens-peters-190592-unsplash.jpg</image:loc><image:title>glenn-carstens-peters-190592-unsplash</image:title></image:image><lastmod>2020-12-23T17:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/27/recent-t-mobile-hack-what-happened-and-what-to-do/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/yiran-ding-478037-unsplash.jpg</image:loc><image:title>yiran-ding-478037-unsplash</image:title></image:image><lastmod>2020-12-23T16:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/13/operation-sharpshooter-critical-infrastructure-cyberattack/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/12/dusty-barnes-onyjxhixlwi-unsplash.jpg</image:loc><image:title>dusty-barnes-oNyJXHIxlWI-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d5151-65ca9-banter-snaps-448071-unsplash.jpg</image:loc><image:title>banter-snaps-448071-unsplash</image:title></image:image><lastmod>2020-12-23T16:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/28/cloud-trends-for-2019/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/01/c-dustin-k-iog-bqf8e-unsplash.jpg</image:loc><image:title>c-dustin-K-Iog-Bqf8E-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4772b-af475-nacho-rochon-517487-unsplash.jpg</image:loc><image:title>nacho-rochon-517487-unsplash</image:title></image:image><lastmod>2020-12-23T16:41:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/21/wi-fi-6-the-next-generation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/02/mika-baumeister-gwwkv06wyfy-unsplash.jpg</image:loc><image:title>mika-baumeister-gwWkv06WYFY-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/1c69c-bd3ca-clem-onojeghuo-189661-unsplash.jpg</image:loc><image:title>clem-onojeghuo-189661-unsplash</image:title></image:image><lastmod>2020-12-23T16:40:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/26/microsoft-hololens-2s-military-applications-pros-and-cons/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/02/specna-arms-bhtfqxjjbbe-unsplash.jpg</image:loc><image:title>specna-arms-BHtfQxJJBbE-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/77c71-47e6b-specna-arms-1136440-unsplash.jpg</image:loc><image:title>specna-arms-1136440-unsplash</image:title></image:image><lastmod>2020-12-23T16:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/29/random-thought-environmentally-friendly-credit-cards/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/76a33-4b539-louis-reed-779919-unsplash.jpg</image:loc><image:title>louis-reed-779919-unsplash</image:title></image:image><lastmod>2020-12-23T16:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/04/operation-wizardopium-google-chrome-zero-day-exploit-update-now/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/chase-clark-hkkm537i_ik-unsplash-1.jpg</image:loc><image:title>chase-clark-HKKM537I_Ik-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/chase-clark-hkkm537i_ik-unsplash.jpg</image:loc><image:title>chase-clark-HKKM537I_Ik-unsplash</image:title></image:image><lastmod>2020-12-23T16:35:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/cis608-t301-information-security-management-week-2-how-to-increase-voip-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/devin-pickell-ozzhh3kpulw-unsplash.jpg</image:loc><image:title>devin-pickell-ozzHH3KpUlw-unsplash</image:title></image:image><lastmod>2020-12-23T16:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/spacex-mission-vision-statements/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/jeremy-thomas-e0ahdsenmdg-unsplash.jpg</image:loc><image:title>jeremy-thomas-E0AHdsENmDg-unsplash</image:title></image:image><lastmod>2020-12-23T16:32:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/sample-rmf-categorization/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/priscilla-du-preez-oedkpaxymxu-unsplash.jpg</image:loc><image:title>priscilla-du-preez-OEdkPaxYMXU-unsplash</image:title></image:image><lastmod>2020-12-23T16:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/cis608-t301-information-security-management-week-3-how-to-strengthen-google-g-suite-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/mitchell-luo-jz4ca36oj_m-unsplash.jpg</image:loc><image:title>mitchell-luo-jz4ca36oJ_M-unsplash</image:title></image:image><lastmod>2020-12-23T16:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/googles-security-policy-disaster-recovery-and-business-continuity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/catalin-pop-259b8ihat3u-unsplash.jpg</image:loc><image:title>catalin-pop-259b8iHAt3U-unsplash</image:title></image:image><lastmod>2020-12-23T16:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/erp-enterprise-resource-planning-system-and-policies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/scott-graham-oqmzwnd3thu-unsplash-1.jpg</image:loc><image:title>scott-graham-OQMZwNd3ThU-unsplash (1)</image:title></image:image><lastmod>2020-12-23T16:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/job-applicant-internet-searches/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/luis-villasmil-mlvbmbxfwi4-unsplash.jpg</image:loc><image:title>luis-villasmil-mlVbMbxfWI4-unsplash</image:title></image:image><lastmod>2020-12-23T16:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/polygraph-testing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/pawel-czerwinski-3dt_d9ttbv0-unsplash.jpg</image:loc><image:title>pawel-czerwinski-3DT_d9ttbv0-unsplash</image:title></image:image><lastmod>2020-12-23T16:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/workplace-safety-and-supervisors/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/matthew-waring-mjaoiige14e-unsplash.jpg</image:loc><image:title>matthew-waring-MJAoiige14E-unsplash</image:title></image:image><lastmod>2020-12-23T16:24:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/correcting-poor-work-case-study/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/maria-teneva-vf4o1owtpnk-unsplash.jpg</image:loc><image:title>maria-teneva-vf4O1OwtPnk-unsplash</image:title></image:image><lastmod>2020-12-23T16:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/27/benefits-problems-with-promotions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/floriane-vita-fyd3owbuxny-unsplash.jpg</image:loc><image:title>floriane-vita-FyD3OWBuXnY-unsplash</image:title></image:image><lastmod>2020-12-23T16:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/07/infosec-performance-appraisals/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/alan-biglow-md6r1hhzaz8-unsplash.jpg</image:loc><image:title>alan-biglow-mD6r1HHZaZ8-unsplash</image:title></image:image><lastmod>2020-12-23T16:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/13/why-is-it-important-for-security-leaders-to-understand-their-organizations-budgeting-and-financial-processes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/michael-longmire-rhbvojnrqvg-unsplash.jpg</image:loc><image:title>michael-longmire-RhBVoJnRqVg-unsplash</image:title></image:image><lastmod>2020-12-23T16:15:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/13/information-assets-threat-vulnerability-and-exploits/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/amirr-zolfaqari-amunsya9_yc-unsplash.jpg</image:loc><image:title>amirr-zolfaqari-AmuNSYa9_yc-unsplash</image:title></image:image><lastmod>2020-12-23T16:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/15/security-budgets/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/sharon-mccutcheon-8lnbxtxfgzw-unsplash.jpg</image:loc><image:title>sharon-mccutcheon-8lnbXtxFGZw-unsplash</image:title></image:image><lastmod>2020-12-23T16:14:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/16/stig-examples-and-asset-prioritization/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/collin-armstrong-8fxji5wuwkc-unsplash.jpg</image:loc><image:title>collin-armstrong-8FxJi5wuwKc-unsplash</image:title></image:image><lastmod>2020-12-23T16:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/20/risk-control-strategies-transference/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/markus-winkler-gldjnqfcixe-unsplash.jpg</image:loc><image:title>markus-winkler-gLdJnQFcIXE-unsplash</image:title></image:image><lastmod>2020-12-23T16:11:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/23/security-services-proprietary-vs-contract/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/sebastian-herrmann-n4_q2ddyy80-unsplash.jpg</image:loc><image:title>sebastian-herrmann-n4_Q2dDYy80-unsplash</image:title></image:image><lastmod>2020-12-23T16:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/01/29/architecture-firm-example-executive-summary/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/01/kelly-sikkema-vbpzrgd7gfc-unsplash.jpg</image:loc><image:title>kelly-sikkema-VBPzRgd7gfc-unsplash</image:title></image:image><lastmod>2020-12-23T16:08:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/03/security-benchmarking-example-articles/</loc><lastmod>2020-12-23T16:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/03/security-incident-questions-you-should-ask/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/evan-dennis-i-in3cvejg-unsplash.jpg</image:loc><image:title>evan-dennis-i--IN3cvEjg-unsplash</image:title></image:image><lastmod>2020-12-23T16:07:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/03/architecture-firm-executive-summary-detective-alerting-and-response-controls/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/clay-banks-erlbq8a-c5s-unsplash.jpg</image:loc><image:title>clay-banks-erlbQ8a-C5s-unsplash</image:title></image:image><lastmod>2020-12-23T16:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/04/security-performance-measure-example/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/william-warby-wahfnoqbynm-unsplash.jpg</image:loc><image:title>william-warby-WahfNoqbYnM-unsplash</image:title></image:image><lastmod>2020-12-23T16:04:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/05/example-document-security-assessment-report-sar/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/scott-graham-oqmzwnd3thu-unsplash.jpg</image:loc><image:title>scott-graham-OQMZwNd3ThU-unsplash</image:title></image:image><lastmod>2020-12-23T16:03:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/13/environmental-protection-agencys-contingency-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/noah-buscher-x8zstuks2pm-unsplash.jpg</image:loc><image:title>noah-buscher-x8ZStukS2PM-unsplash</image:title></image:image><lastmod>2020-12-23T15:55:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/17/insecure-org/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/franck-free-hotspot-com-snvbtrqr7ee-unsplash.jpg</image:loc><image:title>franck-free-hotspot-com-sNvBTRQR7eE-unsplash</image:title></image:image><lastmod>2020-12-23T15:54:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/17/3-methods-for-assessing-physical-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/henry-co-m3kfixgdcko-unsplash.jpg</image:loc><image:title>henry-co-M3KfixgdCko-unsplash</image:title></image:image><lastmod>2020-12-23T15:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/18/example-security-field-review/</loc><lastmod>2020-12-23T15:51:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/20/example-information-security-continuous-monitoring-iscm-plan/</loc><lastmod>2020-12-23T15:50:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/24/biometrics-iris-recognition/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/amanda-dalbjorn-ubjmy92p8wk-unsplash.jpg</image:loc><image:title>amanda-dalbjorn-UbJMy92p8wk-unsplash</image:title></image:image><lastmod>2020-12-23T15:48:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/24/how-can-metrics-be-used-to-persuade-executive-management-to-improve-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/02/ben-rosett-wdjkxfq4vhy-unsplash.jpg</image:loc><image:title>ben-rosett-WdJkXFQ4VHY-unsplash</image:title></image:image><lastmod>2020-12-23T15:45:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/02/27/example-crisis-management-plan-cmp/</loc><lastmod>2020-12-23T15:43:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/09/break-fix-environments-and-active-passive-attacks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/erik-mclean-rfkadkptt-a-unsplash.jpg</image:loc><image:title>erik-mclean-RfkaDKptt-A-unsplash</image:title></image:image><lastmod>2020-12-23T15:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/09/key-elements-of-a-network-security-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/felipe-furtado-2zdxqgtzefe-unsplash.jpg</image:loc><image:title>felipe-furtado-2zDXqgTzEFE-unsplash</image:title></image:image><lastmod>2020-12-23T15:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/18/symmetric-encryption/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/justin-main-ewkdwf05eds-unsplash.jpg</image:loc><image:title>justin-main-ewKDwf05Eds-unsplash</image:title></image:image><lastmod>2020-12-23T15:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/18/why-isnt-it-a-good-idea-to-send-the-same-message-twice-once-when-it-was-encrypted-and-once-in-plain-text/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/max-chen-lud4oaucp4q-unsplash.jpg</image:loc><image:title>max-chen-lud4OaUCP4Q-unsplash</image:title></image:image><lastmod>2020-12-23T15:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/23/why-doesnt-encryption-provide-a-secure-form-of-authentication/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/markus-spiske-iar-afb0qqw-unsplash.jpg</image:loc><image:title>markus-spiske-iar-afB0QQw-unsplash</image:title></image:image><lastmod>2020-12-23T15:33:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/26/social-media-and-social-engineering/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/merakist-cnbrsqj8mhq-unsplash.jpg</image:loc><image:title>merakist-CNbRsQj8mHQ-unsplash</image:title></image:image><lastmod>2020-12-23T15:19:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/03/31/kerberos/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/03/dan-nelson-t4eriqtgfze-unsplash.jpg</image:loc><image:title>dan-nelson-T4erIQTGfZE-unsplash</image:title></image:image><lastmod>2020-12-23T14:53:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/02/harry-and-maes-case-study-semester-project/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-12-23T14:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/08/advertisements-social-influence/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/darya-tryfanava-drgrsvdjezu-unsplash.jpg</image:loc><image:title>darya-tryfanava-DRgRSVdJEzU-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/2-1.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/1-1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-12-23T14:49:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/08/the-public-and-cybersecurity-practices-and-knowledge-by-lee-rainie-director-of-internet-science-and-technology-research-at-the-pew-research-center/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/juvnsky-anton-maksimov-yuikxzrloqc-unsplash.jpg</image:loc><image:title>juvnsky-anton-maksimov-yUikXZrloQc-unsplash</image:title></image:image><lastmod>2020-12-23T14:48:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/27/cookies-in-ike/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/sara-sperry-emvlq5n8n0-unsplash.jpg</image:loc><image:title>sara-sperry--EMvlQ5n8n0-unsplash</image:title></image:image><lastmod>2020-12-23T14:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/27/common-ipsec-attacks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/possessed-photography-_e1pqxkukmw-unsplash.jpg</image:loc><image:title>possessed-photography-_E1PQXKUkMw-unsplash</image:title></image:image><lastmod>2020-12-23T14:46:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/27/secure-messaging-infrastructure-example/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/3-1.png</image:loc><image:title>3</image:title></image:image><lastmod>2020-12-23T14:44:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/27/wireless-layout-example/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/4-1.png</image:loc><image:title>4</image:title></image:image><lastmod>2020-12-23T14:44:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/04/28/social-engineering-framing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/04/rolands-zilvinskis-cpxrbhechrc-unsplash.jpg</image:loc><image:title>rolands-zilvinskis-cPxRBHechRc-unsplash</image:title></image:image><lastmod>2020-12-23T14:43:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/12/which-are-better-hardware-or-software-firewalls/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/paul-bulai-xoqja4oc8p0-unsplash.jpg</image:loc><image:title>paul-bulai-XOQJa4OC8P0-unsplash</image:title></image:image><lastmod>2020-12-23T14:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/12/cisco-meraki-mx64-firewall/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/ricardo-gomez-angel-98jvavugv0-unsplash.jpg</image:loc><image:title>ricardo-gomez-angel--98jVaVuGv0-unsplash</image:title></image:image><lastmod>2020-12-23T14:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/12/soft-skills-of-a-social-engineer-humility-and-motivation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/kate-kalvach-yuyueckd7tk-unsplash.jpg</image:loc><image:title>kate-kalvach-YUyueCkd7Tk-unsplash</image:title></image:image><lastmod>2020-12-23T14:40:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/19/why-was-snmpv3-developed-how-does-it-improve-security-over-versions-1-and-2/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/shahadat-rahman-bfrqnkbulyq-unsplash.jpg</image:loc><image:title>shahadat-rahman-BfrQnKBulYQ-unsplash</image:title></image:image><lastmod>2020-12-23T14:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/19/example-ipv6-background-paper-for-a-business/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/john-towner-p-rn-n6miag-unsplash.jpg</image:loc><image:title>john-towner-p-rN-n6Miag-unsplash</image:title></image:image><lastmod>2020-12-23T14:36:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/05/20/pew-research-centers-americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/05/jason-dent-jfk0dvyvdvw-unsplash.jpg</image:loc><image:title>jason-dent-JFk0dVyvdvw-unsplash</image:title></image:image><lastmod>2020-12-23T14:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/final-example-security-awareness-training-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/victor-freitas-kizbvhne7hy-unsplash.jpg</image:loc><image:title>victor-freitas-KIzBvHNe7hY-unsplash</image:title></image:image><lastmod>2020-12-23T14:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/security-awareness-presentation-example/</loc><lastmod>2020-12-23T14:32:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/score-pci-and-cis-benchmarks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/will-paterson-zb13n8edjge-unsplash.jpg</image:loc><image:title>will-paterson-zb13N8EDjGE-unsplash</image:title></image:image><lastmod>2020-12-23T14:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/dalton-walton-carlton-inc-audit/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/christina-wocintechchat-com-9-ohfp-dicg-unsplash.jpg</image:loc><image:title>christina-wocintechchat-com-9-ohfp-Dicg-unsplash</image:title></image:image><lastmod>2020-12-23T14:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/cybr515-final/</loc><lastmod>2020-12-23T14:28:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/data-backup-tools/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/louis-hansel-shotsoflouis-rf9eelw3qxo-unsplash.jpg</image:loc><image:title>louis-hansel-shotsoflouis-Rf9eElW3Qxo-unsplash</image:title></image:image><lastmod>2020-12-23T14:27:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/forensic-investigation-inappropriate-content/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/matt-popovich-7mqszse6fau-unsplash.jpg</image:loc><image:title>matt-popovich-7mqsZsE6FaU-unsplash</image:title></image:image><lastmod>2020-12-23T14:26:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/forensic-investigation-check-fraud/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/blogging-guide-xyamk5p3vca-unsplash.jpg</image:loc><image:title>blogging-guide-xYaMK5p3vCA-unsplash</image:title></image:image><lastmod>2020-12-23T14:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/employee-fraud-investigation/</loc><lastmod>2020-12-23T14:23:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/nist-special-publication-800-30-revision-1-guide-for-conducting-risk-assessments/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/mikhail-pavstyuk-eky2otrpxdw-unsplash.jpg</image:loc><image:title>mikhail-pavstyuk-EKy2OTRPXdw-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/absolutvision-bslhkwxxxak-unsplash.jpg</image:loc><image:title>absolutvision-bSlHKWxxXak-unsplash</image:title></image:image><lastmod>2020-12-21T18:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/the-future-of-microsoft-networking/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/drew-graham-344554-unsplash.jpg</image:loc><image:title>drew-graham-344554-unsplash</image:title></image:image><lastmod>2020-12-21T18:16:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-potential-problems-and-their-solutions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/michael-dziedzic-aqyguywncsm-unsplash.jpg</image:loc><image:title>michael-dziedzic-aQYgUYwnCsM-unsplash</image:title></image:image><lastmod>2020-12-21T18:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/usa-patriot-act-of-2001-why/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/michael-schaffler-eggwiswjpre-unsplash.jpg</image:loc><image:title>michael-schaffler-egGWiswJpRE-unsplash</image:title></image:image><lastmod>2020-12-21T17:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/it-shaping-business/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/sean-pollock-phyq704ffda-unsplash.jpg</image:loc><image:title>sean-pollock-PhYq704ffdA-unsplash</image:title></image:image><lastmod>2020-12-21T17:44:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/16/non-state-cyberweapons/</loc><lastmod>2020-12-21T17:01:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/privacy-policy/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/rawpixel-658247-unsplash.jpg</image:loc><image:title>rawpixel-658247-unsplash</image:title></image:image><lastmod>2020-12-21T16:10:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securingtheuniverse.com/2020/11/06/example-imaging-worksheet/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/annie-spratt-2cpzm3mam_0-unsplash.jpg</image:loc><image:title>annie-spratt-2cPzM3mam_0-unsplash</image:title></image:image><lastmod>2020-12-21T15:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/scope-creep-in-investigations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/thomas-tucker-2q3rh6grop4-unsplash.jpg</image:loc><image:title>thomas-tucker-2q3RH6grop4-unsplash</image:title></image:image><lastmod>2020-12-21T15:03:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/cis-607-case-assignment-homicide/</loc><lastmod>2020-12-21T15:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/validating-with-hexadecimal-editors/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/mika-baumeister-moia38qcu84-unsplash.jpg</image:loc><image:title>mika-baumeister-moia38qcU84-unsplash</image:title></image:image><lastmod>2020-12-21T14:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/11/06/usb-ssd-vs-hdd-overwrites/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/11/vincent-botta-wyd_wfifjvs-unsplash.jpg</image:loc><image:title>vincent-botta-wYD_wfifJVs-unsplash</image:title></image:image><lastmod>2020-12-21T14:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/flavors-of-linux/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/sai-kiran-anagani-tjbk79tarie-unsplash.jpg</image:loc><image:title>sai-kiran-anagani-Tjbk79TARiE-unsplash</image:title></image:image><lastmod>2020-12-21T14:56:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/example-forensics-case-fraud/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/science-in-hd-fanudwgjqbg-unsplash-1.jpg</image:loc><image:title>science-in-hd-FaNUdWGJqBg-unsplash</image:title></image:image><lastmod>2020-12-21T14:54:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/honeypots-honeynets-and-honeywalls/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/arwin-neil-baichoo-yqzrdgu-kai-unsplash-1.jpg</image:loc><image:title>arwin-neil-baichoo-yQzrDgU-KAI-unsplash</image:title></image:image><lastmod>2020-12-21T14:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/belkasoft-live-ram-capturer/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/tyler-daviaux-zs95n6swuta-unsplash-1.jpg</image:loc><image:title>tyler-daviaux-zS95n6sWuTA-unsplash</image:title></image:image><lastmod>2020-12-21T14:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/control-process-for-evaluating-forensics-tools/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/cesar-carlevarino-aragon-nl_df0klepc-unsplash-1.jpg</image:loc><image:title>cesar-carlevarino-aragon-NL_DF0Klepc-unsplash</image:title></image:image><lastmod>2020-12-21T14:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-deployment-models-and-forensic-investigations/</loc><lastmod>2020-12-21T14:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-investigation-inappropriate-files/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/brett-jordan-7vxlppvfh8m-unsplash-1.jpg</image:loc><image:title>brett-jordan-7vxlppVfh8M-unsplash</image:title></image:image><lastmod>2020-12-21T14:47:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-fair-use-computer-policy-violation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/christopher-gower-m_hrflhgabo-unsplash-1.jpg</image:loc><image:title>christopher-gower-m_HRfLhgABo-unsplash</image:title></image:image><lastmod>2020-12-21T14:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/example-evidence-custody-form/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/clay-banks-aq9g80hm8mu-unsplash-1.jpg</image:loc><image:title>clay-banks-aq9G80Hm8mU-unsplash</image:title></image:image><lastmod>2020-12-21T14:45:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-forensic-data-investigation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/volodymyr-hryshchenko-zt9gjcjog6u-unsplash-1.jpg</image:loc><image:title>volodymyr-hryshchenko-ZT9gjcJog6U-unsplash</image:title></image:image><lastmod>2020-12-21T14:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/project-stakeholder-reports/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/octavian-dan-b21ty33cqvs-unsplash-1.jpg</image:loc><image:title>octavian-dan-b21Ty33CqVs-unsplash</image:title></image:image><lastmod>2020-12-21T14:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/project-management-overview/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/alexandre-lion-qovxhjorx4k-unsplash-1.jpg</image:loc><image:title>alexandre-lion-qOvxHjOrx4k-unsplash</image:title></image:image><lastmod>2020-12-21T14:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-wbs-cybersecurity-audit/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/luke-chesser-jkutrj4vk00-unsplash-1.jpg</image:loc><image:title>luke-chesser-JKUTrJ4vK00-unsplash</image:title></image:image><lastmod>2020-12-21T14:08:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-network-diagram/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/waldemar-brandt-sq_94tmuw1e-unsplash-1.jpg</image:loc><image:title>waldemar-brandt-Sq_94tmuw1E-unsplash</image:title></image:image><lastmod>2020-12-21T14:07:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-scope-statement/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/maxim-potkin-vrjey7-8aie-unsplash.jpg</image:loc><image:title>maxim-potkin-vrJeY7-8aIE-unsplash</image:title></image:image><lastmod>2020-12-21T14:04:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-wbs-work-package/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/artem-bryzgalov-r2cajgq0gsi-unsplash.jpg</image:loc><image:title>artem-bryzgalov-r2CAjGQ0gSI-unsplash</image:title></image:image><lastmod>2020-12-21T14:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/14/audit-phases/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/william-iven-jrh5laq-mis-unsplash-1.jpg</image:loc><image:title>william-iven-jrh5lAq-mIs-unsplash</image:title></image:image><lastmod>2020-12-21T14:01:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/14/it-audits-bcp-and-dr-planning/</loc><lastmod>2020-12-21T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/information-systems-development-potential-problems-costs-and-quality-control/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/olav-ahrens-rotne-4ennrbj1svk-unsplash.jpg</image:loc><image:title>olav-ahrens-rotne-4Ennrbj1svk-unsplash</image:title></image:image><lastmod>2020-12-16T15:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/02/the-common-good-ethical-approach-in-information-security-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/volkan-olmez-bvgmrrfqcf8-unsplash.jpg</image:loc><image:title>volkan-olmez-BVGMRRFQcf8-unsplash</image:title></image:image><lastmod>2020-12-16T15:10:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/risk-sensitivity-exposure-and-thresholds/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/maja-kochanowska-e-v6j5y9xas-unsplash.jpg</image:loc><image:title>maja-kochanowska-E-v6j5Y9xAs-unsplash</image:title></image:image><lastmod>2020-12-16T15:08:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/27/how-to-cultivate-a-young-mind-with-technology/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/giu-vicente-727228-unsplash.jpg</image:loc><image:title>giu-vicente-727228-unsplash</image:title></image:image><lastmod>2020-12-16T14:58:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/01/review-tap-wearable-keyboard-mouse/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/tap-on-left-hand.jpg</image:loc><image:title>Tap-on-left-hand</image:title></image:image><lastmod>2020-12-16T14:56:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/09/03/wi-fi-7-already/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f618b-31605-ra-dragon-50rvm3_vyos-unsplash.jpg</image:loc><image:title>ra-dragon-50rvM3_VYOs-unsplash</image:title></image:image><lastmod>2020-12-16T14:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/26/preventing-wi-fi-dead-zones-mesh-extenders-repeaters/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f16a1-bdb99-andrew-neel-117763-unsplash.jpg</image:loc><image:title>andrew-neel-117763-unsplash</image:title></image:image><lastmod>2020-12-16T14:53:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/guidelines-for-giving-testimony-technical-scientific-witness/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/david-veksler-hpmdas1dozs-unsplash.jpg</image:loc><image:title>david-veksler-HpmDAS1Dozs-unsplash</image:title></image:image><lastmod>2020-12-09T17:16:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/project-management-scenario-website-portal-creation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/halacious-tzc3vjpck-q-unsplash.jpg</image:loc><image:title>halacious-tZc3vjPCk-Q-unsplash</image:title></image:image><lastmod>2020-12-09T17:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/corporate-strategic-planning/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/felix-mittermeier-najil1z3elk-unsplash-1.jpg</image:loc><image:title>felix-mittermeier-nAjil1z3eLk-unsplash (1)</image:title></image:image><lastmod>2020-12-09T17:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/29/the-facetime-bug/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/01/ben-collins-wwwem-fx618-unsplash-1.jpg</image:loc><image:title>ben-collins-wWwEM-fx618-unsplash (1)</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/aa693-4ef4f-fabian-grohs-396734-unsplash.jpg</image:loc><image:title>fabian-grohs-396734-unsplash</image:title></image:image><lastmod>2020-12-09T17:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-quality-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/neonbrand-mgyar7bzbk4-unsplash.jpg</image:loc><image:title>neonbrand-mgYAR7BzBk4-unsplash</image:title></image:image><lastmod>2020-12-09T17:06:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/information-system-project-management-risk/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/lala-azizli-tfnytfjpkvc-unsplash.jpg</image:loc><image:title>lala-azizli-tfNyTfJpKvc-unsplash</image:title></image:image><lastmod>2020-12-09T17:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/challenger-a-case-study-in-risk-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/niketh-vellanki-qksn_8xcxwq-unsplash.jpg</image:loc><image:title>niketh-vellanki-QkSN_8XcXwQ-unsplash</image:title></image:image><lastmod>2020-12-09T17:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cybersecurity-audit-project-intro/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/luke-chesser-jkutrj4vk00-unsplash.jpg</image:loc><image:title>luke-chesser-JKUTrJ4vK00-unsplash</image:title></image:image><lastmod>2020-12-09T16:58:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/risk-matrix/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/markus-spiske-iar-afb0qqw-unsplash.jpg</image:loc><image:title>markus-spiske-iar-afB0QQw-unsplash</image:title></image:image><lastmod>2020-12-09T16:56:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/it-services-firms-erp-systems-and-contracts/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/cytonn-photography-gjao3ztx9gu-unsplash.jpg</image:loc><image:title>cytonn-photography-GJao3ZTX9gU-unsplash</image:title></image:image><lastmod>2020-12-09T16:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/project-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/jo-szczepanska-5airb5f464a-unsplash.jpg</image:loc><image:title>jo-szczepanska-5aiRb5f464A-unsplash</image:title></image:image><lastmod>2020-12-09T16:45:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-definition-and-debate/</loc><lastmod>2020-12-09T16:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/vmware-workstation-player-15-demonstration/</loc><lastmod>2020-12-09T16:33:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-business-benefits/</loc><lastmod>2020-12-09T16:32:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-providers/</loc><lastmod>2020-12-09T16:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/barriers-to-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/simon-maage-xw-vvvxq3ra-unsplash.jpg</image:loc><image:title>simon-maage-xw-vvvXq3rA-unsplash</image:title></image:image><lastmod>2020-12-09T16:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/does-cloud-computing-have-new-risks-or-merely-the-same-risks-as-older-technologies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/tamara-gak-3varlhrv_ns-unsplash.jpg</image:loc><image:title>tamara-gak-3VarlhRV_ns-unsplash</image:title></image:image><lastmod>2020-12-09T16:29:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-cloud-computing-presentation-for-a-businesss-implementation/</loc><lastmod>2020-12-09T16:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-providers-security-comparison/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/collin-armstrong-8fxji5wuwkc-unsplash.jpg</image:loc><image:title>collin-armstrong-8FxJi5wuwKc-unsplash</image:title></image:image><lastmod>2020-12-09T16:27:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/realistic-use-of-homomorphic-encryption-cloud-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/adi-goldstein-eusvweosble-unsplash-1.jpg</image:loc><image:title>adi-goldstein-EUsVwEOsblE-unsplash</image:title></image:image><lastmod>2020-12-09T16:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/challenges-requirements-and-solutions-for-identity-provisioning-with-saas-iaas-and-paas/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/ben-sweet-2lowvivhz-e-unsplash.jpg</image:loc><image:title>ben-sweet-2LowviVHZ-E-unsplash</image:title></image:image><lastmod>2020-12-09T16:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-federations-and-authentication-management/</loc><lastmod>2020-12-09T16:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-csp-compliance-and-regulations/</loc><lastmod>2020-12-09T16:22:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/payment-card-industry-data-security-standards-pci-dss/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/avery-evans-rjqe64nmc_o-unsplash.jpg</image:loc><image:title>avery-evans-RJQE64NmC_o-unsplash</image:title></image:image><lastmod>2020-12-09T16:21:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/it-manager-data-protection/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/priscilla-du-preez-432_ufglmta-unsplash.jpg</image:loc><image:title>priscilla-du-preez-432_UfGLmTA-unsplash</image:title></image:image><lastmod>2020-12-09T16:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-nist-csa-itil-iso/</loc><lastmod>2020-12-09T16:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/privacy-impact-assessment-pia-template-cloud-computing/</loc><lastmod>2020-12-09T16:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/cloud-computing-rules-and-regulations-across-the-globe/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/kyle-glenn-nxt5htlmlge-unsplash.jpg</image:loc><image:title>kyle-glenn-nXt5HtLmlgE-unsplash</image:title></image:image><lastmod>2020-12-09T16:18:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-business-plan-for-cloud-computing-implementation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/alex-machado-80sv993luki-unsplash.jpg</image:loc><image:title>alex-machado-80sv993lUKI-unsplash</image:title></image:image><lastmod>2020-12-09T16:16:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/saas-idaas-and-cloud-computing-providers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/c-dustin-k-iog-bqf8e-unsplash.jpg</image:loc><image:title>c-dustin-K-Iog-Bqf8E-unsplash</image:title></image:image><lastmod>2020-12-09T16:15:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/future-and-forecast-for-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/elcarito-mhnjebeltgw-unsplash.jpg</image:loc><image:title>elcarito-MHNjEBeLTgw-unsplash</image:title></image:image><lastmod>2020-12-09T16:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-asset-identification-and-analysis-harry-and-maes-inc-case-study/</loc><lastmod>2020-12-09T16:12:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/do-threats-change/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/ross-findon-mg28olyfghi-unsplash.jpg</image:loc><image:title>ross-findon-mG28olYFgHI-unsplash</image:title></image:image><lastmod>2020-12-09T16:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-harry-and-maes-inc-case-study-vulnerability-identification/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/marten-newhall-uafjfsms3yy-unsplash.jpg</image:loc><image:title>marten-newhall-uAFjFsMS3YY-unsplash</image:title></image:image><lastmod>2020-12-09T16:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/scenario-harry-and-maes-inc-case-study-asset-and-vulnerability-value-risk-exposure-and-likelihood/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/tobias-tullius-4dky7d3lkkm-unsplash.jpg</image:loc><image:title>tobias-tullius-4dKy7d3lkKM-unsplash</image:title></image:image><lastmod>2020-12-09T16:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/rsa-blog-bad-decisions-made-faster-how-qualitative-security-risk-assessments-are-making-things-worse/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/bench-accounting-fim-j1b_rc-unsplash.jpg</image:loc><image:title>bench-accounting-FIM--j1B_Rc-unsplash</image:title></image:image><lastmod>2020-12-09T16:06:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/siras-reducing-ignorance-by-marcin-antkiewicz/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/cristofer-jeschke-eo_sesctbuo-unsplash.jpg</image:loc><image:title>cristofer-jeschke-eO_sEscTbUo-unsplash</image:title></image:image><lastmod>2020-12-09T16:05:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/case-study-nps-public-relations-and-marketing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/markus-spiske-qsoeyvzvuii-unsplash.jpg</image:loc><image:title>markus-spiske-QsOEYVZvUiI-unsplash</image:title></image:image><lastmod>2020-12-09T16:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/scenario-harry-and-maes-inc-case-study-identification-and-mitigation-of-threats/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/julian-schiemann-hvamfqvbbre-unsplash.jpg</image:loc><image:title>julian-schiemann-HvaMFqvBbrE-unsplash</image:title></image:image><lastmod>2020-12-09T15:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/scenario-harry-and-maes-inc-case-study-executive-summary/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/sebastian-herrmann-znzdjmhxxiq-unsplash.jpg</image:loc><image:title>sebastian-herrmann-ZnzdjMhxXIQ-unsplash</image:title></image:image><lastmod>2020-12-09T15:24:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/scenario-harry-and-maes-inc-case-study-customer-feedback/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/xps-klfkva_4axm-unsplash.jpg</image:loc><image:title>xps-kLfkVa_4aXM-unsplash</image:title></image:image><lastmod>2020-12-09T15:23:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/zendesk-risk-analysis-and-recommendations/</loc><lastmod>2020-12-09T15:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/risk-and-the-resistance-to-change-in-organizations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/loic-leray-fczsfviqlvy-unsplash.jpg</image:loc><image:title>loic-leray-fCzSfVIQlVY-unsplash</image:title></image:image><lastmod>2020-12-09T15:20:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/it-auditor-the-profession/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/kelly-sikkema-tqq4bwn_ufs-unsplash.jpg</image:loc><image:title>kelly-sikkema-tQQ4BwN_UFs-unsplash</image:title></image:image><lastmod>2020-12-09T15:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/cyberattacks-on-u-s-companies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/hasan-almasi-owqlxcvovxi-unsplash.jpg</image:loc><image:title>hasan-almasi-OwqLxCvoVxI-unsplash</image:title></image:image><lastmod>2020-12-09T15:16:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/09/state-funded-cyberweapons/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2020/12/jimmy-chang-q67yyjgxbfy-unsplash.jpg</image:loc><image:title>jimmy-chang-Q67YYjgXBfY-unsplash</image:title></image:image><lastmod>2020-12-09T15:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/case-study-nps-public-relations-and-marketing-risk-assessment-recommendations/</loc><lastmod>2020-12-04T18:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/project-management-project-closure-presentation/</loc><lastmod>2020-12-04T16:50:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2020/12/04/example-speech-types-of-company-organization/</loc><lastmod>2020-12-04T16:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/27/solid-commerce-review-e-commerce-order-and-management-software/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/rawpixel-626045-unsplash.jpg</image:loc><image:title>rawpixel-626045-unsplash</image:title></image:image><lastmod>2020-12-04T15:08:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/20/solarwinds-msp-n-central-review-2/</loc><lastmod>2019-12-27T17:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/26/my-favorite-work-related-apps-websites/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/lost-co-668055-unsplash.jpg</image:loc><image:title>lost-co-668055-unsplash</image:title></image:image><lastmod>2019-12-27T17:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/14/e-commerce-product-listings-the-basics/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/332bd-c2e3b-pepi-stojanovski-509192-unsplash.jpg</image:loc><image:title>pepi-stojanovski-509192-unsplash</image:title></image:image><lastmod>2019-12-27T17:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/30/the-dreaded-spinning-circle-windows-10-stuck-at-login-screen/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/e96dc-5858a-panos-sakalakis-525108-unsplash.jpg</image:loc><image:title>panos-sakalakis-525108-unsplash</image:title></image:image><lastmod>2019-12-27T17:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/19/e-commerce-google-product-reviews/</loc><lastmod>2019-12-27T17:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/20/tips-for-dealing-with-tech-vendors/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b65ca-ec773-victoriano-izquierdo-730289-unsplash.jpg</image:loc><image:title>victoriano-izquierdo-730289-unsplash</image:title></image:image><lastmod>2019-12-27T17:26:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/07/professionalism-in-the-workplace/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/24478-f521e-hunters-race-408744-unsplash.jpg</image:loc><image:title>hunters-race-408744-unsplash</image:title></image:image><lastmod>2019-12-27T17:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/11/the-entrepreneurs-handbook-startup-guide/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/53290-e5b21-franck-v-628397-unsplash-1.jpg</image:loc><image:title>franck-v-628397-unsplash (1)</image:title></image:image><lastmod>2019-12-27T17:25:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/25/zendesk-automation-notify-customers-before-closing-their-tickets/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/1f7a3-5ba35-daniele-levis-pelusi-672034-unsplash.jpg</image:loc><image:title>daniele-levis-pelusi-672034-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b73cd-ee31c-fafa.jpg</image:loc><image:title>fafa</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b8f88-92ff3-dada.jpg</image:loc><image:title>dada</image:title></image:image><lastmod>2019-12-27T17:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/03/05/workplace-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/7c771-fe240-capture-1.jpg</image:loc><image:title>Capture</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/70d27-68eb9-scott-webb-274694-unsplash.jpg</image:loc><image:title>scott-webb-274694-unsplash</image:title></image:image><lastmod>2019-12-27T17:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/30/it-asset-procurement-policy/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/62161-780be-annie-spratt-294450-unsplash.jpg</image:loc><image:title>annie-spratt-294450-unsplash</image:title></image:image><lastmod>2019-12-26T15:24:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/29/creating-technical-tests-for-it-interviews/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d3925-8b78b-ben-mullins-oxv3bzr7jxi-unsplash.jpg</image:loc><image:title>ben-mullins-oXV3bzR7jxI-unsplash</image:title></image:image><lastmod>2019-12-26T15:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/12/cisco-webex-meetings-review-and-how-to/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/headway-5qgiuubxkwm-unsplash.jpg</image:loc><image:title>headway-5QgIuuBxKwM-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/7.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/6.jpg</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/5.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/3.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/2-1.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/1-1.jpg</image:loc><image:title>1</image:title></image:image><lastmod>2019-12-26T15:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/06/how-have-security-services-changed-since-9-11/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/luke-stackpoole-gy4s9sq1ri-unsplash.jpg</image:loc><image:title>luke-stackpoole--gy4s9SQ1RI-unsplash</image:title></image:image><lastmod>2019-12-06T13:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/12/03/why-the-sixth-step-in-the-risk-management-framework-rmf-is-the-most-important/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/12/loic-leray-fczsfviqlvy-unsplash.jpg</image:loc><image:title>loic-leray-fCzSfVIQlVY-unsplash</image:title></image:image><lastmod>2019-12-03T16:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/29/understanding-responsibility-in-information-asset-protection-a-personal-analysis/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/neonbrand-209fve_57h8-unsplash.jpg</image:loc><image:title>neonbrand-209FvE_57H8-unsplash</image:title></image:image><lastmod>2019-11-29T16:09:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/27/first-grad-school-paper-complete-how-has-security-physical-operational-technical-etc-changed-over-the-past-one-hundred-years/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/xan-griffin-ea2t5evcxu4-unsplash.jpg</image:loc><image:title>xan-griffin-eA2t5EvcxU4-unsplash</image:title></image:image><lastmod>2019-11-27T14:19:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/25/how-does-a-persons-or-positions-title-make-a-difference-in-cybersecurity/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/shahadat-rahman-gnya8vd3otc-unsplash.jpg</image:loc><image:title>shahadat-rahman-gnyA8vd3Otc-unsplash</image:title></image:image><lastmod>2019-11-25T16:05:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/19/cybersecurity-vulnerability-assessment-va-and-project-management-pm-terms-and-definitions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/romain-vignes-ywqa9izb-du-unsplash.jpg</image:loc><image:title>romain-vignes-ywqa9IZB-dU-unsplash</image:title></image:image><lastmod>2019-11-22T15:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/18/qualitative-and-quantitative-risk-assessments/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/franck-v-04id07izi9m-unsplash.jpg</image:loc><image:title>franck-v-04iD07IZi9M-unsplash</image:title></image:image><lastmod>2019-11-18T16:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/15/intro-to-vulnerability/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/bernard-hermant-ihcshrzxfs4-unsplash.jpg</image:loc><image:title>bernard-hermant-IhcSHrZXFs4-unsplash</image:title></image:image><lastmod>2019-11-15T16:43:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/13/cpted-crime-prevention-through-environmental-design/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/markus-spiske-wwx2bpqp-z4-unsplash.jpg</image:loc><image:title>markus-spiske-WWX2bPqP-z4-unsplash</image:title></image:image><lastmod>2019-11-13T18:35:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/11/06/masters-degree-in-cybersecurity-the-journey-begins/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/11/matt-ragland-02z1i7gv4ao-unsplash.jpg</image:loc><image:title>matt-ragland-02z1I7gv4ao-unsplash</image:title></image:image><lastmod>2019-11-06T13:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/29/review-google-pixel-4/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/clearly-white-pixel-4-front_back-1024x768.jpg</image:loc><image:title>Clearly-White-Pixel-4-Front_Back-1024x768</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191029_072732.jpg</image:loc><image:title>IMG_20191029_072732</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191029_072753.jpg</image:loc><image:title>IMG_20191029_072753</image:title></image:image><lastmod>2019-10-29T16:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/24/my-path-to-a-cybersecurity-career-masters-degree-here-i-come/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/liam-tucker-cvmaxt672ss-unsplash.jpg</image:loc><image:title>liam-tucker-cVMaxt672ss-unsplash</image:title></image:image><lastmod>2019-10-24T16:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/advantages-of-working-in-a-group/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/dylan-gillis-533818-unsplash.jpg</image:loc><image:title>dylan-gillis-533818-unsplash</image:title></image:image><lastmod>2019-10-23T14:03:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/intercultural-communication/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/omar-lopez-296937-unsplash.jpg</image:loc><image:title>omar-lopez-296937-unsplash</image:title></image:image><lastmod>2019-10-23T13:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/windows-task-manager/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-565456-unsplash.jpg</image:loc><image:title>rawpixel-565456-unsplash</image:title></image:image><lastmod>2019-10-23T13:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/how-to-change-fonts-in-windows-10/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jeroen-den-otter-661246-unsplash.jpg</image:loc><image:title>jeroen-den-otter-661246-unsplash</image:title></image:image><lastmod>2019-10-23T13:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/storage-backups/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-740150-unsplash.jpg</image:loc><image:title>markus-spiske-740150-unsplash</image:title></image:image><lastmod>2019-10-23T13:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-scenario-employee-suspected-of-unauthorized-material-how-to-proceed/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/headway-537308-unsplash.jpg</image:loc><image:title>headway-537308-unsplash</image:title></image:image><lastmod>2019-10-23T13:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/16/my-past-current-project-cars/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/41626338_10155448961476386_8087071188100055040_n.jpg</image:loc><image:title>41626338_10155448961476386_8087071188100055040_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/14606470_10153768465081386_5941623088618652490_n.jpg</image:loc><image:title>14606470_10153768465081386_5941623088618652490_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/10985215_10153312041316386_1771392972271175991_n.jpg</image:loc><image:title>10985215_10153312041316386_1771392972271175991_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/img_20191015_203417_031.jpg</image:loc><image:title>IMG_20191015_203417_031</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/11012517_10152828615391386_4163806196487396562_n.jpg</image:loc><image:title>11012517_10152828615391386_4163806196487396562_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/10410790_10152845765886386_4120188172020145654_n.jpg</image:loc><image:title>10410790_10152845765886386_4120188172020145654_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/11219111_10152786400846386_3508454275586822373_n.jpg</image:loc><image:title>11219111_10152786400846386_3508454275586822373_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/464130_10150607123301386_310417117_o.jpg</image:loc><image:title>464130_10150607123301386_310417117_o</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/468440_10150607125231386_84452844_o.jpg</image:loc><image:title>468440_10150607125231386_84452844_o</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/456857_10150579869116386_1903008184_o.jpg</image:loc><image:title>456857_10150579869116386_1903008184_o</image:title></image:image><lastmod>2019-10-16T14:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/14/tips-for-cleaning-mobile-devices-and-computers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/artiom-vallat-h-qqp_eqaww-unsplash.jpg</image:loc><image:title>artiom-vallat-H-qqp_Eqaww-unsplash</image:title></image:image><lastmod>2019-10-14T15:53:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/11/cpu-overclocking-explained/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/chris-liverani-hujdz6cjeam-unsplash.jpg</image:loc><image:title>chris-liverani-HUJDz6CJEaM-unsplash</image:title></image:image><lastmod>2019-10-11T17:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/project-xbox-cooling-system-prep-fiber-optic-communication-of-temperature/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/hardik-sharma-560353-unsplash.jpg</image:loc><image:title>hardik-sharma-560353-unsplash</image:title></image:image><lastmod>2019-10-11T13:53:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/10/review-technicolor-cgm4141-panoramic-wi-fi-modem/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/contour-stream-player-wireless-equipment-with-remote-and-logos-for-streaming-options.jpg</image:loc><image:title>contour-stream-player-wireless-equipment-with-remote-and-logos-for-streaming-options</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/technicolor_cgm4141_back.png</image:loc><image:title>Technicolor_CGM4141_Back</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/technicolor_cgm4141_front.png</image:loc><image:title>Technicolor_CGM4141_Front</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/222222.jpg</image:loc><image:title>222222</image:title></image:image><lastmod>2019-10-10T14:44:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/08/tile-sticker-bluetooth-tracker/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/sticker_hero_1_tilt.jpg</image:loc><image:title>Sticker_Hero_1_Tilt</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/dims-1.jpg</image:loc><image:title>dims (1)</image:title></image:image><lastmod>2019-10-08T14:13:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/13/review-tile-pro-bluetooth-tracker/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/664c0-35e7f-20190513_075904.jpg</image:loc><image:title>20190513_075904</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4fd75-368d3-20190513_125655.jpg</image:loc><image:title>20190513_125655</image:title></image:image><lastmod>2019-10-08T13:02:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/how-to-download-change-and-install-printer-interfaces-on-windows-10/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/ljizlzhgq7wpsh5kvtcb_typewriter.jpg</image:loc><image:title>LJIZlzHgQ7WPSh5KVTCB_Typewriter</image:title></image:image><lastmod>2019-10-04T16:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/example-of-a-security-plan-company-memo/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/florian-klauer-147-unsplash.jpg</image:loc><image:title>florian-klauer-147-unsplash</image:title></image:image><lastmod>2019-10-04T16:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/vendor-lock-in/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/ryan-riggins-216051-unsplash.jpg</image:loc><image:title>ryan-riggins-216051-unsplash</image:title></image:image><lastmod>2019-10-04T16:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/10/01/my-future-home-security-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/71082192_10156192672526386_5529896158832361472_n.jpg</image:loc><image:title>71082192_10156192672526386_5529896158832361472_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/70983837_10156192672896386_5247068838654115840_n.jpg</image:loc><image:title>70983837_10156192672896386_5247068838654115840_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/71035338_10156194043046386_9191462749127835648_n.jpg</image:loc><image:title>71035338_10156194043046386_9191462749127835648_n</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/10/71708376_10156192672276386_8926544879933194240_n.jpg</image:loc><image:title>71708376_10156192672276386_8926544879933194240_n</image:title></image:image><lastmod>2019-10-01T15:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/03/07/smart-homes-and-landlords-privacy-concerns/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/09f84-93186-ihor-saveliev-496816-unsplash.jpg</image:loc><image:title>ihor-saveliev-496816-unsplash</image:title></image:image><lastmod>2019-10-01T13:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/09/25/updates-to-my-other-websites-and-advertising-marketing-tips/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/lee-campbell-dtdlvpy-vvq-unsplash.jpg</image:loc><image:title>lee-campbell-DtDlVpy-vvQ-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/le-buzz-kieii2b9gku-unsplash.jpg</image:loc><image:title>le-buzz-KiEiI2b9GkU-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ben-kolde-bs2ba7t69mm-unsplash.jpg</image:loc><image:title>ben-kolde-bs2Ba7t69mM-unsplash</image:title></image:image><lastmod>2019-09-25T12:42:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/29/5g-the-future-is-now/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/franck-v-705445-unsplash.jpg</image:loc><image:title>franck-v-705445-unsplash</image:title></image:image><lastmod>2019-09-09T14:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/08/26/how-to-fix-the-bottom-black-bar-bug-in-google-chrome/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4bc51-70baa-pawel-czerwinski-fpzzev0uqwa-unsplash.jpg</image:loc><image:title>pawel-czerwinski-fpZZEV0uQwA-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2df60-c1276-christian-wiediger-zhzydtynmpg-unsplash.jpg</image:loc><image:title>christian-wiediger-zhZydTyNMPg-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/bad14-343eb-image-2.png</image:loc><image:title>image (2)</image:title></image:image><lastmod>2019-08-26T15:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/08/19/nobody-cares-disabling-facebook-live-video-notifications/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/9e9e0-3a2cd-sticker-mule-cpsromqtrqg-unsplash.jpg</image:loc><image:title>sticker-mule-cPSroMqTRQg-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b39d3-53481-5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b3b5e-cc3ac-4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/73ba9-706e3-3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ff62b-39f24-2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2ff51-45c95-1.png</image:loc><image:title>1</image:title></image:image><lastmod>2019-08-19T15:34:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/08/08/how-to-stay-focused-on-a-project/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ca87f-ea8f0-paul-skorupskas-7kla-xlbsxa-unsplash.jpg</image:loc><image:title>paul-skorupskas-7KLa-xLbSXA-unsplash</image:title></image:image><lastmod>2019-08-08T18:24:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/08/06/what-is-an-msp-managed-service-provider-and-what-can-it-do-for-you/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/978f0-e6a17-mike-kononov-lfv0v3_2h6s-unsplash.jpg</image:loc><image:title>mike-kononov-lFv0V3_2H6s-unsplash</image:title></image:image><lastmod>2019-08-06T17:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/08/01/review-plantronics-voyager-focus-uc-headset/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/99282-41f14-20190730_085022.jpg</image:loc><image:title>20190730_085022</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/60aeb-e65d0-20190730_085241.jpg</image:loc><image:title>20190730_085241</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/daf56-213e3-20190730_085036.jpg</image:loc><image:title>20190730_085036</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/9d3b1-2b75e-443363-plantronics-voyager-focus-uc.jpg</image:loc><image:title>443363-plantronics-voyager-focus-uc</image:title></image:image><lastmod>2019-08-01T15:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/15/review-lefun-c2-720p-wireless-baby-monitor/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/13d00-66f11-01_77baf69e-240a-4fed-9d5c-d3f340189e87_grande.jpg</image:loc><image:title>01_77baf69e-240a-4fed-9d5c-d3f340189e87_grande</image:title></image:image><lastmod>2019-07-15T15:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/12/review-vivo-adjustable-under-desk-and-wall-pc-mount-mount-pc01/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3849e-a8bbb-mount-pc01_01b.jpg</image:loc><image:title>MOUNT-PC01_01b</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/033d1-5c0fa-20190712_080253.jpg</image:loc><image:title>20190712_080253</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/9a290-fd5b4-20190712_080234.jpg</image:loc><image:title>20190712_080234</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/79462-6a083-20190712_080140.jpg</image:loc><image:title>20190712_080140</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3e566-669ec-20190712_080139-1.jpg</image:loc><image:title>20190712_080139</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f4962-7c00c-20190712_080139.jpg</image:loc><image:title>20190712_080139</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/a6d53-c27ca-20190712_080849.jpg</image:loc><image:title>20190712_080849</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/75ead-24fb0-62647087_2424391831137664_2662920847831859200_n.jpg</image:loc><image:title>62647087_2424391831137664_2662920847831859200_n</image:title></image:image><lastmod>2019-07-12T14:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/10/imposter-syndrome/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/5f944-02c1b-razvan-chisu-ua-agenjmi4-unsplash.jpg</image:loc><image:title>razvan-chisu-Ua-agENjmI4-unsplash</image:title></image:image><lastmod>2019-07-10T18:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/08/ethical-hacking/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4bb02-d275d-nahel-abdul-hadi-flha0kwrrrc-unsplash.jpg</image:loc><image:title>nahel-abdul-hadi-flha0KwRrRc-unsplash</image:title></image:image><lastmod>2019-07-08T16:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/07/04/happy-independence-day/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/23aa8-c9bd3-stephanie-mccabe-_ajm-ewec24-unsplash.jpg</image:loc><image:title>stephanie-mccabe-_Ajm-ewEC24-unsplash</image:title></image:image><lastmod>2019-07-04T18:55:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/26/personal-branding/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/c1125-1aecb-ben-rosett-wdjkxfq4vhy-unsplash.jpg</image:loc><image:title>ben-rosett-WdJkXFQ4VHY-unsplash</image:title></image:image><lastmod>2019-06-26T13:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/25/quadrigacxs-crypto-crisis-recent-developments/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/40eec-3125e-clifford-photography-am_6utithbo-unsplash.jpg</image:loc><image:title>clifford-photography-AM_6Utithbo-unsplash</image:title></image:image><lastmod>2019-06-25T15:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/24/domain-scams-a-chain-is-only-as-strong-as-its-weakest-link-pun-intended/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/95a71-b11da-jj-ying-pdxyfxvlk2m-unsplash.jpg</image:loc><image:title>jj-ying-PDxYfXVlK2M-unsplash</image:title></image:image><lastmod>2019-06-24T17:05:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/21/facebooks-cryptocurrency-libra/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4a0eb-1311f-alex-haney-1358658-unsplash.jpg</image:loc><image:title>alex-haney-1358658-unsplash</image:title></image:image><lastmod>2019-06-21T15:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/17/ray-tracing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3bd0e-d3b3b-actionvance-744657-unsplash.jpg</image:loc><image:title>actionvance-744657-unsplash</image:title></image:image><lastmod>2019-06-17T17:07:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/12/review-asus-chromebit/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/6ae74-5ed9f-s-l1600.jpg</image:loc><image:title>s-l1600</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/96555-5e586-20190611_110110.jpg</image:loc><image:title>20190611_110110</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/abe4e-64d35-20190611_125326.jpg</image:loc><image:title>20190611_125326</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/59ab8-d1099-20190611_110348.jpg</image:loc><image:title>20190611_110348</image:title></image:image><lastmod>2019-06-12T12:31:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/11/35-tips-it-professionals-should-know-at-the-start-of-their-career/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/bd484-7c8c2-nathan-dumlao-627381-unsplash.jpg</image:loc><image:title>nathan-dumlao-627381-unsplash</image:title></image:image><lastmod>2019-06-11T14:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/10/review-nanoleaf-light-panels-rhythm-edition/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/066ee-ca608-20190610_094802.jpg</image:loc><image:title>20190610_094802</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d5862-e47dd-20190610_094746.jpg</image:loc><image:title>20190610_094746</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3a7ce-e8732-20190610_094731.jpg</image:loc><image:title>20190610_094731</image:title></image:image><lastmod>2019-06-10T15:51:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/05/insulating-your-subordinates/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/5b2ef-cacf7-patrick-hendry-1137079-unsplash.jpg</image:loc><image:title>patrick-hendry-1137079-unsplash</image:title></image:image><lastmod>2019-06-05T13:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/06/03/helpful-windows-commands-and-shortcuts/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ad497-15cd9-hannah-joshua-644247-unsplash.jpg</image:loc><image:title>hannah-joshua-644247-unsplash</image:title></image:image><lastmod>2019-06-03T17:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/28/what-to-do-with-old-pcs-after-they-are-replaced/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f9565-3f812-matthew-m-1206850-unsplash.jpg</image:loc><image:title>matthew-m-1206850-unsplash</image:title></image:image><lastmod>2019-05-28T16:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/23/how-to-connect-a-pc-to-a-smart-tv/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d8b56-f0276-nate-grant-347772-unsplash.jpg</image:loc><image:title>nate-grant-347772-unsplash</image:title></image:image><lastmod>2019-05-23T13:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/05/10/scalable-2-step-verification-solutions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2d6fc-47b07-william-iven-8515-unsplash.jpg</image:loc><image:title>william-iven-8515-unsplash</image:title></image:image><lastmod>2019-05-10T19:32:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/17/cryptojacking-defined/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/7842c-0eb26-viktor-forgacs-1134412-unsplash.jpg</image:loc><image:title>viktor-forgacs-1134412-unsplash</image:title></image:image><lastmod>2019-04-17T19:30:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/11/why-some-websites-favor-drop-down-menus-instead-of-user-editable-text-boxes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/de2b6-c4c90-hal-gatewood-613602-unsplash.jpg</image:loc><image:title>hal-gatewood-613602-unsplash</image:title></image:image><lastmod>2019-04-11T14:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/10/cant-connect-to-public-wi-fi-try-neverssl-com/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/35087-a77bf-bernard-hermant-667645-unsplash.jpg</image:loc><image:title>bernard-hermant-667645-unsplash</image:title></image:image><lastmod>2019-04-10T14:33:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/09/the-difference-between-refresh-rate-and-frames-per-second/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/82b2a-8c910-max-nelson-1252089-unsplash.jpg</image:loc><image:title>max-nelson-1252089-unsplash</image:title></image:image><lastmod>2019-04-09T14:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/08/20-it-interview-tips/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/433be-f2a17-tim-gouw-79563-unsplash.jpg</image:loc><image:title>tim-gouw-79563-unsplash</image:title></image:image><lastmod>2019-04-08T15:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/04/the-40-rules-of-it-from-a-help-desks-perspective/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/755c4-a58bb-simson-petrol-133138-unsplash.jpg</image:loc><image:title>simson-petrol-133138-unsplash</image:title></image:image><lastmod>2019-04-04T13:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/03/common-mistakes-tips-for-it-managers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/08638-42c68-icons8-team-1221959-unsplash.jpg</image:loc><image:title>icons8-team-1221959-unsplash</image:title></image:image><lastmod>2019-04-03T14:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/04/01/review-navepoint-9u-450mm-depth-networking-cabinet-performance-series/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f2c98-ca418-a4fh_1_201902101077742552.jpg</image:loc><image:title>A4FH_1_201902101077742552</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2bf2a-71455-20190401_094924.jpg</image:loc><image:title>20190401_094924</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ffc0f-7c246-img_20190401_083257_987.jpg</image:loc><image:title>IMG_20190401_083257_987</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/1b8aa-ba9de-20190401_111118.jpg</image:loc><image:title>20190401_111118</image:title></image:image><lastmod>2019-04-01T16:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/03/26/shadow-high-end-pc-gaming-on-mobile-devices/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3afd7-fb73b-shadow-1200px.jpg</image:loc><image:title>shadow-1200px</image:title></image:image><lastmod>2019-03-26T14:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/11/review-vava-voom-the-vava-wireless-led-night-light/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d1de4-abe92-img_20190125_114229_331.jpg</image:loc><image:title>IMG_20190125_114229_331</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/7eecc-e4534-31004.jpeg</image:loc><image:title>31004</image:title></image:image><lastmod>2019-02-11T17:37:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/07/skypes-new-background-blur-dirty-house-no-problem/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/40038-facdc-introducing_background_blur_in_skype_1.0.gif</image:loc><image:title>Introducing_background_blur_in_Skype_1.0</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/2a19e-2f50c-skype-logo-open-graph.png</image:loc><image:title>skype-logo-open-graph</image:title></image:image><lastmod>2019-02-07T15:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/02/04/quadrigacxs-crypto-crisis/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/b177e-d0691-andre-francois-mckenzie-518771-unsplash.jpg</image:loc><image:title>andre-francois-mckenzie-518771-unsplash</image:title></image:image><lastmod>2019-02-04T15:36:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/30/electronics-and-cold-weather/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/6b554-c3111-bob-canning-58962-unsplash.jpg</image:loc><image:title>bob-canning-58962-unsplash</image:title></image:image><lastmod>2019-01-30T15:33:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/23/review-jbl-free-x-headphones/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/db609-5667b-719kigei1ll._sl1500_.jpg</image:loc><image:title>719KigeI1LL._SL1500_</image:title></image:image><lastmod>2019-01-23T15:51:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/22/3d-printing-and-space-exploration/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/78af5-dca78-ines-alvarez-fdez-489172-unsplash.jpg</image:loc><image:title>ines-alvarez-fdez-489172-unsplash</image:title></image:image><lastmod>2019-01-22T16:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/21/technologys-impact-on-protests-change/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/e6f57-47628-zach-lucero-799090-unsplash.jpg</image:loc><image:title>zach-lucero-799090-unsplash</image:title></image:image><lastmod>2019-01-21T16:35:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/18/collection-1-data-breach-great-time-to-use-a-password-manager/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/e91fe-6b4d8-rawpixel-1055774-unsplash.jpg</image:loc><image:title>rawpixel-1055774-unsplash</image:title></image:image><lastmod>2019-01-18T16:16:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/15/electrical-engineering-multisim-and-alternatives/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/4ccdb-e8edf-victor-aznabaev-680684-unsplash.jpg</image:loc><image:title>victor-aznabaev-680684-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/e98ee-bf72b-blog-2.png</image:loc><image:title>Blog 2</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ddeab-e20ef-blog-1.png</image:loc><image:title>Blog 1</image:title></image:image><lastmod>2019-01-15T16:04:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/10/10g-big-cables-strange-answer-to-the-threat-of-5g-wireless/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/da9ad-0c4b8-capture.jpg</image:loc><image:title>Capture</image:title></image:image><lastmod>2019-01-10T14:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/08/10-tips-for-protecting-your-online-presence/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/12611-13bb4-tom-roberts-324514-unsplash.jpg</image:loc><image:title>tom-roberts-324514-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/deebc-03f9f-jesus-rocha-684432-unsplash.jpg</image:loc><image:title>jesus-rocha-684432-unsplash</image:title></image:image><lastmod>2019-01-08T16:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/04/baby-tech-review-halo-bassinest-swivel-sleeper-premier-series/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f3c70-c6168-3874_1__26535.1513010177.1280.1280.jpg</image:loc><image:title>3874_1__26535.1513010177.1280.1280</image:title></image:image><lastmod>2019-01-04T15:07:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2019/01/02/securing-wi-fi-networks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/817d4-f9f01-hedi-benyounes-735849-unsplash.jpg</image:loc><image:title>hedi-benyounes-735849-unsplash</image:title></image:image><lastmod>2019-01-02T16:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/31/windows-10-tips-and-tricks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/6fbf1-44bc7-panos-sakalakis-525093-unsplash.jpg</image:loc><image:title>panos-sakalakis-525093-unsplash</image:title></image:image><lastmod>2018-12-31T16:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/28/blue-lights-dark-side-the-dangers-of-staring-at-a-computer-screen/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/85087-9a052-harry-quan-486229-unsplash.jpg</image:loc><image:title>harry-quan-486229-unsplash</image:title></image:image><lastmod>2018-12-28T15:04:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/24/windows-8-10-fixing-false-key-presses/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/6c0be-e1546-nhu-nguyen-785023-unsplash.jpg</image:loc><image:title>nhu-nguyen-785023-unsplash</image:title></image:image><lastmod>2018-12-24T20:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/24/happy-holidays/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/dcebd-1cf3a-12182954_10153049091006386_1936091817448055699_o.jpg</image:loc><image:title>12182954_10153049091006386_1936091817448055699_o</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/7a82a-cd231-freestocks-org-487556-unsplash.jpg</image:loc><image:title>freestocks-org-487556-unsplash</image:title></image:image><lastmod>2018-12-24T17:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/21/the-techs-guide-to-office-politics/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/82231-0118a-jomar-271602-unsplash.jpg</image:loc><image:title>jomar-271602-unsplash</image:title></image:image><lastmod>2018-12-21T16:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/11/new-google-bug-and-termination-date/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/fb58c-97eb6-pawel-czerwinski-710838-unsplash.jpg</image:loc><image:title>pawel-czerwinski-710838-unsplash</image:title></image:image><lastmod>2018-12-11T14:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/10/location-tracking-protect-your-privacy/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d4b9b-ba22c-rawpixel-769309-unsplash.jpg</image:loc><image:title>rawpixel-769309-unsplash</image:title></image:image><lastmod>2018-12-10T16:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/06/review-tailwind-app/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3edc0-60651-logo-1024x274.png</image:loc><image:title>logo-1024x274</image:title></image:image><lastmod>2018-12-06T15:42:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/05/blockchains-potential-for-various-industries/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/71672-e9a27-hitesh-choudhary-666985-unsplash.jpg</image:loc><image:title>hitesh-choudhary-666985-unsplash</image:title></image:image><lastmod>2018-12-05T15:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/12/04/microsofts-next-browser-codenamed-anaheim/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/bb64c-288c5-johny-vino-1081122-unsplash.jpg</image:loc><image:title>johny-vino-1081122-unsplash</image:title></image:image><lastmod>2018-12-04T15:01:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/29/2019-tech-predictions/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/def60-79298-crazy-nana-585498-unsplash.jpg</image:loc><image:title>crazy-nana-585498-unsplash</image:title></image:image><lastmod>2018-11-29T16:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/27/2018-holiday-tech-gift-ideas/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/ab58e-fe541-thought-catalog-480626-unsplash.jpg</image:loc><image:title>thought-catalog-480626-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/70888-6a5ad-fitbit.jpg</image:loc><image:title>Fitbit</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/e0eef-c19d6-vector.jpg</image:loc><image:title>Vector</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3de84-e4076-robot.jpg</image:loc><image:title>Robot</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/8672b-8f433-xbox.jpg</image:loc><image:title>Xbox</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/8079a-a1739-wand.jpeg</image:loc><image:title>Wand</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/35b20-728ee-labo.jpg</image:loc><image:title>LABO</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/bbf92-9673b-dot.jpg</image:loc><image:title>DOT</image:title></image:image><lastmod>2018-11-27T18:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/23/thanksgiving-technology-to-be-thankful-for/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/15d63-8fb1c-thanksgiving.jpg</image:loc><image:title>Thanksgiving</image:title></image:image><lastmod>2018-11-23T15:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/21/amazons-data-breach/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/faec7-e6194-christian-wiediger-626856-unsplash.jpg</image:loc><image:title>christian-wiediger-626856-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/9223f-f8eab-amazon-breach.jpg</image:loc><image:title>Amazon Breach</image:title></image:image><lastmod>2018-11-21T15:06:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/20/pseudocode-flow-control-methods/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/91be6-9e68b-dlanor-s-703975-unsplash.jpg</image:loc><image:title>dlanor-s-703975-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/0f129-58d67-flow-control.jpg</image:loc><image:title>Flow Control</image:title></image:image><lastmod>2018-11-20T15:34:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/19/pseudocode-flowcharts/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/5b263-9d84a-kobu-agency-798655-unsplash.jpg</image:loc><image:title>kobu-agency-798655-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/fe939-5003d-kevin-ku-364843-unsplash.jpg</image:loc><image:title>kevin-ku-364843-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/3350d-dede1-race.png</image:loc><image:title>race</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/68709-d144f-image-2.png</image:loc><image:title>image (2)</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/d69b5-babd9-image-1.png</image:loc><image:title>image (1)</image:title></image:image><lastmod>2018-11-19T16:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/16/major-components-of-a-motherboard-mobo/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/52007-771cc-thomas-jensen-618729-unsplash.jpg</image:loc><image:title>thomas-jensen-618729-unsplash</image:title></image:image><lastmod>2018-12-23T05:05:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/15/human-vs-digital-vision/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/f6e37-9ca1d-alfonso-reyes-712273-unsplash.jpg</image:loc><image:title>alfonso-reyes-712273-unsplash</image:title></image:image><lastmod>2018-11-15T16:13:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/12/review-woocommerce/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/79d8e-82d19-large-rectangle2x.png</image:loc><image:title>large-rectangle2x</image:title></image:image><lastmod>2018-11-12T16:10:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/09/review-jetpack/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/0b2b4-a2c17-jetpack-770x400.png</image:loc><image:title>jetpack-770x400</image:title></image:image><lastmod>2018-11-09T17:34:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/08/review-wordpress-com/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2019/09/da692-baae4-wordpress_blue_logo.svg_.png</image:loc><image:title>WordPress_blue_logo.svg</image:title></image:image><lastmod>2018-11-08T17:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/06/the-future-of-it-jobs/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/11/alex-knight-199368-unsplash.jpg</image:loc><image:title>alex-knight-199368-unsplash</image:title></image:image><lastmod>2018-11-06T15:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/05/blockchain-voting/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/11/elliott-stallion-105205-unsplash.jpg</image:loc><image:title>elliott-stallion-105205-unsplash</image:title></image:image><lastmod>2018-11-06T14:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/11/01/my-favorite-podcasts-audiobooks-and-music-to-listen-to-at-work/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/11/mohammad-metri-421904-unsplash.jpg</image:loc><image:title>mohammad-metri-421904-unsplash</image:title></image:image><lastmod>2018-11-01T19:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/31/googles-trick-or-treat-the-great-ghoul-duel/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/leximphoto-427140-unsplash.jpg</image:loc><image:title>leximphoto-427140-unsplash</image:title></image:image><lastmod>2018-10-31T16:43:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/name-resolution/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/anas-alshanti-169265-unsplash.jpg</image:loc><image:title>anas-alshanti-169265-unsplash</image:title></image:image><lastmod>2018-10-30T18:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/ethernet-types/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/thomas-jensen-740972-unsplash.jpg</image:loc><image:title>thomas-jensen-740972-unsplash</image:title></image:image><lastmod>2018-10-30T17:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/policies-and-procedures-for-a-businesss-use-of-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/samuel-zeller-358865-unsplash.jpg</image:loc><image:title>samuel-zeller-358865-unsplash</image:title></image:image><lastmod>2018-10-30T17:53:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/17/tonal-bringing-technology-to-fitness/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/equipment-resistance.jpg</image:loc><image:title>equipment-resistance</image:title></image:image><lastmod>2018-10-30T17:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/18/review-amazon-echo-dot/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/andres-urena-470137-unsplash.jpg</image:loc><image:title>andres-urena-470137-unsplash</image:title></image:image><lastmod>2018-10-30T17:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/08/project-cryptomining-rig/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/cold-storage-coins-1087055-unsplash.jpg</image:loc><image:title>cold-storage-coins-1087055-unsplash</image:title></image:image><lastmod>2018-10-30T17:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/03/endpoint-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/liam-tucker-491202-unsplash.jpg</image:loc><image:title>liam-tucker-491202-unsplash</image:title></image:image><lastmod>2018-10-30T17:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/22/facebooks-cybersecurity-search/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/glen-carrie-773789-unsplash.jpg</image:loc><image:title>glen-carrie-773789-unsplash</image:title></image:image><lastmod>2018-10-30T17:36:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/30/highest-paying-it-certifications-of-2018-study-tips/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/honey-yanibel-minaya-cruz-566197-unsplash.jpg</image:loc><image:title>honey-yanibel-minaya-cruz-566197-unsplash</image:title></image:image><lastmod>2018-10-30T15:02:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/fat-no-offense-intended-file-allocation-table/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/dmitrij-paskevic-44124-unsplash.jpg</image:loc><image:title>dmitrij-paskevic-44124-unsplash</image:title></image:image><lastmod>2018-10-22T13:14:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/10/24/amazon-cloud-products/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/10/kazuend-30877-unsplash.jpg</image:loc><image:title>kazuend-30877-unsplash</image:title></image:image><lastmod>2018-10-19T14:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/review-of-service-level-agreement-sla-provided-by-aruba-cloud/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-658247-unsplash1.jpg</image:loc><image:title>rawpixel-658247-unsplash</image:title></image:image><lastmod>2018-10-19T14:25:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/assessing-applications-viable-for-using-with-cloud-computing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/eberhard-grossgasteiger-330357-unsplash.jpg</image:loc><image:title>eberhard-grossgasteiger-330357-unsplash</image:title></image:image><lastmod>2018-10-19T14:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/23/windows-2012-r2-hands-on-authentication-demonstration/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/valeriy-khan-172831-unsplash.jpg</image:loc><image:title>valeriy-khan-172831-unsplash</image:title></image:image><lastmod>2018-10-19T14:22:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/26/microsoft-exchange-2019/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/alex-kotliarskyi-361081-unsplash.jpg</image:loc><image:title>alex-kotliarskyi-361081-unsplash</image:title></image:image><lastmod>2018-10-19T14:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/27/200th-post-microsoft-managed-desktop-what-to-expect/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/hugo-gf-311501-unsplash.jpg</image:loc><image:title>hugo-gf-311501-unsplash</image:title></image:image><lastmod>2018-10-19T14:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/28/googles-ai-and-ml-creating-new-ways-to-combat-floods-and-disease-in-india/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/franki-chamaki-682112-unsplash.jpg</image:loc><image:title>franki-chamaki-682112-unsplash</image:title></image:image><lastmod>2018-10-19T14:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/07/torque-engine-performance-and-diagnostic-tool-app-review/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/bafx_torque_opener.jpg</image:loc><image:title>bafx_torque_opener</image:title></image:image><lastmod>2018-10-19T14:20:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/25/grammarly-writing-assistant-review/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/download.png</image:loc><image:title>download</image:title></image:image><lastmod>2018-10-19T14:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/overview-of-promapp-business-process-manager-service/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/benjamin-child-17946-unsplash.jpg</image:loc><image:title>benjamin-child-17946-unsplash</image:title></image:image><lastmod>2018-10-19T14:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/windows-server-update-services-wsus/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/tim-gouw-68319-unsplash.jpg</image:loc><image:title>tim-gouw-68319-unsplash</image:title></image:image><lastmod>2018-10-19T14:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/microsoft-baseline-security-analyzer-mbsa-installation-and-report/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/arvin-febry-167435-unsplash.jpg</image:loc><image:title>arvin-febry-167435-unsplash</image:title></image:image><lastmod>2018-10-19T14:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/12/my-favorite-tech-memes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/what-i-think-i-do-it_varonis.jpg</image:loc><image:title>what-i-think-i-do-it_varonis</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/sxr8apmku05i3ny31mbh74j6luh0hw-wecoyjitrkbi.jpg</image:loc><image:title>sxr8apmku05i3ny31mbh74j6luh0hw-wecoyjitrkbi</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/sorry-i-annoyed-you-with-question-about-feature.jpg</image:loc><image:title>sorry-i-annoyed-you-with-question-about-feature</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/hardreset.jpg</image:loc><image:title>hardreset</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/codedoge.jpg</image:loc><image:title>codedoge</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/cce53b95907bc6a657c0b5f6de78d757.jpg</image:loc><image:title>cce53b95907bc6a657c0b5f6de78d757</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/c6gpmznwmaqhwi.jpg</image:loc><image:title>c6gpmznwmaqhwi</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/bmvrguv.png</image:loc><image:title>BmvrGUV</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/119823.jpg</image:loc><image:title>119823</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/1oxjky.jpg</image:loc><image:title>1oxjky</image:title></image:image><lastmod>2018-10-12T15:15:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/10/09/blogging-tips-for-newbies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/10/emma-matthews-973230-unsplash.jpg</image:loc><image:title>emma-matthews-973230-unsplash</image:title></image:image><lastmod>2018-10-10T15:06:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/review-of-video-review-for-geist-opengate-room-smart-fan-system/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/kishan-bishnoi-651462-unsplash.jpg</image:loc><image:title>kishan-bishnoi-651462-unsplash</image:title></image:image><lastmod>2018-10-04T13:59:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/02/12/optimal-environments-for-server-rooms-and-data-centers/</loc><lastmod>2018-10-04T13:11:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/26/5-tech-products-for-babies/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/jelleke-vanooteghem-386022-unsplash.jpg</image:loc><image:title>jelleke-vanooteghem-386022-unsplash</image:title></image:image><lastmod>2018-09-27T13:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/05/20-random-facts-about-me-tagged-by-katie-from-studentskint-com/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/ady-teenagerinro-513617-unsplash.jpg</image:loc><image:title>ady-teenagerinro-513617-unsplash</image:title></image:image><lastmod>2018-09-24T15:54:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/10/31/information-technology-infrastructure-library-itil/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/10/j-zamora-267753-unsplash.jpg</image:loc><image:title>j-zamora-267753-unsplash</image:title></image:image><lastmod>2018-09-20T16:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/11/07/cloud-governance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/11/holger-link-744077-unsplash.jpg</image:loc><image:title>holger-link-744077-unsplash</image:title></image:image><lastmod>2018-09-20T16:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/11/15/summary-of-cloud-computing-course/</loc><lastmod>2018-09-20T16:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/11/27/first-day-of-administration-of-data-storage-course/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/11/eric-ward-267021-unsplash.jpg</image:loc><image:title>eric-ward-267021-unsplash</image:title></image:image><lastmod>2018-09-20T16:50:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/12/04/network-attached-storage-nas/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/12/erda-estremera-581452-unsplash.jpg</image:loc><image:title>erda-estremera-581452-unsplash</image:title></image:image><lastmod>2018-09-20T16:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/12/12/fibre-channel-and-iscsi-which-is-better/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/12/philip-estrada-12529-unsplash.jpg</image:loc><image:title>philip-estrada-12529-unsplash</image:title></image:image><lastmod>2018-09-20T16:50:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2017/12/18/removable-storage-media/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2017/12/brina-blum-156977-unsplash.jpg</image:loc><image:title>brina-blum-156977-unsplash</image:title></image:image><lastmod>2018-09-20T16:49:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/01/08/storage-device-management/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/01/curtis-macnewton-317636-unsplash.jpg</image:loc><image:title>curtis-macnewton-317636-unsplash</image:title></image:image><lastmod>2018-09-20T16:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/01/15/tips-for-data-storage-management/</loc><lastmod>2018-09-20T16:47:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/01/29/data-storage-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/01/samuel-zeller-360588-unsplash.jpg</image:loc><image:title>samuel-zeller-360588-unsplash</image:title></image:image><lastmod>2018-09-20T16:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/02/05/storage-architecture-tiered-storage/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/02/frank-mckenna-252014-unsplash.jpg</image:loc><image:title>frank-mckenna-252014-unsplash</image:title></image:image><lastmod>2018-09-20T16:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/02/19/tips-for-data-storage-migration/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/02/md-duran-628456-unsplash.jpg</image:loc><image:title>md-duran-628456-unsplash</image:title></image:image><lastmod>2018-09-20T16:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/preventive-server-maintenance-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/fancycrave-530803-unsplash.jpg</image:loc><image:title>fancycrave-530803-unsplash</image:title></image:image><lastmod>2018-09-20T16:37:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/history-of-programming-languages/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-518966-unsplash.jpg</image:loc><image:title>markus-spiske-518966-unsplash</image:title></image:image><lastmod>2018-09-20T16:37:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/how-to-combat-insomnia-using-technology/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/matthew-henry-58760-unsplash.jpg</image:loc><image:title>matthew-henry-58760-unsplash</image:title></image:image><lastmod>2018-09-20T16:34:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/random-thoughts-volume-1-can-we-live-forever/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/alex-knight-199368-unsplash.jpg</image:loc><image:title>alex-knight-199368-unsplash</image:title></image:image><lastmod>2018-09-20T16:34:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/random-thoughts-volume-2-living-on-mars-why-how/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jordan-opel-540944-unsplash1.jpg</image:loc><image:title>jordan-opel-540944-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jordan-opel-540944-unsplash.jpg</image:loc><image:title>jordan-opel-540944-unsplash</image:title></image:image><lastmod>2018-09-20T16:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/the-future-of-data-storage/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/josh-riemer-450080-unsplash.jpg</image:loc><image:title>josh-riemer-450080-unsplash</image:title></image:image><lastmod>2018-09-20T16:32:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/the-future-of-microsoft-operating-systems/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/tomasz-frankowski-198764-unsplash.jpg</image:loc><image:title>tomasz-frankowski-198764-unsplash</image:title></image:image><lastmod>2018-09-20T16:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/the-future-of-cisco-networking/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/drmakete-lab-57353-unsplash.jpg</image:loc><image:title>drmakete-lab-57353-unsplash</image:title></image:image><lastmod>2018-09-20T16:26:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/26/it-security-plan-information/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/andres-umana-736248-unsplash.jpg</image:loc><image:title>andres-umana-736248-unsplash</image:title></image:image><lastmod>2018-09-20T16:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/virtual-reality-getting-your-pc-ready/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/eddie-kopp-264813-unsplash.jpg</image:loc><image:title>eddie-kopp-264813-unsplash</image:title></image:image><lastmod>2018-09-20T16:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/high-availability-the-quest-for-five-9s/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/fancycrave-284219-unsplash.jpg</image:loc><image:title>fancycrave-284219-unsplash</image:title></image:image><lastmod>2018-09-20T16:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/nas-and-das/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jeff-sheldon-3228-unsplash.jpg</image:loc><image:title>jeff-sheldon-3228-unsplash</image:title></image:image><lastmod>2018-09-20T16:15:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-memo-explaining-sas-and-sata-data-storage/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/j-kelly-brito-256889-unsplash.jpg</image:loc><image:title>j-kelly-brito-256889-unsplash</image:title></image:image><lastmod>2018-09-20T16:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/types-of-cabling-for-smb/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/juan-di-nella-965-unsplash.jpg</image:loc><image:title>juan-di-nella-965-unsplash</image:title></image:image><lastmod>2018-09-20T16:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/physical-and-virtual-tape-drives/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/simone-acquaroli-263190-unsplash.jpg</image:loc><image:title>simone-acquaroli-263190-unsplash</image:title></image:image><lastmod>2018-09-20T16:13:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/data-de-duplication/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/chris-liverani-552652-unsplash.jpg</image:loc><image:title>chris-liverani-552652-unsplash</image:title></image:image><lastmod>2018-09-20T16:13:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/data-profiling/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/carlos-muza-84523-unsplash.jpg</image:loc><image:title>carlos-muza-84523-unsplash</image:title></image:image><lastmod>2018-09-20T16:11:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/what-is-storage-replication/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/maique-madeira-256088-unsplash.jpg</image:loc><image:title>maique-madeira-256088-unsplash</image:title></image:image><lastmod>2018-09-20T16:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/data-deduplication-dedupe-tax/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-252130-unsplash.jpg</image:loc><image:title>rawpixel-252130-unsplash</image:title></image:image><lastmod>2018-09-20T16:10:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/ip-routing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/john-schnobrich-520023-unsplash.jpg</image:loc><image:title>john-schnobrich-520023-unsplash</image:title></image:image><lastmod>2018-09-20T16:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-memo-explaining-recommendations-for-routing-choices/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/kelly-sikkema-273133-unsplash.jpg</image:loc><image:title>kelly-sikkema-273133-unsplash</image:title></image:image><lastmod>2018-09-20T16:09:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/enabling-and-configuring-nat/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/ludovic-toinel-349299-unsplash.jpg</image:loc><image:title>ludovic-toinel-349299-unsplash</image:title></image:image><lastmod>2018-09-20T16:08:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/router-issues-reset-and-relax/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-603646-unsplash.jpg</image:loc><image:title>rawpixel-603646-unsplash</image:title></image:image><lastmod>2018-09-20T16:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/port-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/enrapture-media-271742-unsplash.jpg</image:loc><image:title>enrapture-media-271742-unsplash</image:title></image:image><lastmod>2018-09-20T16:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-a-memo-explaining-how-to-implement-rip-routing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/kelly-sikkema-411622-unsplash.jpg</image:loc><image:title>kelly-sikkema-411622-unsplash</image:title></image:image><lastmod>2018-09-20T16:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/static-default-and-dynamic-routing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/matt-howard-186811-unsplash.jpg</image:loc><image:title>matt-howard-186811-unsplash</image:title></image:image><lastmod>2018-09-20T16:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/vpn-virtual-private-network-overview/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/andrew-worley-299600-unsplash.jpg</image:loc><image:title>andrew-worley-299600-unsplash</image:title></image:image><lastmod>2018-09-20T16:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/ccna-certification/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/muhammad-rizwan-270301-unsplash.jpg</image:loc><image:title>muhammad-rizwan-270301-unsplash</image:title></image:image><lastmod>2018-09-20T15:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/editing-in-cisco-ios/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/john-hult-93012-unsplash.jpg</image:loc><image:title>john-hult-93012-unsplash</image:title></image:image><lastmod>2018-09-20T15:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/enhanced-interior-gateway-routing-protocol-eigrp/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/austris-augusts-140145-unsplash.jpg</image:loc><image:title>austris-augusts-140145-unsplash</image:title></image:image><lastmod>2018-09-20T15:58:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/the-process-of-data-using-the-osi-model/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/joshua-sortino-215039-unsplash.jpg</image:loc><image:title>joshua-sortino-215039-unsplash</image:title></image:image><lastmod>2018-09-20T15:57:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/process-application-layer/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/josh-calabrese-236920-unsplash.jpg</image:loc><image:title>josh-calabrese-236920-unsplash</image:title></image:image><lastmod>2018-09-20T15:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/vlans-lans/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-660716-unsplash.jpg</image:loc><image:title>rawpixel-660716-unsplash</image:title></image:image><lastmod>2018-09-20T15:54:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/types-of-vpns/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/tom-sodoge-59546-unsplash.jpg</image:loc><image:title>tom-sodoge-59546-unsplash</image:title></image:image><lastmod>2018-09-20T15:53:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/cloud-computing-risks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/meric-dagli-487822-unsplash.jpg</image:loc><image:title>meric-dagli-487822-unsplash</image:title></image:image><lastmod>2018-09-20T15:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/hybrid-clouds/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/pawel-nolbert-284225-unsplash.jpg</image:loc><image:title>pawel-nolbert-284225-unsplash</image:title></image:image><lastmod>2018-09-20T15:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-memo-explaining-cloud-bursting/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/mike-enerio-33578-unsplash.jpg</image:loc><image:title>mike-enerio-33578-unsplash</image:title></image:image><lastmod>2018-09-20T15:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/suggestions-for-cloud-adaptation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/sam-schooler-4824-unsplash.jpg</image:loc><image:title>sam-schooler-4824-unsplash</image:title></image:image><lastmod>2018-09-20T15:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/cloud-computing-benefits-for-help-desks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/lionel-abrial-17205-unsplash.jpg</image:loc><image:title>lionel-abrial-17205-unsplash</image:title></image:image><lastmod>2018-09-20T15:28:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/cloud-computing-regulations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/alex-machado-435966-unsplash.jpg</image:loc><image:title>alex-machado-435966-unsplash</image:title></image:image><lastmod>2018-09-20T15:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/mac-dac-tbac/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/patryk-gradys-128898-unsplash.jpg</image:loc><image:title>patryk-gradys-128898-unsplash</image:title></image:image><lastmod>2018-09-20T15:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/elliptical-curve-cryptography-ecc/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/charles-deluvio-456501-unsplash.jpg</image:loc><image:title>charles-deluvio-456501-unsplash</image:title></image:image><lastmod>2018-09-20T15:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/2016-data-breach-investigations-report-overview/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/luca-bravo-217276-unsplash.jpg</image:loc><image:title>luca-bravo-217276-unsplash</image:title></image:image><lastmod>2018-09-20T15:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/rogue-access-points/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/john-moeses-bauan-690280-unsplash.jpg</image:loc><image:title>john-moeses-bauan-690280-unsplash</image:title></image:image><lastmod>2018-09-20T15:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/adware-scary-noises/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/saketh-garuda-536372-unsplash.jpg</image:loc><image:title>saketh-garuda-536372-unsplash</image:title></image:image><lastmod>2018-09-20T15:19:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/common-weakness-enumeration-cwe/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/samuel-zeller-336980-unsplash.jpg</image:loc><image:title>samuel-zeller-336980-unsplash</image:title></image:image><lastmod>2018-09-20T15:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/hard-disks-and-bottlenecking/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/anomaly-602394-unsplash.jpg</image:loc><image:title>anomaly-602394-unsplash</image:title></image:image><lastmod>2018-09-20T15:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/raid-information/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/david-werbrouck-304966-unsplash.jpg</image:loc><image:title>david-werbrouck-304966-unsplash</image:title></image:image><lastmod>2018-09-20T15:16:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-memo-regarding-fault-tolerance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/henry-hustava-81799-unsplash.jpg</image:loc><image:title>henry-hustava-81799-unsplash</image:title></image:image><lastmod>2018-09-20T15:15:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/hard-disk-performance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jordan-whitfield-112404-unsplash-1.jpg</image:loc><image:title>jordan-whitfield-112404-unsplash (1)</image:title></image:image><lastmod>2018-09-20T14:56:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/network-documentation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/glenn-carstens-peters-190592-unsplash.jpg</image:loc><image:title>glenn-carstens-peters-190592-unsplash</image:title></image:image><lastmod>2018-09-20T14:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/how-resource-allocation-works-in-virtual-machines/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/steve-roe-719904-unsplash.jpg</image:loc><image:title>steve-roe-719904-unsplash</image:title></image:image><lastmod>2018-09-20T14:55:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/history-of-netscape-the-rise-and-fall/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/pietro-jeng-266017-unsplash.jpg</image:loc><image:title>pietro-jeng-266017-unsplash</image:title></image:image><lastmod>2018-09-19T20:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/file-transfer-protocol-ftp/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/fabian-irsara-92113-unsplash.jpg</image:loc><image:title>fabian-irsara-92113-unsplash</image:title></image:image><lastmod>2018-09-19T19:48:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/osi-open-systems-interconnection-model/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/christopher-gower-291240-unsplash.jpg</image:loc><image:title>christopher-gower-291240-unsplash</image:title></image:image><lastmod>2018-09-19T19:29:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/digital-certificates/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-570911-unsplash.jpg</image:loc><image:title>rawpixel-570911-unsplash</image:title></image:image><lastmod>2018-09-19T19:28:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/apipa-automatic-private-ip-addressing/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/daniel-von-appen-255531-unsplash.jpg</image:loc><image:title>daniel-von-appen-255531-unsplash</image:title></image:image><lastmod>2018-09-19T19:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/the-benefits-of-ipv6/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/anthony-garand-503053-unsplash1.jpg</image:loc><image:title>anthony-garand-503053-unsplash</image:title></image:image><lastmod>2018-09-19T16:46:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/the-wonderful-world-of-cabling/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/clem-onojeghuo-180152-unsplash.jpg</image:loc><image:title>clem-onojeghuo-180152-unsplash</image:title></image:image><lastmod>2018-09-19T16:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/cisco-port-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/daniel-monteiro-225197-unsplash.jpg</image:loc><image:title>daniel-monteiro-225197-unsplash</image:title></image:image><lastmod>2018-09-19T16:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-of-a-memo-regarding-rip-and-ospf/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/ildefonso-polo-700782-unsplash.jpg</image:loc><image:title>ildefonso-polo-700782-unsplash</image:title></image:image><lastmod>2018-09-19T16:44:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/dns/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/anthony-garand-503053-unsplash.jpg</image:loc><image:title>anthony-garand-503053-unsplash</image:title></image:image><lastmod>2018-09-19T16:41:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/dmz/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/javardh-740705-unsplash.jpg</image:loc><image:title>javardh-740705-unsplash</image:title></image:image><lastmod>2018-11-23T10:11:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/wi-fi-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/milkovi-344432-unsplash.jpg</image:loc><image:title>milkovi-344432-unsplash</image:title></image:image><lastmod>2018-09-19T16:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/virtualization/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/h-heyerlein-199082-unsplash.jpg</image:loc><image:title>h-heyerlein-199082-unsplash</image:title></image:image><lastmod>2018-09-19T16:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/steve-wozniak-video-review/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/thammie-cascales-491615-unsplash.jpg</image:loc><image:title>thammie-cascales-491615-unsplash</image:title></image:image><lastmod>2018-09-19T16:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/windows-10-power-consumption/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/max-bender-560106-unsplash.jpg</image:loc><image:title>max-bender-560106-unsplash</image:title></image:image><lastmod>2018-09-19T16:36:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/remote-desktop-vs-remote-assistance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/ash-edmonds-510555-unsplash.jpg</image:loc><image:title>ash-edmonds-510555-unsplash</image:title></image:image><lastmod>2018-09-19T16:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/minimizing-running-services-and-processes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jonas-jacobsson-628321-unsplash.jpg</image:loc><image:title>jonas-jacobsson-628321-unsplash</image:title></image:image><lastmod>2018-09-19T16:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/custom-multi-factor-authentication-system/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jon-tyson-228428-unsplash.jpg</image:loc><image:title>jon-tyson-228428-unsplash</image:title></image:image><lastmod>2018-09-19T16:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/early-versions-of-cryptography/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-445253-unsplash.jpg</image:loc><image:title>markus-spiske-445253-unsplash</image:title></image:image><lastmod>2018-09-19T16:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/windows-user-authentication-active-directory/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/nikita-kachanovsky-571468-unsplash.jpg</image:loc><image:title>nikita-kachanovsky-571468-unsplash</image:title></image:image><lastmod>2018-09-19T16:14:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/video-review-security-configuration-wizard/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/john-moeses-bauan-633627-unsplash.jpg</image:loc><image:title>john-moeses-bauan-633627-unsplash</image:title></image:image><lastmod>2018-09-19T16:13:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/phishing-not-the-fun-kind/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/mike-wilson-109478-unsplash.jpg</image:loc><image:title>mike-wilson-109478-unsplash</image:title></image:image><lastmod>2018-09-19T16:07:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/physical-access-security/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/jon-moore-399469-unsplash.jpg</image:loc><image:title>jon-moore-399469-unsplash</image:title></image:image><lastmod>2018-09-19T15:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/efs-encrypting-file-system/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/sanwal-deen-93466-unsplash.jpg</image:loc><image:title>sanwal-deen-93466-unsplash</image:title></image:image><lastmod>2018-09-19T15:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/basic-vs-dynamic-disks/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-771275-unsplash.jpg</image:loc><image:title>rawpixel-771275-unsplash</image:title></image:image><lastmod>2018-09-19T15:24:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/local-service-and-network-service-accounts/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/martin-shreder-349256-unsplash.jpg</image:loc><image:title>martin-shreder-349256-unsplash</image:title></image:image><lastmod>2018-09-19T15:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/command-line-tools/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/barn-images-12223-unsplash.jpg</image:loc><image:title>barn-images-12223-unsplash</image:title></image:image><lastmod>2018-09-19T15:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/example-memo-for-encryption-plan/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-666905-unsplash.jpg</image:loc><image:title>markus-spiske-666905-unsplash</image:title></image:image><lastmod>2018-09-19T15:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/example-of-memo-outlining-network-changes/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-574844-unsplash.jpg</image:loc><image:title>rawpixel-574844-unsplash</image:title></image:image><lastmod>2018-09-19T15:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/workgroups-and-domains/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/domenico-loia-310197-unsplash.jpg</image:loc><image:title>domenico-loia-310197-unsplash</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/domenico-loia-310197-unsplash-1.jpg</image:loc><image:title>domenico-loia-310197-unsplash (1)</image:title></image:image><lastmod>2018-09-19T15:05:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/snmp/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/daniel-chen-546446-unsplash.jpg</image:loc><image:title>daniel-chen-546446-unsplash</image:title></image:image><lastmod>2018-09-19T15:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/transmission-control-protocol/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-153537-unsplash.jpg</image:loc><image:title>markus-spiske-153537-unsplash</image:title></image:image><lastmod>2018-09-19T14:55:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/how-to-terminate-a-twisted-pair-cable-with-an-rj-45-plug/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/florian-pircher-72142-unsplash.jpg</image:loc><image:title>florian-pircher-72142-unsplash</image:title></image:image><lastmod>2018-09-19T14:52:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/28/home-internet-options/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/rawpixel-268378-unsplash.jpg</image:loc><image:title>rawpixel-268378-unsplash</image:title></image:image><lastmod>2018-09-19T14:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/06/random-thoughts-volume-13-how-tech-can-fight-addiction-and-should-society-be-more-sympathetic-towards-drug-addicts/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/frankie-cordoba-389268-unsplash.jpg</image:loc><image:title>frankie-cordoba-389268-unsplash</image:title></image:image><lastmod>2018-09-19T14:50:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/the-transforming-american-workforce-and-what-it-means-for-a-career-in-it/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/rawpixel-701117-unsplash.jpg</image:loc><image:title>rawpixel-701117-unsplash</image:title></image:image><lastmod>2018-09-19T14:37:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/applying-the-six-step-troubleshooting-model-example-internet-explorer-unable-to-connect-to-internet/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/mikito-tateisi-333584-unsplash.jpg</image:loc><image:title>mikito-tateisi-333584-unsplash</image:title></image:image><lastmod>2018-09-19T14:36:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/herzbergs-two-factor-theory-workplace-influences/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/photo-1512577107354-cc925a586320.jpeg</image:loc><image:title>photo-1512577107354-cc925a586320</image:title></image:image><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/rawpixel-558597-unsplash1.jpg</image:loc><image:title>rawpixel-558597-unsplash</image:title></image:image><lastmod>2018-09-19T14:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/teamwork/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/rawpixel-558597-unsplash.jpg</image:loc><image:title>rawpixel-558597-unsplash</image:title></image:image><lastmod>2018-09-19T14:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/applicability-of-the-functionalist-theory/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/ryan-rush-567219-unsplash.jpg</image:loc><image:title>ryan-rush-567219-unsplash</image:title></image:image><lastmod>2018-09-19T14:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/the-ideal-leader/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/brooke-lark-194253-unsplash.jpg</image:loc><image:title>brooke-lark-194253-unsplash</image:title></image:image><lastmod>2018-09-19T14:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/verbal-and-nonverbal-communication-while-working-with-a-group/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/rawpixel-653764-unsplash.jpg</image:loc><image:title>rawpixel-653764-unsplash</image:title></image:image><lastmod>2018-09-19T14:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/conflict-resolution-techniques/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/priscilla-du-preez-234144-unsplash.jpg</image:loc><image:title>priscilla-du-preez-234144-unsplash</image:title></image:image><lastmod>2018-09-19T14:13:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/23/how-to-install-an-optical-drive-on-a-computer/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/chris-yates-708472-unsplash.jpg</image:loc><image:title>chris-yates-708472-unsplash</image:title></image:image><lastmod>2018-09-19T13:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/25/how-to-enable-godmode-in-windows-10/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/fabian-grohs-437907-unsplash.jpg</image:loc><image:title>fabian-grohs-437907-unsplash</image:title></image:image><lastmod>2018-09-19T13:55:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/communication-in-the-air-force/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/active-adult-air-force-279991.jpg</image:loc><image:title>active-adult-air-force-279991</image:title></image:image><lastmod>2018-09-19T13:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/presenting-an-it-speech/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/ada.jpg</image:loc><image:title>ada</image:title></image:image><lastmod>2018-09-19T13:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/the-3-elements-of-credibility-speeches/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/mic-mic-stand-microphone-64057.jpg</image:loc><image:title>mic-mic-stand-microphone-64057</image:title></image:image><lastmod>2018-09-19T13:46:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/the-essentials-of-server-maintenance/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/architecture-business-cabinet-325229.jpg</image:loc><image:title>architecture-business-cabinet-325229</image:title></image:image><lastmod>2018-09-19T13:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/defragmentation/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/actuator-arm-close-up-data-33278.jpg</image:loc><image:title>actuator-arm-close-up-data-33278</image:title></image:image><lastmod>2018-09-19T13:33:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/ipv4-vs-ipv6/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/bandwidth-close-up-computer-1148820.jpg</image:loc><image:title>bandwidth-close-up-computer-1148820</image:title></image:image><lastmod>2018-09-19T13:32:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/example-of-memo-basic-mobile-device-use-and-operations/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/business-computer-device-35550.jpg</image:loc><image:title>business-computer-device-35550</image:title></image:image><lastmod>2018-09-19T13:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/writing-revisions-papers/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/hand-notebook-outdoors-34072.jpg</image:loc><image:title>hand-notebook-outdoors-34072</image:title></image:image><lastmod>2018-09-19T13:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/14/safeguarding-using-technology-during-hurricane-florence/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/hurricane-92968_1920.jpg</image:loc><image:title>hurricane-92968_1920</image:title></image:image><lastmod>2018-09-19T13:13:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/06/asus-rog-crosshair-vi-hero-review/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/asus-gadgets-laptop-265610.jpg</image:loc><image:title>asus-gadgets-laptop-265610</image:title></image:image><lastmod>2018-09-19T13:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/07/info-on-operating-systems-and-input-output-devices-for-beginners/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/apple-black-box-416343.jpg</image:loc><image:title>apple-black-box-416343</image:title></image:image><lastmod>2018-09-19T13:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/13/magic-leap-one-its-here/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/adult-beautiful-brunette-903701.jpg</image:loc><image:title>adult-beautiful-brunette-903701</image:title></image:image><lastmod>2018-09-19T13:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/08/20/tech-charities-and-organizations-healing-the-world-with-technology/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/08/kat-yukawa-754726-unsplash.jpg</image:loc><image:title>kat-yukawa-754726-unsplash</image:title></image:image><lastmod>2018-09-19T13:09:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/04/fitness-technology-putting-the-it-in-fit/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/victor-freitas-604835-unsplash.jpg</image:loc><image:title>victor-freitas-604835-unsplash</image:title></image:image><lastmod>2018-09-19T13:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/09/17/tips-for-building-a-gaming-pc/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/09/vasanth-737064-unsplash.jpg</image:loc><image:title>vasanth-737064-unsplash</image:title></image:image><lastmod>2018-09-19T13:02:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/23/nat-definition-types-strengths-and-weaknesses/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/thomas-kvistholt-191153-unsplash.jpg</image:loc><image:title>thomas-kvistholt-191153-unsplash</image:title></image:image><lastmod>2018-09-07T19:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/02/27/end-of-degree-post/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/02/andre-hunter-702310-unsplash.jpg</image:loc><image:title>andre-hunter-702310-unsplash</image:title></image:image><lastmod>2018-08-30T14:53:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/tcp-ip/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/markus-spiske-507983-unsplash.jpg</image:loc><image:title>markus-spiske-507983-unsplash</image:title></image:image><lastmod>2018-08-30T13:52:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/types-of-addresses/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/chris-barbalis-322044-unsplash.jpg</image:loc><image:title>chris-barbalis-322044-unsplash</image:title></image:image><lastmod>2018-08-29T16:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/utilizing-the-system-information-tool/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/06/freestocks-org-540554-unsplash.jpg</image:loc><image:title>freestocks-org-540554-unsplash</image:title></image:image><lastmod>2018-08-29T16:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/project-xbox-cooling-system-prep-or-logic-gate-with-switch-and-photocell/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/randall-bruder-136626-unsplash.jpg</image:loc><image:title>randall-bruder-136626-unsplash</image:title></image:image><lastmod>2018-08-29T14:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/19/electrical-engineering-voltage-regulator-with-fold-back-current-limiting/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/spencer-_-699369-unsplash.jpg</image:loc><image:title>spencer-_-699369-unsplash</image:title></image:image><lastmod>2018-08-29T14:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/07/26/googles-titan-key/</loc><image:image><image:loc>https://securingtheuniverse.com/wp-content/uploads/2018/07/edho-pratama-152392-unsplash.jpg</image:loc><image:title>edho-pratama-152392-unsplash</image:title></image:image><lastmod>2018-08-29T13:50:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/06/27/vendor-lock-in-2/</loc><lastmod>2018-06-27T15:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com/2018/02/05/storage-architecture-tiered-storage-2/</loc><lastmod>2018-02-05T15:49:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securingtheuniverse.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-10T01:18:05+00:00</lastmod></url></urlset>
