<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://postmodernsecurity.com/2021/11/29/compliance-as-property/</loc><lastmod>2024-09-27T23:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/06/12/apple-i-wish-i-knew-how-to-quit-you/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/06/brokeback_apple.jpg</image:loc><image:title>brokeback_apple</image:title></image:image><lastmod>2024-07-11T18:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2024/05/29/lets-stop-the-security-shaming/</loc><lastmod>2024-05-29T18:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2024/01/25/fear-and-loathing-in-security-dashboards/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2024/01/traffic-light.png</image:loc><image:title>traffic light</image:title></image:image><lastmod>2024-01-25T20:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2023/04/11/supply-chain-security-jumps-the-shark/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2023/04/transforming_product_security_external-1.png</image:loc><image:title>Transforming_product_security_EXTERNAL</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2023/04/transforming_product_security_external.png</image:loc><image:title>Transforming_product_security_EXTERNAL</image:title></image:image><lastmod>2023-08-25T13:06:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/01/24/introducing-security-soc-puppets/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/01/gert-and-bernie.jpg</image:loc><image:title>Gert and Bernie</image:title></image:image><lastmod>2023-07-12T20:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2023/07/12/introducing-securitys-social-problem/</loc><lastmod>2023-07-12T20:17:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2023/05/24/dancing-with-the-cloud/</loc><lastmod>2023-05-24T19:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2023/05/11/trapped-by-technology-fallacies/</loc><lastmod>2023-05-11T16:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2018/01/12/the-five-stages-of-cloud-grief/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2018/01/aws_consumption.png</image:loc><image:title>AWS_consumption</image:title></image:image><lastmod>2023-04-13T11:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2023/03/01/architecture-frameworks-meaningful-or-ridiculous/</loc><lastmod>2023-03-01T23:07:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/welcome-to-my-lair/about-mrs-y/</loc><lastmod>2023-02-28T15:39:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://postmodernsecurity.com/2022/03/01/why-your-security-program-is-failing/</loc><lastmod>2022-03-01T21:14:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2021/06/11/infosec-riot-grrrl-manifesto/</loc><lastmod>2021-06-11T17:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2021/06/02/when-compliance-goes-bad/</loc><lastmod>2021-06-02T17:04:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2021/05/27/security-policy-rtfm/</loc><lastmod>2021-05-27T20:16:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2021/02/02/cloud-native-consumption-principles/</loc><lastmod>2021-02-02T17:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2021/01/05/assume-no-intent/</loc><lastmod>2021-01-05T20:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2020/11/14/devsecops-decisioning-principles/</loc><lastmod>2020-11-14T16:14:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2019/01/24/devsecops-myths/</loc><lastmod>2019-01-24T15:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/09/11/malware-analysis-and-incident-response-tools-for-the-frugal-and-lazy/</loc><lastmod>2018-09-27T12:07:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2018/05/15/your-pets-dont-belong-in-the-cloud/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2018/05/burping_cloud.jpg</image:loc><image:title>burping_cloud</image:title></image:image><lastmod>2018-05-15T16:35:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/10/13/moving-appsec-to-the-left/</loc><lastmod>2017-10-13T17:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/08/23/infrastructure-as-code-is-still-code/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/08/devops_borat.png</image:loc><image:title>devops_borat</image:title></image:image><lastmod>2017-08-23T13:29:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/08/18/ntp-rules-of-the-road/</loc><lastmod>2017-08-18T13:52:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/07/27/security-group-poop/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/07/aws_poop.jpg</image:loc><image:title>aws_poop</image:title></image:image><lastmod>2017-07-29T01:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/05/13/when-security-pros-wannacry/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/05/doves_cry_malware.jpg</image:loc><image:title>doves_cry_malware</image:title></image:image><lastmod>2017-05-13T15:43:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/02/24/chicken-little-security/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/02/sha-asif.jpg</image:loc><image:title>sha-asif</image:title></image:image><lastmod>2017-02-24T20:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2017/02/22/fear-and-loathing-in-dc/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2017/02/tin_foil_hat-e1487780443286.jpg</image:loc><image:title>tin_foil_hat</image:title></image:image><lastmod>2017-02-22T16:45:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/10/01/security-training-for-cheapskates/</loc><lastmod>2016-08-07T14:24:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/06/23/booth-babe-shame/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/06/screenshot-2016-06-23-14-15-34.png</image:loc><image:title>Screenshot 2016-06-23 14.15.34</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/06/screenshot-2016-06-23-14-05-41.png</image:loc><image:title>Screenshot 2016-06-23 14.05.41</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/06/screenshot-2016-06-23-13-46-05.png</image:loc><image:title>Screenshot 2016-06-23 13.46.05</image:title></image:image><lastmod>2016-06-28T19:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/06/04/fixing-a-security-program/</loc><lastmod>2016-06-04T15:28:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/05/16/security-word-of-the-day-compromise/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/05/patching.png</image:loc><image:title>patching</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/05/patching_force.jpg</image:loc><image:title>patching_force</image:title></image:image><lastmod>2016-05-16T14:04:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/05/13/splunk-funk/</loc><lastmod>2016-05-13T22:51:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/04/20/danger-stunt-hacking-ahead/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/04/screenshot-2016-04-20-11-33-19.png</image:loc><image:title>Screenshot 2016-04-20 11.33.19</image:title></image:image><lastmod>2016-04-20T15:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/04/14/the-endpoint-is-dead-to-me/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/04/google_on_my_etch_a_sketch_by_pikajane-d3846dy.jpg</image:loc><image:title>google_on_my_etch_a_sketch_by_pikajane-d3846dy</image:title></image:image><lastmod>2016-04-14T23:01:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/03/25/mindful-security/</loc><lastmod>2016-03-25T18:29:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/02/25/fear-and-loathing-in-vulnerability-management/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2016/02/hamster_meme.jpg</image:loc><image:title>hamster_meme</image:title></image:image><lastmod>2016-02-25T18:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/02/19/the-question-of-technical-debt/</loc><lastmod>2016-02-21T13:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2016/02/15/why-you-shouldnt-be-hosting-public-dns/</loc><lastmod>2016-02-16T00:39:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/12/21/security-threat-levels-with-a-side-of-fud/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/12/security_levels1.png</image:loc><image:title>security_levels</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/12/security_levels.png</image:loc><image:title>security_levels</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/12/2000px-hsas-chart_with_header-svg.png</image:loc><image:title>2000px-Hsas-chart_with_header.svg</image:title></image:image><lastmod>2015-12-21T23:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/12/04/dont-let-the-grinch-ruin-your-credit/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/12/grinch_heart.png</image:loc><image:title>grinch_heart</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/12/grinch_pic.jpeg</image:loc><image:title>Grinch_pic</image:title></image:image><lastmod>2015-12-05T01:48:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/12/04/why-youre-probably-not-ready-for-sdn/</loc><lastmod>2015-12-04T23:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/10/13/ending-the-tyranny-of-expensive-security-tools/</loc><lastmod>2015-10-14T01:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/09/19/security-vs-virtualization/</loc><lastmod>2015-09-19T23:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/09/17/is-your-security-architecture-default-open-or-default-closed/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/09/baby_meme1.jpg</image:loc><image:title>baby_meme</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/09/baby_meme.jpg</image:loc><image:title>baby_meme</image:title></image:image><lastmod>2015-09-17T18:20:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/09/05/the-var-quagmire/</loc><lastmod>2015-09-06T07:25:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/08/25/a-cautionary-security-tale/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/08/living_social_invoice.jpg</image:loc><image:title>living_social_invoice</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/08/living_social_2.jpg</image:loc><image:title>living_social_2</image:title></image:image><lastmod>2015-09-05T13:50:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/08/22/opm-hack-what-we-can-learn/</loc><lastmod>2015-08-22T15:48:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/welcome-to-my-lair/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2013/10/einstein_bunny_slippers.jpg</image:loc><image:title>einstein_bunny_slippers</image:title></image:image><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/03/mean_dirty_unicorn.jpg</image:loc><image:title>mean_dirty_unicorn</image:title></image:image><lastmod>2015-08-16T23:24:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://postmodernsecurity.com/2015/08/12/pci-purgatory/</loc><lastmod>2015-08-13T13:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/08/08/no-more-mrs-nice-guy/</loc><lastmod>2015-08-08T16:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/other-writing/</loc><lastmod>2015-08-08T16:21:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://postmodernsecurity.com/2015/07/27/meetings-the-first-horseman-of-the-apocalypse/</loc><lastmod>2015-08-08T15:50:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/08/07/being-the-security-asshole/</loc><lastmod>2015-09-17T06:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/08/08/security-for-luddites/</loc><lastmod>2015-08-08T12:50:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/26/cognitive-dissonance-and-incident-response/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/dilbert_incident_response.gif</image:loc><image:title>Dilbert On Incident Response</image:title></image:image><lastmod>2015-08-01T00:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/31/are-you-there-business-its-me-information-security/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/i-wonder-if-9jgrq0.jpg</image:loc><image:title>i-wonder-if-9jgrq0</image:title></image:image><lastmod>2015-07-31T22:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/30/the-physical-layer-networkings-fifth-circle-of-hell/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/pope_link.jpg</image:loc><image:title>Pope_link</image:title></image:image><lastmod>2015-07-30T16:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/25/security-karma/</loc><lastmod>2015-07-26T00:02:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/25/securitys-bad-boys/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/0_basilique_saint-pierre_-_rome_2.jpg</image:loc><image:title>St. Peter's</image:title></image:image><lastmod>2015-07-25T17:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/16/dear-flash-its-over/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/screenshot-2015-07-16-09-31-52.png</image:loc><image:title>Screenshot 2015-07-16 09.31.52</image:title></image:image><lastmod>2015-07-25T15:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/07/01/mythology-and-the-opm-hack/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/07/cassandra_on_hacking.jpg</image:loc><image:title>Cassandra on TVM</image:title></image:image><lastmod>2015-07-02T00:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/06/20/the-mssp-is-the-new-siem/</loc><lastmod>2015-06-20T21:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/06/19/tootsie-roll-pop-security/</loc><lastmod>2015-06-19T15:41:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/06/18/the-security-policys-bad-reputation/</loc><lastmod>2015-06-18T18:26:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/05/30/security-and-ugly-babies/</loc><lastmod>2015-06-12T16:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/05/25/are-you-trying-to-improve-security-or-just-kingdom-building/</loc><lastmod>2015-05-25T22:52:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/05/02/im-a-doctor-not-a-security-expert/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/05/mccoy_viruses.png</image:loc><image:title>I'm a doctor, not a security expert!</image:title></image:image><lastmod>2015-05-06T01:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/04/03/byod-pervasive-computing-has-arrived/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/04/jpwr5.jpg</image:loc><image:title>Spock does BYOD</image:title></image:image><lastmod>2015-04-03T22:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/03/25/failing-security-kindergarten/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/03/donut.jpg</image:loc><image:title>donut</image:title></image:image><lastmod>2015-03-25T21:01:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/03/02/security-theater-of-the-absurd/</loc><image:image><image:loc>https://postmodernsecurity.com/wp-content/uploads/2015/03/dirty_boots.jpg</image:loc><image:title>Dirty_boots</image:title></image:image><lastmod>2015-03-02T18:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com/2015/03/01/does-it-security-matter/</loc><lastmod>2015-03-02T00:27:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://postmodernsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-09-27T23:28:11+00:00</lastmod></url></urlset>
