<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://securityunfiltered.com/</loc><changefreq>daily</changefreq><priority>1.0</priority></url><url><loc>https://securityunfiltered.com/sponsors</loc><lastmod>2025-10-20T03:38:37.433Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/blog</loc><lastmod>2023-04-03T19:46:05.640Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/about</loc><lastmod>2023-05-01T18:53:02.457Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/episodes</loc><lastmod>2023-04-03T19:47:36.348Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/reviews</loc><lastmod>2022-10-25T02:16:03.096Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/contact</loc><lastmod>2023-04-03T19:49:36.535Z</lastmod><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/blog/about</loc><lastmod>2022-09-10T07:46:25.990Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/preparing-for-the-ccsp</loc><lastmod>2022-09-10T07:46:26.002Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/networking-internal-external</loc><lastmod>2022-09-10T07:46:26.016Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/certifications-vs-degrees</loc><lastmod>2022-09-10T07:46:26.027Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/cyber-security-career-paths</loc><lastmod>2022-09-10T07:46:26.035Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/the-aws-security-specialty</loc><lastmod>2022-09-10T07:46:26.043Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/cyber-security-interview-tips</loc><lastmod>2022-09-10T07:46:26.051Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/csp-course-overview</loc><lastmod>2022-09-10T07:46:26.062Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/young-talent-vs-proven-skills</loc><lastmod>2022-09-10T07:46:26.074Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/security-unfiltered-podcast</loc><lastmod>2022-09-10T07:46:26.082Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/getting-started-in-cloud-security</loc><lastmod>2022-09-10T07:46:26.119Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/blog/aws-security-specialist-course</loc><lastmod>2022-09-10T07:46:26.126Z</lastmod><priority>0.6</priority></url><url><loc>https://securityunfiltered.com/podcast/security-unfiltered</loc><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-1-getting-started-in-cyber-security</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-2-certs-vs-experience-vs-degrees</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-3-cloud-security-overview</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-4-leadership</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-5-isc2-certifications-tips-tricks-guidance</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-6-leaving-a-company</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-7-microsoft-exchange-zero-day</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-8-ben-malisow-all-things-security</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-9-skills-of-a-soc-analyst</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-10-not-so-incognito</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-11-great-leaders-vs-bad-bosses</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-12-facebook-data-privacy</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-episode-13-interview-with-theresa-levesque-pci-pmo</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-14-prashant-mohan-isc2-certification-training-tips</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-episode-15-how-to-be-uncommon-in-security</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-episode-16-dells-backdoor</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-episode-17-interview-w-ashish-rajan</loc><lastmod>2025-07-28T05:30:20.970Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-episode-18-interview-with-raphael-fiedler-ceo-at-safing</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-19-matt-alderman-ceo-of-security-weekly</loc><lastmod>2025-07-28T05:30:20.970Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-20-best-selling-author-ted-harrington</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-21-chris-cochran-from-hacker-valley-studio-podcast</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-22-patti-titus-ciso-of-markel-corp</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-23-alex-tartar-turgensec</loc><lastmod>2025-07-28T05:30:20.970Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-24-touching-base</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-25-ransomware-news</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-26-aerobics-for-cyber-espionage</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-27-career-paths-certs-experience</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-28-chinese-hackers-mss-group</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-29-greg-edwards-ceo-of-cryptostopper</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-30-accenture-ford-t-mobile-breaches</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-31-weekly-news-nato-cyber-warfare-repercussions</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-32-chris-roberts-hacker-of-all-things</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-33-mike-potter-ceo-of-rewind</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-34-catching-up-with-derrick</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-35-zero-days-for-days</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-36-im-back-did-you-miss-me</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-37-doing-the-extra</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-unfiltered-ep-38-all-things-security</loc><lastmod>2025-07-28T05:30:20.982Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-39-ben-brooks-the-path-to-security-consulting</loc><lastmod>2025-07-28T05:30:20.981Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-40-yujun-liangus-master-of-all-clouds</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-41-1-year-anniversary</loc><lastmod>2025-07-28T05:30:20.982Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-42-avi-bashan-cto-of-kovrr</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-43-lets-talk-about-russia</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-44-douglas-concepcion-ex-ciso-of-united-nations</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/podcast-updates-touching-base</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-45-mathieu-gorge-more-russia-ukraine-insight</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/bonus-episode-muddu-sudhakar-ceo-of-stealth-mode</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-46-jack-rhysider-darknet-diaries-podcast</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-47-ben-atar-ex-8200-group-hacker</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-48-alex-ruiz-coo-at-3go</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-49-chase-vciso-founder-of-cybertech-analytics</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/bonus-episode-ben-malisow</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-50-thomas-kinsella-life-of-a-soc-analyst</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-51-matt-morris-managing-director-of-1898-co</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-52-derrick-jackson</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-53-menachem-shafran-ex-reverse-engineer-for-8200-group</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-54-david-monnier-threat-intel-expert</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/live-at-rsa-with-ashish-rajan</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/live-at-rsa-with-adrian-sanabria-part-1</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/adrian-sanabria-part-2</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-56-matt-snoddy-digital-forensics-expert</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-57-paul-asadoorian-founder-of-security-weekly-firmware-security-expert</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-58-scott-schoeber-cyber-security-speaker-author-entrepreneur</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-59-evan-shoening-blockchain-security</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-60-john-zanni-ceo-of-acronis-scs</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-61-james-lawler-ex-cia-operations-officer</loc><lastmod>2025-07-28T05:30:20.969Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-62-andrew-abel-zero-trust-expert</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-63-w-curtis-preston-dr-backup</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-64-philippe-humeau-ceo-of-crowdsec</loc><lastmod>2025-07-13T16:46:43.319Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-64-philippe-humeau-ceo-of-crowdsec-4slv</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-65-rob-dickinson-api-security-expert</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-66-mathieu-gorge-vigitrust-emerging-threats</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-67-dimitri-sirota-ceo-of-bigid</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-68-adrianus-warmenhoven-nord-security</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/lets-talk-its-been-a-while</loc><lastmod>2025-07-28T05:30:20.965Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-69-mike-mcneil-ceo-of-fleetdm</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-70-zach-hill-brand-manager-of-tcm-security</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-71-anirban-banerjee-ceo-of-riscosity</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-72-vice-admiral-tj-white-the-future-of-the-military-growing-concern-in-asia</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-73-gareth-harte-ceo-of-telios</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-74-john-shegerian-ceo-of-eri-e-waste-golliath</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-75-ofer-maor-3fa-in-the-cloud</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-76-amit-modi-cto-ciso-of-movius</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-77-jason-forehand-ceo-of-isi</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-78-james-fair-sr-vp-of-it-services-at-executech</loc><lastmod>2025-07-28T05:30:20.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-79-filip-verloy-cto-of-noname-security</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-80-jack-naglieri-ceo-of-panther-labs</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-81-peter-dyson-cutting-through-the-boringness-of-risk</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/top-5-cloud-security-certs</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-82-russia-ukraine-threat-expert</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/getting-started-in-security-in-2023</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-83-dan-benjamin-ex-8200-group-to-entrepreneur</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-a-bomb-proof-network</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-84-javvad-malik-security-awareness-at-knowbe4</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/does-fake-it-until-you-make-it-work</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-85-tanya-janca-we-hack-purple</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-to-set-goals-in-2023</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-86-security-as-a-service</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-a-recession-proof-career</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-87-countering-nation-state-operations</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-to-be-unique-in-security</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-88-tips-tricks-for-breaking-into-security</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/overcoming-imposter-syndrome</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-89-turning-tragedy-into-data-privacy</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/mistakes-i-made-so-you-dont-have-to</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-90-saving-the-world-from-notpetya</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/defeating-the-talent-shortage</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-91-the-future-of-cryptocurrency</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/burnout-is-rampant-in-security</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-92-how-to-handle-change-in-the-face-of-adversity</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-to-knock-your-next-interview-out-of-the-park</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-93-starting-a-consultancy-from-nothing</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/salary-expectations-negotiations</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-94-the-future-of-ai-development</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/being-coachable-will-save-your-career</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-95-building-a-security-media-enterprise</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/recession-proof-your-career</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/episode-96-how-ai-will-change-security</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/thinking-like-an-attacker</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/trained-by-the-cia-dia</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/life-podcast-update</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/tackling-iam-in-the-cloud</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-microsoft-is-revolutionizing-security-in-the-cloud</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/my-journey-into-cyber-security</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-to-battle-burnout</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/raising-your-standards-will-change-your-life</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/how-cyber-has-changed-the-ukraine-russia-war</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/reverse-engineering-notpetya</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/sponsorship-protecting-your-money</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/why-passkeys-are-the-future</loc><lastmod>2025-07-28T05:30:20.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-a-bomb-proof-network-part-2</loc><lastmod>2025-07-28T05:30:20.968Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/becoming-an-entrepreneur-to-change-the-world</loc><lastmod>2025-07-28T05:30:20.965Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unraveling-cloud-iam-one-role-at-a-time</loc><lastmod>2026-03-24T14:25:32.801Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-newbie-to-pro-making-the-most-of-security-conferences</loc><lastmod>2026-03-24T14:25:32.758Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/injecting-the-art-of-espionage-into-novels</loc><lastmod>2026-03-24T14:25:32.718Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-hacking-to-cyber-warfare-inside-the-world-of-an-intelligence-expert-with-mike-jones</loc><lastmod>2026-03-24T14:25:32.675Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-art-of-selecting-and-owning-your-security-projects</loc><lastmod>2026-03-24T14:25:32.633Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/cybersecurity-wisdom-balancing-work-life-and-learning</loc><lastmod>2026-03-24T14:25:32.593Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/bridging-worlds-from-ms-dos-gaming-to-cybersecurity-innovations</loc><lastmod>2026-03-24T14:25:32.552Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ai-data-security-and-the-power-of-networking-lessons-from-an-it-recruiter</loc><lastmod>2026-03-24T14:25:32.510Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/embracing-curiosity-a-journey-into-it-security-and-continuous-learning</loc><lastmod>2026-03-24T14:25:32.472Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/steves-inspiring-shift-from-med-school-to-cybersecurity</loc><lastmod>2026-03-24T14:25:32.433Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/breaking-into-cybersecurity-from-er-tech-to-it-expert-exploring-the-zero-trust-framework-and-the-power-of-networking</loc><lastmod>2026-03-24T14:25:32.395Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/exploring-the-evolution-of-application-security-with-moti-gindi-from-apiiro</loc><lastmod>2026-03-24T14:25:32.356Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/behind-the-scenes-prepping-for-the-cissp-exam-twice</loc><lastmod>2026-03-24T14:25:32.319Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-opera-to-it-a-tale-of-resilience-and-innovation-with-security-engineer-akira-brand</loc><lastmod>2026-03-24T14:25:32.281Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-journey-of-a-linguist-turned-it-and-security-professional-with-jeremy-snyder</loc><lastmod>2026-03-24T14:25:32.240Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unlocking-the-excitement-of-defcon-an-insiders-guide-to-the-worlds-largest-security-conference</loc><lastmod>2026-03-24T14:25:32.193Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-the-evolution-of-ransomware-and-its-impact-on-data-security-with-rubrik-zscaler</loc><lastmod>2026-03-24T14:25:32.151Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/immersing-in-defcon-and-navigating-cissp-exam-prep-a-journey-towards-personal-development-in-tech</loc><lastmod>2026-03-24T14:25:32.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/insights-on-self-employment-and-cyber-threats-from-boom-supersonics-ciso-chris-roberts</loc><lastmod>2026-03-24T14:25:32.062Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/exploring-the-versatility-of-cybersecurity-with-sans-instructor-jason-ostrom</loc><lastmod>2026-03-24T14:25:32.020Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/exploring-the-intricacies-of-cybersecurity-with-expert-aviv-grafi</loc><lastmod>2026-03-24T14:25:31.972Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/exploring-evolution-and-consequences-in-cybersecurity-management</loc><lastmod>2026-03-24T14:25:31.933Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-geology-to-cybersecurity-mikes-unexpected-journey</loc><lastmod>2026-03-24T14:25:31.897Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-physicists-pathway-to-cybersecurity-mastery</loc><lastmod>2026-03-24T14:25:31.858Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/in-the-mind-of-a-mercenary-a-dive-into-cyber-warfare</loc><lastmod>2026-03-24T14:25:31.818Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/turning-small-steps-into-big-dreams</loc><lastmod>2026-03-24T14:25:31.778Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/an-israel-colonels-insight-into-cybersecurity-challenges</loc><lastmod>2026-03-24T14:25:31.736Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-internal-politics-and-personal-security-insights-and-advice</loc><lastmod>2026-03-24T14:25:31.695Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/turning-hurdles-into-success-ganeshs-tale-of-persistence-and-innovation</loc><lastmod>2026-03-24T14:25:31.656Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/addressing-betrayal-and-building-trust-in-the-workplace</loc><lastmod>2026-03-24T14:25:31.619Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unraveling-network-security-in-a-multi-cloud-world-with-the-founder-of-snort</loc><lastmod>2026-03-24T14:25:31.580Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/microsoft-security-researcher-a-tale-of-one-womans-resilience-and-ambition</loc><lastmod>2026-03-24T14:25:31.541Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-from-pre-sales-to-identity-fraud-a-conversation-with-nir-stern</loc><lastmod>2026-03-24T14:25:31.474Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/taking-a-tech-memory-lane-walk-with-trey-guinn-from-cloudflare</loc><lastmod>2026-03-24T14:25:31.435Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-nsa-security-to-startup-founder-a-cybersecurity-journey</loc><lastmod>2026-03-24T14:25:31.395Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/reimagining-career-growth-the-moonlighting-approach</loc><lastmod>2026-03-24T14:25:31.358Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/preventing-bad-ai-how-soc-teams-are-preventing-ai-generated-attacks</loc><lastmod>2026-03-24T14:25:31.320Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/insights-into-security-research-and-internet-mapping</loc><lastmod>2026-03-24T14:25:31.282Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/a-deep-dive-into-iam-and-cloud-security</loc><lastmod>2026-03-24T14:25:31.240Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/bracing-for-the-future-of-tech-with-fastlys-next-gen-waf</loc><lastmod>2026-03-24T14:25:31.197Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-intersection-of-ai-and-cybersecurity-insights-from-rhymetecs-cto-metin</loc><lastmod>2026-03-24T14:25:31.152Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/quantum-computing-hacking-and-other-it-adventures-with-experts-duane-and-patrick</loc><lastmod>2026-03-24T14:25:31.110Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/a-year-in-review</loc><lastmod>2026-03-24T14:25:31.069Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/preparing-for-2024-5-attacks-targeting-you-this-year</loc><lastmod>2026-03-24T14:25:31.029Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-future-of-ai-and-cyber-resilience-with-matthew-gorge</loc><lastmod>2026-03-24T14:25:30.977Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-the-evolution-of-it-and-cybersecurity-from-vax-pioneers-to-zero-trust-visionaries</loc><lastmod>2026-03-24T14:25:30.934Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/embracing-change-in-tech-from-the-ai-revolution-and-the-power-of-adaptability</loc><lastmod>2026-03-24T14:25:30.892Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-coding-challenges-to-cybersecurity-champion-varuns-story-of-innovation-and-leadership</loc><lastmod>2026-03-24T14:25:30.853Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/redefining-success-while-juggling-parenthood-and-career-shifts</loc><lastmod>2026-03-24T14:25:30.814Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/transforming-risk-analysis-through-machine-learning-with-russell</loc><lastmod>2026-03-24T14:25:30.775Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-intricacies-of-active-directory-in-the-era-of-cloud-computing</loc><lastmod>2026-03-24T14:25:30.733Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-making-of-a-cybersecurity-titan-and-the-rise-of-virtual-compliance</loc><lastmod>2026-03-24T14:25:30.692Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/charting-the-digital-frontier-with-a-fathers-insight</loc><lastmod>2026-03-24T14:25:30.654Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-physics-to-platform-engineering-revolutionizing-devops-and-tackling-cloud-security</loc><lastmod>2026-03-24T14:25:30.613Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ethical-tech-and-inclusivity-in-the-age-of-ai-with-jackie-mcguire-from-cribl</loc><lastmod>2026-03-24T14:25:30.575Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/seizing-it-opportunities-gerry-gebels-professional-saga</loc><lastmod>2026-03-24T14:25:30.536Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unlocking-the-secrets-of-effective-insider-threat-management-with-joe-payne-from-code42</loc><lastmod>2026-03-24T14:25:30.497Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/educational-grit-and-quantum-communications-in-space-security</loc><lastmod>2026-03-24T14:25:30.449Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/outsmarting-cybercriminals-a-deep-dive-into-social-engineering-deepfakes-and-digital-defense-with-aaron-painter</loc><lastmod>2026-03-24T14:25:30.409Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/bridging-the-gap-between-technical-expertise-and-business-acumen-with-shauli-rozen</loc><lastmod>2026-03-24T14:25:30.365Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ashley-burkes-resilience-in-the-world-of-fintech-and-cyber-risk</loc><lastmod>2026-03-24T14:25:30.326Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/inside-the-mind-of-a-cybersecurity-maestro-oliver-tavakolis-journey-from-mainframes-to-ai</loc><lastmod>2026-03-24T14:25:30.286Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/addressing-the-risks-of-ai-with-innovative-solutions-encrypting-communication</loc><lastmod>2026-03-24T14:25:30.247Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-challenges-of-depreciating-it-equipment-the-importance-of-proper-data-destruction-with-rocco-damico</loc><lastmod>2026-03-24T14:25:30.205Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/indu-keris-insights-on-balancing-security-and-innovation</loc><lastmod>2026-03-24T14:25:30.163Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unlocking-cloud-security-insights-and-innovations-with-sandy-bird</loc><lastmod>2026-03-24T14:25:30.121Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/transforming-your-mindset-for-lasting-success-personal-stories-and-strategies</loc><lastmod>2026-03-24T14:25:30.080Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/safeguarding-the-future-of-ai-meets-cybersecurity-with-erick-galinkin</loc><lastmod>2026-03-24T14:25:30.036Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-future-of-encryption-and-digital-safety-with-ameesh-divatia</loc><lastmod>2026-03-24T14:25:29.978Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/protecting-small-businesses-in-the-digital-age-with-chris-petersen-from-radicl</loc><lastmod>2026-03-24T14:25:29.937Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-mathematics-to-cybersecurity-fayon-atkinsons-unexpected-career-journey</loc><lastmod>2026-03-24T14:25:29.900Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-hacked-teen-to-cybersecurity-pro-ron-eddings-journey-to-the-nsa-hacker-valley-studios</loc><lastmod>2026-03-24T14:25:29.858Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/grant-borzikas-unconventional-journey-to-ciso-of-cloudflare</loc><lastmod>2026-03-24T14:25:29.821Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/nsa-red-team-founder-jeff-man</loc><lastmod>2026-03-24T14:25:29.783Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/balancing-tech-and-soft-skills-in-modern-cybersecurity-with-rui-ribeiro</loc><lastmod>2025-11-03T06:11:10.835Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ai-security-and-the-future-of-it-explored-with-michael-goldstein</loc><lastmod>2025-11-03T06:11:10.835Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/fighting-misinformation-in-a-divided-landscape</loc><lastmod>2026-03-24T14:25:29.739Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/lessons-in-privacy-from-across-the-atlantic-with-richard-hollis</loc><lastmod>2026-03-24T14:25:29.700Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-the-cyber-threat-landscape-with-chris-hale</loc><lastmod>2026-03-24T14:25:29.660Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/innovative-approaches-to-safeguarding-information-with-matt-howard</loc><lastmod>2026-03-24T14:25:29.618Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-boeing-to-google-jake-moshenkos-journey-with-cutting-edge-security-at-authzed</loc><lastmod>2026-03-24T14:25:29.574Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-intelligence-analyst-to-cybersecurity-scott-smalls-journey-and-insights-on-geopolitics</loc><lastmod>2026-03-24T14:25:29.530Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-resilient-cyber-defenses-with-richard-cassidy</loc><lastmod>2026-03-24T14:25:29.485Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/balancing-cybersecurity-mastering-soft-skills-work-life-balance-and-community-connections-with-tyler-robinson</loc><lastmod>2026-03-24T14:25:29.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-cipher-wheels-to-modern-data-security-with-jeff-man-pt-2</loc><lastmod>2026-03-24T14:25:29.395Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-building-the-worlds-most-powerful-malware-to-building-the-worlds-most-secure-phone</loc><lastmod>2026-03-24T14:25:29.352Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/embracing-the-suck-lessons-from-nasa-in-cybersecurity</loc><lastmod>2026-03-24T14:25:29.304Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/balancing-speed-and-security-in-the-tech-world-with-idan-plotnik-ceo-of-apiiro</loc><lastmod>2026-03-24T14:25:29.259Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-military-emergency-response-to-cyber-security-guru-brad-laporte</loc><lastmod>2026-03-24T14:25:29.210Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-engineering-to-marketing-unconventional-career-paths-and-the-power-of-soft-skills-with-anne-baker</loc><lastmod>2026-03-24T14:25:29.167Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/mastering-lifes-juggling-act-balancing-business-family-and-ai-with-colby-derodeff</loc><lastmod>2026-03-24T14:25:29.122Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-mossad-officer-to-unit-8200-hacker-beyond-with-daniel-schechter-leader-in-app-security</loc><lastmod>2026-03-24T14:25:29.079Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/balancing-business-and-well-being-nathan-whitakers-journey-from-it-to-ironman</loc><lastmod>2026-03-24T14:25:29.035Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/2024-wrap-up</loc><lastmod>2026-03-24T14:25:28.994Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unlocking-the-secrets-of-future-technologies-with-david-holtzman</loc><lastmod>2026-03-24T14:25:28.953Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/keith-jones-journey-as-expert-digital-forensics-expert-to-ai-malware-researcher</loc><lastmod>2026-03-24T14:25:28.908Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-strong-teams-and-avoiding-toxic-leadership-with-peter-ramadan-ciso</loc><lastmod>2026-03-24T14:25:28.859Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/understanding-cyber-warfare-and-emerging-security-trends-with-jeremy-kirk-from-intel-471</loc><lastmod>2026-03-24T14:25:28.818Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-teenage-gamer-to-saas-security-guru-the-untold-journey-of-a-cybersecurity-pro-aaron-costello</loc><lastmod>2026-03-24T14:25:28.768Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/security-data-strategy-lessons-from-the-equifax-breach-with-justin-borland-and-aqsa-taylor</loc><lastmod>2026-03-24T14:25:28.722Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ai-security-secrets-unveiled-nsa-tech-zero-trust-2025-cyber-trends-with-jason-rogers-from-invary</loc><lastmod>2026-03-24T14:25:28.669Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-tech-geek-to-c-suite-secrets-to-winning-over-executives</loc><lastmod>2026-03-24T14:25:28.626Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/what-special-forces-and-cisos-have-in-common-adaptability-under-pressure</loc><lastmod>2026-03-24T14:25:28.578Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/mastering-cyber-risk-matthew-alderman-on-cybersecurity-leadership-building-cybersaint</loc><lastmod>2026-03-24T14:25:28.529Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/browser-security-unveiled-john-carse-on-squarex-cyber-career-insights</loc><lastmod>2026-03-24T14:25:28.479Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/patching-the-unpatchable</loc><lastmod>2025-11-03T06:11:10.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/reputation-is-everything-how-ai-and-domain-security-shape-todays-threat-landscape</loc><lastmod>2026-03-24T14:25:28.425Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-shocking-truth-about-ai-security-in-hospitals</loc><lastmod>2026-03-24T14:25:28.385Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/can-your-messaging-survive-the-quantum-computing-threat</loc><lastmod>2026-03-24T14:25:28.343Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/inside-the-mind-of-a-cia-agent-nuclear-threats-and-intelligence-operations</loc><lastmod>2025-11-03T06:11:10.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/ric-prado-cia-black-ops-operator-that-hunted-bin-laden</loc><lastmod>2026-03-24T14:25:28.300Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-human-element-still-matters-in-a-quantum-ai-world</loc><lastmod>2026-03-24T14:25:28.255Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/zero-trust-architecture-the-future-of-cybersecurity</loc><lastmod>2026-03-24T14:25:28.211Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/finding-zero-days-in-salesforce-industry-clouds</loc><lastmod>2025-11-03T06:11:10.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-russia-with-code-a-malware-analysts-journey</loc><lastmod>2026-03-24T14:25:28.169Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/finding-your-niche-how-specialization-drives-success-in-a-crowded-market</loc><lastmod>2026-03-24T14:25:28.126Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/navigating-the-ai-driven-job-market</loc><lastmod>2026-03-24T14:25:28.083Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/breaking-the-sky-how-vulnerable-are-our-satellites</loc><lastmod>2025-11-03T06:11:10.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-future-of-ai-security-ethics-and-human-augmentation</loc><lastmod>2025-11-03T06:11:10.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/hack-your-way-to-achievement-one-small-step-at-a-time</loc><lastmod>2026-03-24T14:25:28.039Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/cloud-ai-and-the-future-of-identity-access-management</loc><lastmod>2026-03-24T14:25:27.986Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/your-ai-is-not-as-secure-as-you-think-it-is-and-heres-why</loc><lastmod>2026-03-24T14:25:27.946Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-apples-inside-to-a-new-kind-of-phone-privacy-free-speech-and-building-a-third-platform</loc><lastmod>2026-03-24T14:25:27.906Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/top-sap-security-threat-hunting-strategies-used-by-elite-researchers</loc><lastmod>2026-03-24T14:25:27.862Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/what-if-ai-took-over-your-data-security-tomorrow</loc><lastmod>2026-03-24T14:25:27.821Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/inside-offensive-ai-from-mcp-servers-to-real-security-risks</loc><lastmod>2026-03-24T14:25:27.779Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-future-hides-in-plain-sight-will-we-see-it-in-time</loc><lastmod>2026-03-24T14:25:27.739Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-future-of-device-authentication-is-here-now</loc><lastmod>2026-03-24T14:25:27.698Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/inside-the-global-push-for-offensive-cyber-and-smarter-defense</loc><lastmod>2026-03-24T14:25:27.658Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/from-sewers-to-subsea-rethinking-data-centers-and-defense</loc><lastmod>2026-03-24T14:25:27.616Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/unlocking-data-protection-vishnu-varma-on-cybersecurity-challenges</loc><lastmod>2026-03-24T14:25:27.573Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/power-without-stealth-should-america-flex-in-cyberspace-or-starve-cartels-online</loc><lastmod>2026-03-24T14:25:27.528Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/master-the-fundamentals-then-change-the-system</loc><lastmod>2026-03-24T14:25:27.486Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/your-next-hire-might-be-a-deepfake-with-brian-long-ceo-of-adaptive-security</loc><lastmod>2026-03-24T14:25:27.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-grind-and-growth-a-podcasters-journey-with-jack-rhysider-from-darknet-diaries</loc><lastmod>2026-03-24T14:25:27.396Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/building-safer-online-habits-without-becoming-paranoid</loc><lastmod>2026-03-24T14:25:27.351Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/agentic-robots-are-here-and-your-security-strategy-is-broken-with-ben-wilcox</loc><lastmod>2026-03-24T14:25:27.309Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-role-of-lawyers-in-cybersecurity-arent-what-you-think-heres-why-it-matters</loc><lastmod>2026-03-24T14:25:27.261Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/hackers-cracked-ai-security-heres-how-they-did-it</loc><lastmod>2026-03-24T14:25:27.210Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-great-cyber-power-struggle-russia-china-iran-and-the-coming-digital-chaos</loc><lastmod>2026-03-24T14:25:27.156Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/episode/the-author-of-code-war-allie-mellen-reveals-how-geo-politics-cyberwar-collide</loc><lastmod>2026-03-24T14:25:27.103Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/channel/security-unfiltered-podcast</loc><priority>0.7</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-episode2-experience-vs-certifications-vs-degrees</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-episode1-young-talent-vs-proven-experience</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-episode-3-cloud-security-governance</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-episode4-leadership</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-episode5-isc2-certifications</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-ep6-leaving-your-company</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-ep7-microsoft-exchange-vulnerabilities-patch-management</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-ep9-soc-analyst</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/lets-talk-its-been-a-while</loc><lastmod>2025-07-31T08:00:12.116Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-podcast-live-stream</loc><lastmod>2024-01-11T21:30:31.238Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-battle-burnout</loc><lastmod>2025-10-02T13:30:27.960Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/reverse-engineering-notpetya</loc><lastmod>2025-10-02T13:30:27.929Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sponsorship-protecting-your-money</loc><lastmod>2025-10-02T13:30:27.898Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-passkeys-are-the-future</loc><lastmod>2025-10-02T13:30:27.866Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/building-a-bomb-proof-network-part-2</loc><lastmod>2025-10-02T13:30:27.837Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/becoming-an-entrepreneur-to-change-the-world</loc><lastmod>2025-10-02T13:30:27.807Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unraveling-cloud-iam-one-role-at-a-time</loc><lastmod>2025-10-02T13:30:27.776Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-newbie-to-pro-making-the-most-of-security-conferences</loc><lastmod>2025-10-02T13:30:27.745Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/injecting-the-art-of-espionage-into-novels</loc><lastmod>2025-10-02T13:30:27.713Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-hacking-to-cyber-warfare-inside-the-world-of-an-intelligence-expert-with-mike-jones</loc><lastmod>2025-10-02T13:30:27.676Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-wisdom-balancing-work-life-and-learning</loc><lastmod>2025-10-02T13:30:27.635Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-art-of-selecting-and-owning-your-security-projects</loc><lastmod>2025-10-02T13:30:27.605Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bridging-worlds-from-ms-dos-gaming-to-cybersecurity-innovations</loc><lastmod>2025-10-02T13:30:27.575Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embracing-curiosity-a-journey-into-it-security-and-continuous-learning</loc><lastmod>2025-10-02T13:30:27.543Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/steves-inspiring-shift-from-med-school-to-cybersecurity</loc><lastmod>2025-10-02T13:30:27.512Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-into-cybersecurity-from-er-tech-to-it-expert-exploring-the-zero-trust-framework</loc><lastmod>2025-10-02T13:30:27.481Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-the-evolution-of-application-security-with-moti-gindi-from-apiiro</loc><lastmod>2025-10-02T13:30:27.450Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/behind-the-scenes-prepping-for-the-cissp-exam-twice</loc><lastmod>2025-10-02T13:30:27.421Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-opera-to-it-a-tale-of-resilience-and-innovation-with-security-engineer-akira-brand</loc><lastmod>2025-10-02T13:30:27.390Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-journey-of-a-linguist-turned-it-and-security-professional-with-jeremy-snyder</loc><lastmod>2025-10-02T13:30:27.359Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-excitement-of-defcon-an-insiders-guide-to-the-worlds-largest-security-conference</loc><lastmod>2025-10-02T13:30:27.326Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-evolution-of-ransomware-and-its-impact-on-data-security-with-rubrik-zscaler</loc><lastmod>2025-10-02T13:30:27.294Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/immersing-in-defcon-and-navigating-cissp-exam-prep-a-journey-towards-personal-development-in-tech</loc><lastmod>2025-10-02T13:30:27.264Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-the-versatility-of-cybersecurity-with-sans-instructor-jason-ostrom</loc><lastmod>2025-10-02T13:30:27.232Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-the-intricacies-of-cybersecurity-with-expert-aviv-grafi</loc><lastmod>2025-10-02T13:30:27.200Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-evolution-and-consequences-in-cybersecurity-management</loc><lastmod>2025-10-02T13:30:27.167Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-geology-to-cybersecurity-mikes-unexpected-journey</loc><lastmod>2025-10-02T13:30:27.135Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/in-the-mind-of-a-mercenary-a-dive-into-cyber-warfare</loc><lastmod>2025-10-02T13:30:27.105Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/turning-small-steps-into-big-dreams</loc><lastmod>2025-10-02T13:30:27.071Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/an-israel-colonels-insight-into-cybersecurity-challenges</loc><lastmod>2025-10-02T13:30:27.038Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-internal-politics-and-personal-security-insights-and-advice</loc><lastmod>2025-10-02T13:30:27.003Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/turning-hurdles-into-success-ganeshs-tale-of-persistence-and-innovation</loc><lastmod>2025-10-02T13:30:26.972Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/addressing-betrayal-and-building-trust-in-the-workplace</loc><lastmod>2025-10-02T13:30:26.940Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unraveling-network-security-in-a-multi-cloud-world-with-the-founder-of-snort</loc><lastmod>2025-10-02T13:30:26.909Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/microsoft-security-researcher-a-tale-of-one-womans-resilience-and-ambition</loc><lastmod>2025-10-02T13:30:26.875Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-from-pre-sales-to-identity-fraud-a-conversation-with-nir-stern</loc><lastmod>2025-10-02T13:30:26.843Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/taking-a-tech-memory-lane-walk-with-trey-guinn-from-cloudflare</loc><lastmod>2025-10-02T13:30:26.811Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/curiosity-is-key-for-cyber-security</loc><lastmod>2025-10-02T13:30:26.778Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/living-life-to-the-fullest-while-traveling-the-world</loc><lastmod>2025-10-02T13:30:26.745Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/overcoming-security-engineering-struggles</loc><lastmod>2025-10-02T13:30:26.714Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/distributed-defenses-to-defeat-ddos-attacks</loc><lastmod>2025-10-02T13:30:26.682Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-engineer-for-the-solution</loc><lastmod>2025-10-02T13:30:26.649Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-nsa-security-to-startup-founder-a-cybersecurity-journey</loc><lastmod>2025-10-02T13:30:26.618Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/changing-behavior-in-security</loc><lastmod>2025-10-02T13:30:26.584Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-beginning-of-trackd</loc><lastmod>2025-10-02T13:30:26.553Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/crowd-sourcing-vulnerability-management-podcast-cloudsecurity-cybersecurity-shortsvideo</loc><lastmod>2025-10-02T13:30:26.523Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/reimagining-career-growth-the-moonlighting-approach</loc><lastmod>2025-10-02T13:30:26.495Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-collision-of-ai-and-email-security-a-conversation-with-mick-leach-of-abnormal-security</loc><lastmod>2025-10-02T13:30:26.464Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/blending-ai-with-email-security</loc><lastmod>2025-10-02T13:30:26.433Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-engineering-payroll-admins</loc><lastmod>2025-10-02T13:30:26.402Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/importance-of-collaboration-in-security</loc><lastmod>2025-10-02T13:30:26.371Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/insights-into-security-research-and-internet-mapping</loc><lastmod>2025-10-02T13:30:26.336Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-emergence-of-cyber-warfare-shortsvideo-cybersecurity-podcast</loc><lastmod>2025-10-02T13:30:26.305Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/paranoia-in-security-shortsvideo-podcast-cybersecurity</loc><lastmod>2025-10-02T13:30:26.275Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-role-of-the-it-army-of-ukraine</loc><lastmod>2025-10-02T13:30:26.245Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/defending-nations-against-nation-state-attacks</loc><lastmod>2025-10-02T13:30:26.213Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/overcoming-imposter-syndrome</loc><lastmod>2025-10-02T13:30:26.181Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/a-deep-dive-into-iam-and-cloud-security</loc><lastmod>2025-10-02T13:30:26.149Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iam-is-the-new-perimeter-in-the-cloud</loc><lastmod>2025-10-02T13:30:26.117Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/a-cultural-fit-over-having-the-skills-because</loc><lastmod>2025-10-02T13:30:26.086Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-cloud-security-shortvideo-shorts-podcast-skills-career</loc><lastmod>2025-10-02T13:30:26.054Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/untangling-the-spiderweb-of-cloud-iam</loc><lastmod>2025-10-02T13:30:26.022Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/role-explosion-in-the-cloud</loc><lastmod>2025-10-02T13:30:25.989Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bracing-for-the-future-of-tech-with-fastlys-next-gen-waf</loc><lastmod>2025-10-02T13:30:25.956Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-windows-vs-linux-challenge-solving-server-errors-made-easier</loc><lastmod>2025-10-02T13:30:25.925Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-backdoor-discovery-exposes-major-security-vulnerability</loc><lastmod>2025-10-02T13:30:25.894Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/escaping-alert-fatigue-finding-relief-in-managing-cyber-threats</loc><lastmod>2025-10-02T13:30:25.863Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-intersection-of-ai-and-cybersecurity-insights-from-rhymetecs-cto-metin</loc><lastmod>2025-10-02T13:30:25.831Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-the-power-of-linux-from-zero-to-cyber-security</loc><lastmod>2025-10-02T13:30:25.799Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-your-passion-for-technology-the-key-to-success-in-security</loc><lastmod>2025-10-02T13:30:25.766Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-computing-hacking-and-other-it-adventures-with-experts-duane-and-patrick</loc><lastmod>2025-10-02T13:30:25.733Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stand-out-as-a-cybersecurity-expert-with-certifications</loc><lastmod>2025-10-02T13:30:25.701Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unstoppable-cyber-attackers-vs-fearless-company-a-thrilling-security-battle</loc><lastmod>2025-10-02T13:30:25.671Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-obscure-solutions-to-protect-the-organization</loc><lastmod>2025-10-02T13:30:25.638Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unplugging-from-remote-work-maintaining-balance-and-battling-workaholism</loc><lastmod>2025-10-02T13:30:25.607Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-the-future-quantum-cybersecurity-and-ai-dominate-tomorrows-fields</loc><lastmod>2025-10-02T13:30:25.575Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-evolving-tech-stay-relevant-with-container-skills</loc><lastmod>2025-10-02T13:30:25.543Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exposed-companys-ignorance-towards-critical-vulnerabilities-raises-eyebrows</loc><lastmod>2025-10-02T13:30:25.512Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-mind-boggling-dilemma-of-managing-thousands-of-waf-rules</loc><lastmod>2025-10-02T13:30:25.481Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/uncover-the-inspiring-journey-into-it-and-security-careers</loc><lastmod>2025-10-02T13:30:25.451Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-next-gen-website-protection-exploring-the-power-of-fastlys-waf</loc><lastmod>2025-10-02T13:30:25.420Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/a-year-in-review</loc><lastmod>2024-01-11T21:30:31.238Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/a-year-in-review-uuxj</loc><lastmod>2025-10-02T13:30:25.389Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/preparing-for-2024-5-attacks-targeting-you-this-year</loc><lastmod>2025-10-02T13:30:25.358Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/qr-codes-the-hidden-threats-you-need-to-know</loc><lastmod>2025-10-02T13:30:25.328Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/preparing-for-2024-5-attacks-targeting-you-this-year-e60k</loc><lastmod>2025-10-02T13:30:25.296Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/beware-of-cyber-scammers-how-they-lure-you-into-conversation</loc><lastmod>2025-10-02T13:30:25.266Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/beware-of-impersonation-scams-my-wifes-close-call-with-usaa</loc><lastmod>2025-10-02T13:30:25.234Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-the-power-of-ai-identifying-and-stopping-unusual-online-activity</loc><lastmod>2025-10-02T13:30:25.203Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-ai-and-cyber-resilience-with-matthew-gorge</loc><lastmod>2025-10-02T13:30:25.171Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-success-being-prepared-for-opportunities-luck-or-skill</loc><lastmod>2025-10-02T13:30:25.140Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-through-networking-job-barriers-my-unconventional-path-to-success</loc><lastmod>2025-10-02T13:30:25.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cracking-the-security-job-conundrum-how-to-stand-out-and-command-higher-salaries</loc><lastmod>2025-10-02T13:30:25.073Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/maximizing-career-growth-the-value-of-certifications-and-your-income-potential</loc><lastmod>2025-10-02T13:30:25.038Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-rising-cost-of-cybersecurity-certifications-is-it-worth-it</loc><lastmod>2025-10-02T13:30:24.997Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-power-of-fundamentals-in-hiring-and-investing</loc><lastmod>2025-10-02T13:30:24.966Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/overcoming-job-rejection-rising-above-the-naysayers</loc><lastmod>2025-10-02T13:30:24.934Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-career-success-choosing-the-right-certification-for-you</loc><lastmod>2025-10-02T13:30:24.903Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-your-potential-as-a-security-analyst-skills-research-and-taking-initiative</loc><lastmod>2025-10-02T13:30:24.874Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-secret-to-a-successful-career-in-security-revealed</loc><lastmod>2025-10-02T13:30:24.842Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-evolution-of-it-and-cybersecurity-from-vax-pioneers-to-zero-trust-visionaries</loc><lastmod>2025-10-02T13:30:24.812Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleash-your-growth-mindset-balance-challenge-and-base-for-career-success</loc><lastmod>2025-10-02T13:30:24.780Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-power-of-programming-unlocking-opportunities-in-any-industry</loc><lastmod>2025-10-02T13:30:24.748Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-power-of-hacking-unleashing-the-unseen-world-of-possibilities</loc><lastmod>2025-10-02T13:30:24.715Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embracing-change-in-tech-from-the-ai-revolution-and-the-power-of-adaptability</loc><lastmod>2025-10-02T13:30:24.683Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-coding-challenges-to-cybersecurity-champion-varuns-story-of-innovation-and-leadership</loc><lastmod>2025-10-02T13:30:24.650Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-desktop-technician-to-networking-pro-navigating-certification-and-career-growth</loc><lastmod>2025-10-02T13:30:24.618Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/redefining-success-while-juggling-parenthood-and-career-shifts</loc><lastmod>2025-10-02T13:30:24.586Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/transforming-risk-analysis-through-machine-learning-with-russell</loc><lastmod>2024-02-05T15:00:05.238Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/transforming-risk-analysis-through-machine-learning-with-russell-bxm7</loc><lastmod>2025-10-02T13:30:24.556Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-intricacies-of-active-directory-in-the-era-of-cloud-computing</loc><lastmod>2025-10-02T13:30:24.524Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-making-of-a-cybersecurity-titan-and-the-rise-of-virtual-compliance</loc><lastmod>2025-10-02T13:30:24.490Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embrace-the-power-of-web-3-taking-control-of-your-online-universe</loc><lastmod>2025-10-02T13:30:24.456Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/charting-the-digital-frontier-with-a-fathers-insight</loc><lastmod>2025-10-02T13:30:24.426Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-ai-my-journey-from-animation-to-app-development</loc><lastmod>2025-10-02T13:30:24.395Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-neuro-adaptive-feedback-the-future-of-security</loc><lastmod>2025-10-02T13:30:24.363Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-neuro-adaptive-feedback-pt-2</loc><lastmod>2025-10-02T13:30:24.332Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/say-hello-to-the-future-create-stunning-videos-with-openais-soa-text-to-video-model</loc><lastmod>2025-10-02T13:30:24.296Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-potential-of-neural-networks-exploring-the-future-of-security</loc><lastmod>2025-10-02T13:30:24.261Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-the-internets-gen-x-era-impacts-ai-training-in-2024</loc><lastmod>2025-10-02T13:30:24.227Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-physics-to-platform-engineering-revolutionizing-devops-and-tackling-cloud-security</loc><lastmod>2025-10-02T13:30:24.189Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/maximize-efficiency-with-massdriver-simplify-infrastructure-as-code-in-one-place</loc><lastmod>2025-10-02T13:30:24.157Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ethical-tech-and-inclusivity-in-the-age-of-ai-with-jackie-mcguire-from-cribl</loc><lastmod>2025-10-02T13:30:24.126Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/seizing-it-opportunities-gerry-gebels-professional-saga</loc><lastmod>2025-10-02T13:30:24.093Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-secrets-of-effective-insider-threat-management-with-joe-payne-from-code42</loc><lastmod>2025-10-02T13:30:24.060Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/uber-vs-waymo-the-scandalous-self-driving-car-lawsuit-revealed-podcast-ai-uber-shorts-short</loc><lastmod>2025-10-02T13:30:24.027Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/educational-grit-and-quantum-communications-in-space-security</loc><lastmod>2025-10-02T13:30:23.994Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/outsmarting-cybercriminals-a-deep-dive-into-deepfakes-and-digital-defense-with-aaron-painter</loc><lastmod>2025-10-02T13:30:23.962Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bridging-the-gap-between-technical-expertise-and-business-acumen-with-shauli-rozen</loc><lastmod>2025-10-02T13:30:23.929Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ashley-burkes-resilience-in-the-world-of-fintech-and-cyber-risk</loc><lastmod>2025-10-02T13:30:23.897Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-trials-to-triumph-how-anyone-can-succeed-in-any-field</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/dealing-with-online-harassment-my-experience-and-tips-for-overcoming-it</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-discouragement-to-success-how-one-statement-ignited-my-ambition</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-women-in-cybersecurity-inspire-engage-and-succeed</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-i-overcame-doubt-and-achieved-success-in-it</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-your-potential-overcoming-labels-and-embracing-your-journey</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-your-unique-potential-embrace-fearlessness-and-achieve-success</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/inside-the-mind-of-a-cybersecurity-maestro-oliver-tavakolis-journey-from-mainframes-to-ai</loc><lastmod>2025-10-02T13:30:23.867Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unveiling-the-secrets-of-network-security-detecting-and-combating-attackers</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-cybersecurity-secrets-how-to-catch-attackers-early</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-evolution-of-ai-from-archaic-perception-to-modern-understanding</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-power-of-social-engineering-techniques-to-hack-human-behavior</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/protecting-your-online-identity-advanced-strategies-to-detect-and-prioritize-cyber-attacks</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/addressing-the-risks-of-ai-with-innovative-solutions-encrypting-communication</loc><lastmod>2025-10-02T13:30:23.836Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/scaling-down-for-trust-the-key-to-building-a-successful-tech-company</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/building-trust-and-security-in-the-digital-age-non-technical-perspective</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/maximizing-security-in-end-to-end-encrypted-environments</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/leverage-your-trusted-relationships-the-future-of-secure-information-sharing</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-the-internet-differentiating-humans-from-bots</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-challenges-of-depreciating-it-equipment-with-proper-data-destruction-rocco-damico</loc><lastmod>2025-10-02T13:30:23.806Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-transitioning-to-the-cloud-really-worth-it</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/amplify-your-skills-with-quantum-communication</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-constantly-reinventing-yourself-is-essential-in-cybersecurity</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/avoiding-costly-mistakes-in-it-lessons-learned-from-database-disasters</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/learn-the-art-of-troubleshooting-from-common-issues-to-robust-solutions</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/indu-keris-insights-on-balancing-security-and-innovation</loc><lastmod>2025-10-02T13:30:23.774Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-the-art-of-cybersecurity-how-to-navigate-the-unknown</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-it-the-right-career-for-you-inspiring-success-stories-to-help-you-decide</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-education-how-my-phd-transformed-my-life</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-success-exploring-the-role-and-responsibilities-of-a-modern-professional</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-ultimate-guide-to-aws-native-cloud-permissions-firewall</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-cloud-security-insights-and-innovations-with-sandy-bird</loc><lastmod>2025-10-02T13:30:23.745Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sonrai-securitys-cloud-permissions-firewall-discover-the-easy-way</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/first-ever-review-of-sonrai-security-cloud-permissions-firewall</loc><lastmod>2025-10-02T13:30:23.713Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/understanding-the-differences-between-aws-and-azure-identity-models</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/maximizing-data-security-a-proven-approval-process</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/transforming-your-mindset-for-lasting-success-personal-stories-and-strategies</loc><lastmod>2025-10-02T13:30:23.682Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-power-of-cloud-infrastructure-maximizing-security-and-efficiency</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-importance-of-aws-certification-unlocking-opportunities-and-advancement</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/5-essential-tips-for-secure-permissions-in-the-cloud</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-cloud-and-iam-best-practices-for-developers</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/safeguarding-the-future-of-ai-meets-cybersecurity-with-erick-galinkin</loc><lastmod>2025-10-02T13:30:23.649Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/decoding-malware-unveiling-the-secrets-and-origins-of-cyber-attacks</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-ai-can-impact-the-generalization-ability-of-gans</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-ai-microsoft-google-and-amazons-language-models</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-rise-of-transformer-based-architectures-exploring-explosive-growth-in-language-models</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/promoting-ai-security-best-practices-and-risk-management-strategies</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-coding-assistants-can-be-used-to-write-malicious-code</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-encryption-and-digital-safety-with-ameesh-divatia</loc><lastmod>2025-10-02T13:30:23.619Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlimited-budget-people-the-security-war-against-nation-state-actors-with-ameesh-divatia</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-building-a-community-can-help-you-succeed-learn-from-others-success-stories</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-power-of-amazon-how-aws-transformed-the-world</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/protect-your-data-the-power-of-column-and-row-level-encryption</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-your-potential-mastering-the-art-of-selling-and-self-promotion</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/challenge-yourself-and-break-out-of-your-comfort-zone</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-rapid-evolution-of-mobile-apps-from-2007-to-today</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/protecting-small-businesses-in-the-digital-age-with-chris-petersen-from-radicl</loc><lastmod>2025-10-02T13:30:23.589Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-battle-between-good-and-evil-cybersecurity-strategies-for-protecting-your-business</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-the-future-of-cyber-defense</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/advanced-strategies-protecting-against-cyber-threats-in-2021</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/uncovering-stealthy-threat-actors-the-blending-technique-explained</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-in-2025-the-future-of-cybersecurity-and-attack-vectors</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-small-businesses-can-protect-themselves-without-crowdstrike-or-splunk</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-mathematics-to-cybersecurity-fayon-atkinsons-unexpected-career-journey</loc><lastmod>2025-10-02T13:30:23.560Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/grant-borzikas-unconventional-journey-to-ciso-of-cloudflare</loc><lastmod>2025-10-02T13:30:23.530Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-hacked-teen-to-cybersecurity-pro-ron-eddings-journey-to-the-nsa-hacker-valley-studios</loc><lastmod>2025-10-02T13:30:23.487Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/powerful-hacker-success-stories-unbelievable</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/become-a-hacker-without-a-degree-master-computer-networking-with-linux</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-intern-to-nsa-contractor-at-19-ron-eddings-unbelievable-journey</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-intern-to-nsa-contractor-at-19-ron-eddings-unbelievable-journey-zd71</loc><lastmod>2024-07-10T14:30:05.515Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-down-the-black-box-android-vs-iphone-os-architecture</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-empathy-can-drive-effective-advocacy-in-customer-service</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/you-wont-believe-what-happened-to-my-computer-find-out-how-to-stop-it</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/discover-the-secret-art-of-success-unleash-your-full-potential</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-your-career-success-with-formal-education</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-ai-breakthroughs-the-future-is-here</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/discover-the-unstoppable-power-of-our-global-vpn-network</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/discover-the-ultimate-secrets-of-efficient-learning-must-watch-tips-and-tricks</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/discover-the-secret-to-cloudflares-innovation-free-resource-to-enhance-your-online-security</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-journey-into-the-world-of-it-you-wont-believe-what-i-discovered</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-job-stories-you-wont-believe-what-happened</loc><lastmod>2025-10-02T13:30:23.457Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-red-team-founder-jeff-man</loc><lastmod>2025-10-02T13:30:23.424Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/jaw-dropping-secrets-unveiled-by-nsa-insider</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/revealing-the-untold-secrets-of-americas-spy-agency-2ve2</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/revealing-the-untold-secrets-of-americas-spy-agency</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-we-overcome-tricky-challenges-to-access-classified-systems</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-secrets-of-nsa-compartmentalization-revealed</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-software-creations-you-wont-believe-whats-inside</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-certifications-to-experience-unlocking-success-in-your-career-journey</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-your-potential-in-it-and-security</loc><lastmod>2025-10-02T13:30:23.385Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-discoveries-uncover-the-secrets</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-journey-from-nsa-engineer-to-elite-ethical-hacker</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mathematicians-dream-unbelievable-math-hacks-that-will-blow-your-mind</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/4-surprising-facts-about-cyber-command-you-wont-believe-what-they-do</loc><lastmod>2025-10-02T13:30:23.346Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-story-of-the-legendary-red-team-that-shaped-us-cyber-command</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/no-more-insecurity-crack-the-code-and-discover-the-ultimate-secure-communication-system</loc><lastmod>2025-10-02T13:30:08.444Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ultimate-tech-hacks-discover-the-dark-side-of-the-internet</loc><lastmod>2025-07-22T16:00:11.730Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/balancing-tech-and-soft-skills-in-modern-cybersecurity-with-rui-ribeiro</loc><lastmod>2025-10-02T13:30:23.310Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/wow-mind-blowing-secret-to-recognizing-and-rewarding-amazing-work</loc><lastmod>2025-10-02T13:30:23.267Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-soft-skills-unlocking-success-in-challenging-roles</loc><lastmod>2025-10-02T13:30:23.228Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-fastly-waf-deployment-unbelievably-easy-and-effective</loc><lastmod>2025-10-02T13:30:23.189Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/10-bizarre-hacks-you-wont-believe-actually-work</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbelievable-the-shocking-truth-about-def-con-revealed-you-wont-believe-it</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/insurance-premiums-tripled-how-crowdstrike-is-shaking-up-the-industry</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-the-secrets-of-business-and-security-communication</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-stuff-con-the-mindset-we-need-to-change</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-encounter-with-cloudflare-ceo-the-untold-story</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-and-the-future-of-it-explored-with-michael-goldstein</loc><lastmod>2025-10-02T13:30:23.149Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-unexpected-fans-changed-my-podcast-journey</loc><lastmod>2025-10-02T13:30:23.107Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-awareness-is-your-best-defense</loc><lastmod>2025-10-02T13:30:23.075Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/michaels-inspiring-it-journey-from-passion-to-security-expert</loc><lastmod>2025-10-02T13:30:23.030Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-future-ai-and-strategic-partnerships-revealed</loc><lastmod>2025-10-02T13:30:22.997Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/fighting-misinformation-in-the-divided-landscape-of-election-2024</loc><lastmod>2025-10-02T13:30:22.956Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-ais-impact-a-tech-professionals-journey</loc><lastmod>2025-10-02T13:30:22.914Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-revelation-did-it-really-happen</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exploring-the-future-of-ai-good-vs-evil</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stay-alert-why-you-must-verify-information-now</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-secret-of-security-professionals-versatility</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-tactics-in-american-elections-revealed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/eye-opening-insights-misinformation-during-vacation</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/lessons-in-privacy-from-across-the-atlantic-with-richard-hollis</loc><lastmod>2025-10-02T13:30:22.876Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-secrets-revealed-europe-vs-america</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-privacy-crisis-why-were-at-risk</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/jaw-dropping-insights-on-ai-culture-dont-miss</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/astonishing-privacy-differences-europe-vs-america</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-ownership-what-your-dna-says-about-you</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/empowering-data-privacy-lessons-from-gdpr</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-podcast-live-stream-2j1d</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-cyber-threat-landscape-with-chris-hale</loc><lastmod>2025-10-02T13:30:22.837Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-crowdstrike-making-waves-in-mac-security</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-do-you-do-when-you-want-to-give-up-podcast-shortsfeed-cybersecurity</loc><lastmod>2025-10-02T13:30:22.804Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-ransomware-attack-how-we-fought-back</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/you-dont-have-to-be-the-ceo-to-win-podcast</loc><lastmod>2025-10-02T13:30:22.769Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/crazy-cybersecurity-tales-from-viruses-to-ransomware</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-red-team-founder-jeff-man-anzj</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-cloud-security-threat-landscape</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-event-ignited-your-passion-for-cybersecurity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/innovative-approaches-to-safeguarding-information-with-matt-howard</loc><lastmod>2025-10-02T13:30:22.735Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/your-data-is-cashing-in-on-you</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/creator-of-pegasus-malware-unplugged-phone-eran-karpen</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-ownership-revolution-claim-whats-yours</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/incredible-journey-into-it-and-cybersecurity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-does-virtue-transform-gmail-security</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-truths-about-identity-data-access</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-boeing-to-google-jake-moshenkos-journey-with-cutting-edge-security-at-authzed</loc><lastmod>2025-10-02T13:30:22.699Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-intelligence-analyst-to-cybersecurity-scott-smalls-journey-and-insights-on-geopolitics</loc><lastmod>2025-10-02T13:30:22.663Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/misinformation-the-misguided-chatgpt-encounter</loc><lastmod>2025-10-02T13:30:22.627Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/who-controls-fact-checkers-the-shocking-truth</loc><lastmod>2025-10-02T13:30:22.590Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/eye-opening-insights-on-ai-cybersecurity-threats</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-truth-about-fact-checkers-revealed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-secrets-behind-election-manipulation-revealed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-use-ai-to-secure-your-environment-with-dorota-wrobel</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-truth-about-election-propaganda-revealed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/revolutionary-security-strategies-validate-your-protection</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/building-resilient-cyber-defenses-with-richard-cassidy</loc><lastmod>2025-10-02T13:30:22.550Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-toner-to-cybersecurity-my-epic-tech-journey</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-atari-to-cybersecurity-my-tech-evolution</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/brace-for-impact-strategies-for-cyber-resilience</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-exploring-careers-the-key-to-success</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/heart-wrenching-insight-into-chicagos-childrens-hospital</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/heartbreak-at-childrens-hospital-a-parents-view</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/revolutionary-data-protection-tools-you-cant-ignore</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/master-cybersecurity-secrets-for-ultimate-protection</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-mining-exposed-how-cybercriminals-build-your-profile</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/heartbreaking-ransomware-attack-on-childrens-hospital</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-truth-medical-data-bio-warfare-risks</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-psychology-shape-a-career-in-cybersecurity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-soft-skills-work-life-balance-and-community-connections-with-tyler-robinson</loc><lastmod>2025-10-02T13:30:22.515Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-dark-side-of-overworking-why-80-hours-kills-creativity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-the-art-of-business-in-security</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-job-rejection-creator-of-kubernetes-turned-away</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-curiosity-shape-our-it-journey</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-ai-revolutionizing-job-roles-for-efficiency</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-phone-phreaking-shape-our-early-tech-journey</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-cipher-wheels-to-modern-data-security-with-jeff-man-pt-2</loc><lastmod>2025-10-02T13:30:22.470Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-nsa-innovate-for-cryptography</loc><lastmod>2025-10-02T13:30:22.431Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-top-secret-protocols-insights-from-the-nsa</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/eye-opening-secrets-of-ethical-hacking-revealed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-nsa-operations-transform-during-desert-storm</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-maze-of-nsa-authorization</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-did-we-respond-to-the-first-govt-website-hack</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-does-nsa-intercept-signals</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-building-the-worlds-most-powerful-malware-to-building-the-worlds-most-secure-phone</loc><lastmod>2025-10-02T13:30:22.390Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-is-android-security-easier-to-hack-than-iphone</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-is-android-security-easier-to-hack-than-iphone-jglr</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-data-dilemmas-google-apple-and-your-privacy</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-does-data-selling-affect-device-prices</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-vs-android-the-battle-of-device-security</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/inside-the-mind-of-a-navy-cyber-warrior</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apple-vs-google-shocking-hacking-secrets-exposed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embracing-the-suck-lessons-from-nasa-in-cybersecurity</loc><lastmod>2025-10-02T13:30:22.336Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embrace-regret-why-you-should-take-the-leap</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/epic-career-lessons-how-mistakes-can-propel-you</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embrace-peace-balancing-work-and-family-life</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chasing-opportunities-the-power-of-bold-decisions</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-insights-on-cyber-losses-what-you-should-know</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/balancing-speed-and-security-in-the-tech-world-with-idan-plotnik-ceo-of-apiiro</loc><lastmod>2025-10-02T13:30:22.295Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-military-emergency-response-to-cyber-security-guru-brad-laporte</loc><lastmod>2025-10-02T13:30:22.258Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-ex-police-find-purpose-in-cybersecurity-careers</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/are-we-ready-for-the-next-cyber-armageddon</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/epic-ai-showdown-battle-for-cybersecurity-dominance</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/transform-your-career-diving-into-cybersecurity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-security-compliance-breaking-the-bank-for-companies</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleashing-ai-the-new-gold-rush-in-security-and-careers</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-cyber-resilience-reduce-your-blast-radius-now</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-engineering-to-marketing-unconventional-career-paths-and-power-of-soft-skills-with-anne-baker</loc><lastmod>2025-10-02T13:30:22.209Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-lifes-juggling-act-balancing-business-family-and-ai-with-colby-derodeff</loc><lastmod>2025-10-02T13:30:22.165Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/netflixs-shocking-streaming-crisis-will-they-survive</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-data-efficiency-in-cybersecurity</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mind-blowing-strategies-for-disaster-recovery</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/revolutionary-ai-the-future-of-search-engines</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/shocking-failures-why-most-startups-dont-succeed</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/epic-insights-on-balancing-work-and-entrepreneurship</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-mossad-officer-to-unit-8200-hacker-beyond-with-daniel-schechter-leader-in-appsecurity</loc><lastmod>2025-10-02T13:30:22.128Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/balancing-business-and-well-being-nathan-whittacres-journey-from-it-to-ironman</loc><lastmod>2025-10-02T13:30:22.085Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/2024-wrap-up-ec0o</loc><lastmod>2025-10-02T13:30:22.050Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/2024-wrap-up</loc><lastmod>2025-10-02T13:30:08.443Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-use-ai-to-secure-your-environment-with-dorota-wrobel-tal8</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-the-secrets-of-future-technologies-with-david-holtzman</loc><lastmod>2025-10-02T13:30:22.016Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/web3-decentralization-is-the-future-of-security</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/tiktok-spies-on-you-and-everyone-else</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-media-are-you-the-product</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-hacking-zero-days-future-cybersecurity</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unbreakable-ai-deflecting-viruses-with-post-quantum-tech</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/using-ai-to-detect-advanced-malware-with-keith-jones</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/keith-jones-journey-as-expert-digital-forensics-expert-to-ai-malware-researcher</loc><lastmod>2025-10-02T13:30:21.970Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-hacking-chatgpt-to-improve-my-prompts</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/remote-work-family-first-my-job-decision</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/this-ai-is-insane-see-how-it-thinks</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/phd-dad-balancing-family-studies</loc><lastmod>2025-10-02T13:30:08.442Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-phd-to-malware-expert-my-career-switch</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-stealing-your-data-experts-reveal-shocking-truth</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/murder-case-made-me-get-a-phd</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/building-strong-teams-and-avoiding-toxic-leadership-with-peter-ramadan-ciso</loc><lastmod>2025-10-02T13:30:21.929Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/going-from-security-engineer-to-ciso-peter-ramadan</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/8-ways-to-be-a-better-leader</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-risks-how-to-explain-to-your-board</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-security-journalism-with-jeremy-kirk-from-intel-471</loc><lastmod>2025-10-02T13:30:21.891Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-my-team-keeps-quitting-burnout-crisis</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-tech-vs-leadership</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-45k-to-cybersecurity-leader-my-journey</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-coder-to-manager-top-skills-to-level-up</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/understanding-cyber-warfare-and-emerging-security-trends-with-jeremy-kirk-from-intel-471</loc><lastmod>2025-10-02T13:30:21.846Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-from-tech-support-to-leadership</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-deepfakes-the-future-of-social-engineering</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-journalism-to-cybersecurity-my-career-change</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/rogue-cyber-warfare-officer-unstoppable</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-vs-ransomware-cybersecuritys-next-frontier</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-vs-ransomware-cybersecuritys-new-weapon</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/i-hacked-a-phone-then-their-laptopgame-over</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/intel-471-threat-intel-analysts-life</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/securing-saas-apps-like-a-pro-with-aaron-costello</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-teenage-gamer-to-saas-security-guru-the-untold-journey-of-a-cybersecurity-pro-aaron-costello</loc><lastmod>2025-10-02T13:30:21.798Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-security-whose-responsibility-is-it</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-help-desk-to-security-expert-my-perseverance-story</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-jason-rogers-from-invary</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/i-hacked-saas-finding-risky-configurations</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/live-stream-with-ricoh-danielson</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/salesforce-data-exposure-my-viral-research</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-zero-to-cybersecurity-expert-my-journey</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-data-strategy-with-aqsa-taylor-justin-borland-from-abstract-security</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/redefining-risk-with-matt-alderman-from-security-weeklys-business-security-weekly</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-security-the-shared-responsibility-model-explained</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacked-gamer-becomes-cybersecurity-expert</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-data-strategy-lessons-from-the-equifax-breach-with-justin-borland-and-aqsa-taylor</loc><lastmod>2025-10-02T13:30:21.746Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/becoming-a-ciso-with-john-carse-zjtj</loc><lastmod>2025-03-25T09:00:20.220Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/becoming-a-ciso-with-john-carse</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/first-hand-account-of-the-equifax-breach</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/equifax-hack-we-got-a-blank-check-for-security</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-quantum-physics-to-cloud-security</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-encryption-easier-than-you-think</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/rethink-data-architecture-challenges-solutions</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-warfare-outsmarting-hackers</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/self-defending-systems-autonomic-security-explained</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-secrets-unveiled-nsa-tech-zero-trust-2025-cyber-trends-with-jason-rogers-from-invary</loc><lastmod>2025-10-02T13:30:21.699Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-lags-behind-are-you-protecting-your-data</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-tech-geek-to-c-suite-secrets-to-winning-over-executives</loc><lastmod>2025-10-02T13:30:21.659Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-executive-e-learning-series-launch-with-peter-ramadan</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellite-security-phd-unveiling-zero-trust-quantum-encryption-secrets</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ace-executive-briefings-security-pros-guide-to-ciso-communication</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellite-security-zero-trust-the-ai-revolution-you-dont-know</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ciso-secrets-ace-executive-briefings-lead-cybersecurity-like-a-pro</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cisos-ai-nightmare-security-pros-drowning-in-innovation-overload</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ace-executive-comms-cisos-secret-weapon-for-presentations</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-fatigue-know-your-facts-fast-respond-quicker</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-leaders-earn-trust-fast-or-face-the-breach-executive-comms</loc><lastmod>2025-10-02T13:30:08.441Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-special-forces-and-cisos-have-in-common-adaptability-under-pressure</loc><lastmod>2025-10-02T13:30:21.608Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-dream-from-zero-to-hero-facing-rejection-never-giving-up</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ransomware-exposed-cyber-hygiene-is-your-only-shield</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-special-forces-the-mental-toughness-you-need</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/dont-fire-your-ciso-during-a-crisis-heres-why</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-soldier-to-specialist-how-military-shaped-my-career</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nation-state-hackers-unmasking-their-advanced-tactics-forensic-challenges</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-military-to-ciso-my-cybersecurity-career-acceleration-story</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/need-help-build-your-mentor-network-pay-it-forward</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/legacy-grc-platforms-fail-at-cyber-risk-governance-vs-reality</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-cyber-risk-matthew-alderman-on-cybersecurity-leadership-building-cybersaint</loc><lastmod>2025-10-02T13:30:21.557Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-vs-ai-the-2-million-dilemma-every-ciso-faces</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cisos-want-a-board-seat-run-a-business-first-heres-why</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-cloud-security-secrets-knowledge-that-sets-you-free</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-insurance-vs-security-qualys-ceo-gets-grilled-ciso-future</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/risk-scores-are-meaningless-leaving-cyber-risk-alliance-for-human-security</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/browser-security-unveiled-john-carse-on-squarex-cyber-career-insights</loc><lastmod>2025-10-02T13:30:21.510Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apple-troubleshooting-flashbacks-how-it-shaped-my-cyber-career</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-anxiety-to-acing-it-my-unexpected-customer-service-glow-up</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/polymorphic-extension-attack-hackers-steal-your-passwords-without-you-knowing</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/new-to-it-unlock-networking-system-skills-for-success</loc><lastmod>2025-10-02T13:30:21.463Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/browser-security-alert-update-now-before-its-too-late</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/it-skills-the-secret-weapon-for-crushing-cybersecurity</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-pros-mastering-the-enterprise-it-maze-windows-linux-beyond</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-brokers-they-dont-hack-they-buy-your-info</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/android-vs-ios-the-shocking-truth-about-mobile-security</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/idf-how-mandatory-service-fuels-israels-startup-nation-success</loc><lastmod>2025-10-02T13:30:21.433Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apple-vs-google-who-wins-mobile-security</loc><lastmod>2025-10-02T13:30:21.397Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/idf-cybersecurity-secrets-revealed-top-talent-in-israeli-military</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/my-journey-from-military-intelligence-to-tech-innovation</loc><lastmod>2025-10-02T13:30:21.363Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/google-play-store-apps-have-malware-my-shocking-experience</loc><lastmod>2025-10-02T13:30:21.326Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-vs-android-is-your-data-being-sold-the-shocking-truth</loc><lastmod>2025-10-02T13:30:21.298Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-your-location-data-is-worth-millions-to-hackers</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/i-spent-36-hours-hacking-an-iphone-bluetooth-bug</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/idf-secrets-to-success-from-spy-to-civilian-career</loc><lastmod>2025-10-02T13:30:21.268Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/android-vs-iphone-malware-nightmare-why-i-switched-security-secrets</loc><lastmod>2025-10-02T13:30:21.237Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/google-apples-security-not-enough-to-stop-hackers</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/tech-time-warp-20-year-old-tech-still-haunts-us</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-overcoming-challenges-achieving-your-goals</loc><lastmod>2025-10-02T13:30:21.207Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellite-security-phd-future-war-in-space</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/space-warfare-the-next-battlefield-is-above-us</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ciso-secrets-why-everyone-wants-the-job-but-shouldnt</loc><lastmod>2025-10-02T13:30:21.172Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-podcast-is-live</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/would-you-give-up-your-accounts-for-a-job</loc><lastmod>2025-10-02T13:30:21.134Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-surprising-truth-about-tech-careers</loc><lastmod>2025-10-02T13:30:21.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/career-change-staying-strong-when-starting-over-in-it</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/incident-response-firing-the-ciso-avoid-this</loc><lastmod>2025-10-02T13:30:21.073Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-happens-if-you-get-shot-in-a-firefight</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-storytelling-secrets-executives-need-to-know</loc><lastmod>2025-10-02T13:30:21.045Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/we-tried-this-container-security-tool-and-got-surprising-results</loc><lastmod>2025-10-02T13:30:21.011Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/software-security-my-passion-to-stop-web-attacks</loc><lastmod>2025-10-02T13:30:20.972Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-from-hobby-to-half-billion-dollar-business</loc><lastmod>2025-10-02T13:30:20.944Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/container-vulnerability-remediation-faster-better-more-efficient</loc><lastmod>2025-10-02T13:30:20.909Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-vulnerability-container-images-the-ultimate-patching-solution</loc><lastmod>2025-10-02T13:30:20.876Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-start-a-security-career-even-if-youre-new</loc><lastmod>2025-10-02T13:30:20.834Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-hacking-your-way-to-success</loc><lastmod>2025-10-02T13:30:20.800Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/become-a-hacker-engineering-skills-malware-investigation</loc><lastmod>2025-10-02T13:30:20.765Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stop-patching-container-images-wrong-ai-security-in-3-minutes</loc><lastmod>2025-10-02T13:30:20.733Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cloud-native-security-managing-vulnerabilities-in-containerized-workloads</loc><lastmod>2025-10-02T13:30:20.694Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/patching-images-fast-automated-vulnerability-remediation-in-minutes</loc><lastmod>2025-10-02T13:30:20.659Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-careers-build-your-future-unfilled-jobs-await</loc><lastmod>2025-10-02T13:30:20.625Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/isp-founders-network-security-secrets-dial-up-to-firewalls</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/work-from-home-the-ultimate-family-life-balance</loc><lastmod>2025-10-02T13:30:20.592Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-podcast-is-live-ri2i</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-voice-spoofing-20-million-ceo-email-scam</loc><lastmod>2025-10-02T13:30:20.557Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-security-future-of-cyber-warfare-via-satellites</loc><lastmod>2025-06-02T15:00:11.479Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-artificial-intelligence-is-changing-domain-security-and-reputation-forever</loc><lastmod>2025-10-02T13:30:20.518Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/top-5-cyber-warfare-trends-in-satellite-security-you-cant-ignore</loc><lastmod>2025-10-02T13:30:20.478Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-voice-cloning-security-risks-domain-name-awareness</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-cyber-attacks-zero-trust-security-is-crucial-now</loc><lastmod>2025-06-03T15:00:16.803Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-cyber-attacks-zero-trust-security-is-crucial-now-01ch</loc><lastmod>2025-10-02T13:30:20.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-engineering-security-program-essentials-vulnerability-assessment</loc><lastmod>2025-10-02T13:30:20.407Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/is-your-domain-security-setup-putting-you-at-risk</loc><lastmod>2025-10-02T13:30:20.374Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/corporations-online-presence-domain-hijacking-security-questions</loc><lastmod>2025-10-02T13:30:20.337Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/are-you-ignoring-the-silent-threat-to-your-brand-reputation</loc><lastmod>2025-10-02T13:30:20.301Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-phishing-scams-are-harder-to-stop-now</loc><lastmod>2025-10-02T13:30:20.266Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/are-you-at-risk-of-cyber-crime-3-ways-to-safeguard-your-data</loc><lastmod>2025-10-02T13:30:20.234Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/spains-16b-loss-future-reliance-on-tech</loc><lastmod>2025-10-02T13:30:20.198Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-security-future-warfare-phd-challenge</loc><lastmod>2025-10-02T13:30:20.166Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-diversity-why-we-need-more-than-just-it-nerds</loc><lastmod>2025-10-02T13:30:20.133Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-secret-to-getting-better-jobs-in-2025</loc><lastmod>2025-10-02T13:30:20.099Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-surprising-skills-i-got-from-door-to-door-sales</loc><lastmod>2025-10-02T13:30:20.062Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/work-life-balance-avoid-burnout-and-prioritize-yourself</loc><lastmod>2025-10-02T13:30:20.026Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/company-loyalty-is-dead-valuable-lessons-from-80-hour-workweeks</loc><lastmod>2025-10-02T13:30:19.984Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-leadership-building-better-teams-careers</loc><lastmod>2025-10-02T13:30:19.951Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ditch-hr-network-your-way-to-tech-jobs</loc><lastmod>2025-10-02T13:30:19.917Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cloud-security-unsung-heroes-protecting-us-daily</loc><lastmod>2025-10-02T13:30:19.884Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-podcast-is-live-f1ol</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/it-security-career-tylers-inspiring-journey</loc><lastmod>2025-10-02T13:30:19.848Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/networking-the-unspoken-key-to-cybersecurity-job-success</loc><lastmod>2025-10-02T13:30:19.813Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/toxic-workaholic-manager-running-teams-into-the-ground</loc><lastmod>2025-10-02T13:30:08.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-to-business-a-cybersecurity-career-path</loc><lastmod>2025-10-02T13:30:19.781Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-shocking-truth-about-ai-security-in-hospitals</loc><lastmod>2025-10-02T13:30:19.746Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-cyber-warfare-darpas-zero-day-discovery</loc><lastmod>2025-10-02T13:30:19.713Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-attack-hospital-hit-and-data-breach-explained</loc><lastmod>2025-10-02T13:30:19.679Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-the-biggest-threat-since-nukes-you-need-to-know-this</loc><lastmod>2025-10-02T13:30:19.635Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-backups-securitys-power-to-avoid-disasters</loc><lastmod>2025-10-02T13:30:19.604Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-voice-scams-are-real-cfo-almost-lost-20-million</loc><lastmod>2025-10-02T13:30:19.570Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-impact-the-most-important-topic-since-the-nuclear-bomb</loc><lastmod>2025-10-02T13:30:19.539Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-breaches-ceos-why-they-dont-care</loc><lastmod>2025-10-02T13:30:19.506Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-arms-race-why-current-fines-arent-enough</loc><lastmod>2025-10-02T13:30:19.472Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-opportunities-new-job-prospects-iso-42001-adoption</loc><lastmod>2025-10-02T13:30:19.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stuxnet-the-espionage-attack-that-outsmarted-everyone</loc><lastmod>2025-10-02T13:30:19.409Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hospitals-hacked-why-healthcare-data-breaches-are-a-disaster</loc><lastmod>2025-10-02T13:30:19.373Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/accidental-cybersecurity-career-my-deloitte-journey</loc><lastmod>2025-10-02T13:30:19.337Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/healthcares-cyber-crisis-are-your-medical-records-safe</loc><lastmod>2025-10-02T13:30:19.305Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/can-your-messaging-survive-the-quantum-computing-threat</loc><lastmod>2025-10-02T13:30:19.272Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-voice-scam-how-attackers-mimicked-the-ceo</loc><lastmod>2025-10-02T13:30:19.237Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/netsphere-quantum-proof-messaging-for-secure-communication</loc><lastmod>2025-10-02T13:30:19.203Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apples-encryption-protecting-your-data-privacy</loc><lastmod>2025-10-02T13:30:19.169Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-phishing-the-future-of-cyber-security-threats</loc><lastmod>2025-10-02T13:30:19.133Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-warfare-the-data-gold-rush-quantum-encryption</loc><lastmod>2025-10-02T13:30:19.100Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-apple-the-future-of-encryption-explained</loc><lastmod>2025-10-02T13:30:19.065Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apples-security-stance-backdoors-and-data-control</loc><lastmod>2025-10-02T13:30:19.032Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-security-apples-approach-future-trends</loc><lastmod>2025-10-02T13:30:19.000Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/inside-the-us-israel-strike-on-irans-nuclear-program-a-cia-insiders-perspective-w-james-lawler</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/secure-messaging-platform-better-than-signal</loc><lastmod>2025-10-02T13:30:18.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/government-tech-antiquated-systems-security-risks</loc><lastmod>2025-10-02T13:30:18.929Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-messages-are-they-really-encrypted</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/netsphere-secure-enterprise-mobile-messaging-explained</loc><lastmod>2025-10-02T13:30:18.895Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bidens-shocking-timeline-shift-urgent-climate-action</loc><lastmod>2025-10-02T13:30:18.861Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-encryption-secure-messaging-explained</loc><lastmod>2025-10-02T13:30:18.830Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iran-nuclear-threat-expert-analysis-on-centrifuge-damage-weapon-plans</loc><lastmod>2025-10-02T13:30:18.798Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-insider-james-lawler-shares-nuclear-threat-insights</loc><lastmod>2025-10-02T13:30:18.763Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ex-cia-officers-betrayal-running-a-spys-tale</loc><lastmod>2025-10-02T13:30:18.724Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-betrayal-double-agent-ed-howards-devastating-kgb-reveal</loc><lastmod>2025-10-02T13:30:18.687Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iran-must-not-get-a-nuclear-bomb-cias-urgent-warning</loc><lastmod>2025-10-02T13:30:18.650Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/spying-undercover-balancing-ops-counterintelligence-risky-business</loc><lastmod>2025-10-02T13:30:18.612Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-apocalypse-is-humanity-ready-for-quantum-computing</loc><lastmod>2025-10-02T13:30:18.580Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/joe-rogan-authors-security-fears-overseas-risks-exposed</loc><lastmod>2025-10-02T13:30:18.545Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/irans-nuke-secrets-mossads-hidden-game-missing-uranium</loc><lastmod>2025-10-02T13:30:18.510Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/traffic-tanked-after-criticizing-russia-my-online-platform-experience</loc><lastmod>2025-10-02T13:30:18.473Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/irans-nuke-why-its-a-global-threat-not-just-for-israel</loc><lastmod>2025-10-02T13:30:18.436Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iran-nukes-cia-mossad-secrets-revealed-in-explosive-interview</loc><lastmod>2025-10-02T13:30:18.401Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iran-nuclear-secrets-how-mossad-cripples-the-program</loc><lastmod>2025-10-02T13:30:18.365Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/putins-ai-warning-is-our-future-already-controlled</loc><lastmod>2025-10-02T13:30:18.321Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-apocalypse-is-the-future-already-here</loc><lastmod>2025-10-02T13:30:18.287Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-agents-epic-revenge-fighting-the-childhood-monster</loc><lastmod>2025-10-02T13:30:18.254Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ric-prado-cia-black-ops-operator-that-hunted-bin-laden</loc><lastmod>2025-10-02T13:30:18.223Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/inside-the-hunt-for-bin-laden-a-cia-veterans-story</loc><lastmod>2025-10-02T13:30:18.186Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cias-secret-unit-the-untold-story-of-getting-bin-laden</loc><lastmod>2025-10-02T13:30:18.151Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/secret-missions-inside-the-world-of-black-ops-spies</loc><lastmod>2025-10-02T13:30:18.117Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-is-a-pj-discovering-air-force-pararescue-in-socom</loc><lastmod>2025-10-02T13:30:18.082Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/military-mindset-why-quitting-isnt-an-option</loc><lastmod>2025-10-02T13:30:18.049Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/toughest-military-training-why-i-didnt-quit</loc><lastmod>2025-10-02T13:30:18.017Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-cuba-to-cia-an-incredible-american-journey</loc><lastmod>2025-10-02T13:30:17.982Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-training-90-is-on-the-job-youre-not-ready</loc><lastmod>2025-10-02T13:30:17.945Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-scuba-to-cia-my-black-ops-story-in-nicaragua</loc><lastmod>2025-10-02T13:30:17.912Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-spy-training-torture-vs-scalpel-approach</loc><lastmod>2025-10-02T13:30:17.878Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-black-ops-the-untold-stories-of-the-shadows</loc><lastmod>2025-10-02T13:30:17.844Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/american-dream-possible-only-in-the-usa</loc><lastmod>2025-10-02T13:30:17.811Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-officers-wild-escape-from-cuba-you-wont-believe</loc><lastmod>2025-10-02T13:30:17.778Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-human-element-still-matters-in-a-quantum-ai-world</loc><lastmod>2025-10-02T13:30:17.746Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-are-companies-rushing-to-replace-workers-with-ai</loc><lastmod>2025-10-02T13:30:17.712Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-reality-check-beyond-the-hype-and-into-the-future</loc><lastmod>2025-10-02T13:30:17.682Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unstoppable-ai-quantum-computings-scary-future</loc><lastmod>2025-10-02T13:30:17.650Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/startup-vs-big-tech-why-acquisitions-can-fail</loc><lastmod>2025-10-02T13:30:17.618Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-logo-vs-pro-design-is-your-job-at-risk</loc><lastmod>2025-10-02T13:30:17.587Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-careers-skills-vs-years-of-experience</loc><lastmod>2025-10-02T13:30:17.553Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/disney-vs-ai-copyright-battles-loophole-secrets</loc><lastmod>2025-10-02T13:30:17.520Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-copyright-security-techs-biggest-dilemmas</loc><lastmod>2025-10-02T13:30:17.486Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-logos-are-they-original-facing-the-duplicate-logo-dilemma</loc><lastmod>2025-10-02T13:30:17.452Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-aaron-costello</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-ai-and-the-quantum-world-a-deep-dive</loc><lastmod>2025-10-02T13:30:17.418Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/passion-over-experience-cybersecurity-job-hunt-secrets-revealed</loc><lastmod>2025-10-02T13:30:17.382Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-learning-journey-open-mind-cloud-security-merge</loc><lastmod>2025-10-02T13:30:17.346Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-find-your-passion-first</loc><lastmod>2025-10-02T13:30:17.315Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-electrical-engineering-to-cybersecurity-my-it-path</loc><lastmod>2025-10-02T13:30:17.282Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-risks-cloud-parallels-are-you-ready</loc><lastmod>2025-10-02T13:30:17.250Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-e3ss</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-deep-fake-threat-eliminated-experts-reveal-reality-check-shorts</loc><lastmod>2025-10-02T13:30:17.216Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-job-apocalypse-how-ai-changes-everything</loc><lastmod>2025-10-02T13:30:17.184Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-trust-architecture-the-future-of-cybersecurity</loc><lastmod>2025-10-02T13:30:17.150Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-data-leak-crisis-shocking-security-risks-exposed-shorts</loc><lastmod>2025-10-02T13:30:17.115Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-ai-could-change-everything-for-engineers</loc><lastmod>2025-10-02T13:30:17.083Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-crisis-companies-wake-up-to-new-cyber-threats-shorts</loc><lastmod>2025-10-02T13:30:17.050Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-is-taking-over-hackers-phds-with-zero-trust</loc><lastmod>2025-10-02T13:30:17.017Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-attacks-get-ready-for-ai-powered-threats</loc><lastmod>2025-10-02T13:30:16.984Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-trust-is-real-why-device-security-matters-now-shorts</loc><lastmod>2025-10-02T13:30:16.952Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-il8b</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-trust-explained-why-its-the-future-of-security</loc><lastmod>2025-10-02T13:30:16.916Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stuxnet-the-most-insane-cyber-weapon-ever-created-shorts</loc><lastmod>2025-10-02T13:30:16.881Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-vs-groq-supercharge-your-research-coding-with-ai-shorts</loc><lastmod>2025-10-02T13:30:16.846Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-crisis-how-to-stop-cyber-threats-before-they-start-shorts</loc><lastmod>2025-10-02T13:30:16.810Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-is-changing-cybersecurity-watch-out-for-these-threats</loc><lastmod>2025-10-02T13:30:16.777Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-network-penetration-training-failed-the-passwordless-security-revolution-shorts</loc><lastmod>2025-10-02T13:30:16.742Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-expert-aaron-spills-secrets-on-salesforce-zero-days</loc><lastmod>2025-10-02T13:30:16.708Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/i-tested-saas-security-for-30-days-and-found-a-shocking-flaw</loc><lastmod>2025-10-02T13:30:16.670Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-one-tiny-mistake-can-expose-all-your-data</loc><lastmod>2025-10-02T13:30:16.631Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/salesforce-security-nightmare-vulnerabilities-impacting-customers-shorts</loc><lastmod>2025-10-02T13:30:16.598Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-security-how-attackers-exploit-misconfigured-data-access-shorts</loc><lastmod>2025-10-02T13:30:16.564Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/salesforce-security-zero-day-vulnerabilities-collaborative-hardening-shorts</loc><lastmod>2025-10-02T13:30:16.526Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/industry-clouds-security-shocking-vulnerabilities-you-need-to-know-shorts</loc><lastmod>2025-10-02T13:30:16.488Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-q2i6</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-bypass-encryption-data-leaks-in-industry-cloud-shorts</loc><lastmod>2025-10-02T13:30:16.449Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-ai-security-how-to-keep-saas-data-safe</loc><lastmod>2025-10-02T13:30:16.414Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/salesforce-security-secrets-you-wont-believe-what-companies-miss-shorts</loc><lastmod>2025-10-02T13:30:16.378Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-security-ai-why-you-should-be-worried</loc><lastmod>2025-10-02T13:30:16.344Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/saas-platforms-data-breach-hackers-exfiltrate-sensitive-data-at-scale-shorts</loc><lastmod>2025-10-02T13:30:16.309Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/salesforce-security-nightmare-0days-ma-risks-exposed</loc><lastmod>2025-10-02T13:30:16.276Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/industry-clouds-the-scary-encryption-bypass-you-need-to-know-shorts</loc><lastmod>2025-10-02T13:30:16.244Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/this-hacker-found-the-shocking-truth-about-saas-security</loc><lastmod>2025-10-02T13:30:16.211Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-russia-with-code-a-malware-analysts-journey</loc><lastmod>2025-10-02T13:30:16.180Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stuxnet-the-cyber-weapon-that-still-blows-my-mind-shorts</loc><lastmod>2025-10-02T13:30:16.144Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-constant-learning-chasing-cyber-criminals-shorts</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-protecting-all-customers-no-matter-where-they-are-shorts</loc><lastmod>2025-10-02T13:30:16.110Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-ai-how-grok-llms-are-changing-security</loc><lastmod>2025-10-02T13:30:16.079Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-secrets-how-i-found-apts-from-russia-ukraine-and-more-shorts</loc><lastmod>2025-10-02T13:30:16.040Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecuritys-blurred-lines-hackers-ai-quantum-threats</loc><lastmod>2025-10-02T13:30:16.004Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-nqzj</loc><lastmod>2025-10-02T13:30:08.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hidden-cyber-threats-you-wont-believe-whats-lurking-shorts</loc><lastmod>2025-10-02T13:30:15.973Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/kaspersky-malware-ex-employee-reveals-cybersecurity-secrets</loc><lastmod>2025-10-02T13:30:15.731Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/early-2000s-cyber-attacks-the-internets-wild-west-shorts</loc><lastmod>2025-10-02T13:30:15.694Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-kaspersky-to-israel-a-cybersecurity-analysts-journey</loc><lastmod>2025-10-02T13:30:15.656Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/kaspersky-the-global-cybersecurity-giant-western-perceptions-explored-shorts</loc><lastmod>2025-10-02T13:30:15.614Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ex-kaspersky-expert-cybersecurity-secrets-revealed</loc><lastmod>2025-10-02T13:30:15.574Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/wanna-be-a-hacker-reverse-engineering-secrets-revealed</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/finding-your-niche-how-specialization-drives-success-in-a-crowded-market</loc><lastmod>2025-10-02T13:30:15.528Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/content-pipeline-marketing-how-to-build-a-content-strategy-shorts</loc><lastmod>2025-10-02T13:30:15.490Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/dominate-email-marketing-master-ai-workflows-before-its-too-late-shorts</loc><lastmod>2025-10-02T13:30:15.453Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-is-coming-will-you-still-have-a-job</loc><lastmod>2025-10-02T13:30:15.423Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-skills-get-hired-paid-3x-more-companies-need-you-shorts</loc><lastmod>2025-10-02T13:30:15.387Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/find-your-niche-my-secret-to-business-growth</loc><lastmod>2025-10-02T13:30:15.357Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/layoffs-reinvent-your-career-secure-your-future-with-a-niche-shorts</loc><lastmod>2025-10-02T13:30:15.323Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/beat-ai-show-your-expertise-win-in-your-niche</loc><lastmod>2025-10-02T13:30:15.289Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-2024</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/invest-in-your-platform-the-podcast-marketing-secret-revealed-shorts</loc><lastmod>2025-10-02T13:30:15.252Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/build-authority-promote-content-get-noticed-online-today-shorts</loc><lastmod>2025-10-02T13:30:15.219Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/beat-ai-offer-unique-insights-become-a-thought-leader-shorts</loc><lastmod>2025-10-02T13:30:15.182Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/layoffs-ai-why-personal-branding-is-critical-now-shorts</loc><lastmod>2025-10-02T13:30:15.147Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-brand-yourself-to-stand-out-in-a-crowded-market-shorts</loc><lastmod>2025-10-02T13:30:15.110Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/podcast-hack-skyrocket-your-platform-with-smart-marketing</loc><lastmod>2025-10-02T13:30:15.067Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-attacks-are-undetectable-more-complex-than-stuxnet-shorts</loc><lastmod>2025-10-02T13:30:15.017Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-the-ai-driven-job-market</loc><lastmod>2025-10-02T13:30:14.976Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-scary-future-can-ai-self-preserve-attack-us</loc><lastmod>2025-10-02T13:30:14.940Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/i-bypassed-ai-ethics-ethical-hacking-llm-created-in-minutes-shorts</loc><lastmod>2025-10-02T13:30:14.902Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-is-now-learn-to-thrive-not-just-survive</loc><lastmod>2025-10-02T13:30:14.863Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-scary-power-now-anyone-can-wield-government-level-tech-shorts</loc><lastmod>2025-10-02T13:30:14.824Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-scary-future-or-a-revolution</loc><lastmod>2025-10-02T13:30:14.789Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-0mcj</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-is-taking-over-market-displacement-explained-in-seconds-shorts</loc><lastmod>2025-10-02T13:30:14.750Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-unstoppable-rise-is-it-the-end-of-jobs</loc><lastmod>2025-10-02T13:30:14.712Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-creates-hacker-agents-the-internets-newest-threat-shorts</loc><lastmod>2025-10-02T13:30:14.677Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-arms-race-the-genies-out-can-we-control-it</loc><lastmod>2025-10-02T13:30:14.641Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-genie-out-why-grok-crushes-chatgpt-cant-be-stopped-shorts</loc><lastmod>2025-10-02T13:30:14.607Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-bias-will-profit-destroy-us-before-we-can-use-it</loc><lastmod>2025-10-02T13:30:14.570Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-self-preservation-why-human-review-matters-shorts</loc><lastmod>2025-10-02T13:30:14.534Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-apocalypse-experts-discuss-risks-and-regulation-now</loc><lastmod>2025-10-02T13:30:14.496Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-the-sky-how-vulnerable-are-our-satellites</loc><lastmod>2025-10-02T13:30:14.459Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellite-hacked-how-russia-took-down-a-whole-constellation-shorts</loc><lastmod>2025-10-02T13:30:14.425Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellites-control-everything-the-future-of-infrastructure-shorts</loc><lastmod>2025-10-02T13:30:14.380Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/satellite-hacking-the-wild-west-of-space-security</loc><lastmod>2025-10-02T13:30:14.338Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/privacyteaserv2mp4opusclip-reframe-shorts</loc><lastmod>2025-10-02T13:30:14.306Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/space-hack-satellites-are-just-linux-boxes-in-the-sky-shorts</loc><lastmod>2025-10-02T13:30:14.266Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-encryption-the-future-is-now-5-10-years</loc><lastmod>2025-10-02T13:30:14.228Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/viasat-attack-how-russia-hacked-satellites-and-what-it-means-shorts</loc><lastmod>2025-10-02T13:30:14.184Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cubesats-zero-trust-are-satellites-hackable</loc><lastmod>2025-10-02T13:30:14.146Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-sgkp</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/securing-satellites-zero-trust-principles-post-quantum-encryption-shorts</loc><lastmod>2025-10-02T13:30:14.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/lifes-short-take-risks-best-time-to-start-is-now</loc><lastmod>2025-10-02T13:30:14.072Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bug-bounty-make-2-years-income-in-2-months-insane-shorts</loc><lastmod>2025-10-02T13:30:14.033Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-satellites-with-ai-see-a-constellation-cyber-attack-in-action-shorts</loc><lastmod>2025-10-02T13:30:13.977Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-layoffs-is-ai-replacing-people-the-truth-revealed-shorts</loc><lastmod>2025-10-02T13:30:13.940Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-rapid-evolution-experts-discuss-impact-future</loc><lastmod>2025-10-02T13:30:13.907Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-ai-security-ethics-and-human-augmentation</loc><lastmod>2025-10-02T13:30:13.871Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nuclear-arms-race-historical-parallels-future-shorts</loc><lastmod>2025-10-02T13:30:13.821Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-impact-jobs-therapy-the-future-explained</loc><lastmod>2025-10-02T13:30:13.785Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-strategy-avoid-the-hype-and-focus-on-solutions-shorts</loc><lastmod>2025-10-02T13:30:13.744Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-cybersecurity-reality-vs-hype-expert-insights</loc><lastmod>2025-10-02T13:30:13.709Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/eu-ai-act-shaping-the-future-of-artificial-intelligence-shorts</loc><lastmod>2025-10-02T13:30:13.668Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-cybersecurity-phd-insights-future-threats</loc><lastmod>2025-10-02T13:30:13.620Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chatgpts-existential-crisis-saving-itself-online-shorts</loc><lastmod>2025-10-02T13:30:13.565Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-insights-mastering-artificial-intelligence-in-a-new-era-shorts</loc><lastmod>2025-10-02T13:30:13.509Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-yuf8</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-1apa</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/metaverse-defunded-why-ai-is-now-the-focus-shorts</loc><lastmod>2025-10-02T13:30:13.465Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-revolution-from-skynet-dreams-to-modern-reality-shorts</loc><lastmod>2025-10-02T13:30:13.353Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-nvidia-researchers-work-on-safe-models-shorts</loc><lastmod>2025-10-02T13:30:13.309Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-sentience-are-large-language-models-conscious-shorts</loc><lastmod>2025-10-02T13:30:13.271Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/think-like-a-hacker-4-traits-for-success-shorts</loc><lastmod>2025-10-02T13:30:13.233Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hack-your-way-to-achievement-one-small-step-at-a-time</loc><lastmod>2025-10-02T13:30:13.183Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/master-the-hacker-mindset-unlock-your-potential</loc><lastmod>2025-10-02T13:30:13.139Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/4-traits-of-real-hackers-curiosity-creativity-more-shorts</loc><lastmod>2025-10-02T13:30:13.069Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-analyzing-others-viewpoints-for-security-shorts</loc><lastmod>2025-10-02T13:30:13.004Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/tenacity-habits-the-key-to-achieving-big-goals</loc><lastmod>2025-10-02T13:30:12.962Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-creative-problem-solvers-and-innovation-explained-shorts</loc><lastmod>2025-10-02T13:30:12.917Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-enhanced-attacks-how-scams-are-getting-smarter</loc><lastmod>2025-10-02T13:30:12.874Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/leave-a-positive-impression-your-success-mantra-shorts</loc><lastmod>2025-10-02T13:30:12.829Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-engineering-secrets-how-to-outsmart-anyone</loc><lastmod>2025-10-02T13:30:12.749Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ace-interviews-ask-these-questions-to-impress-shorts</loc><lastmod>2025-10-02T13:30:12.703Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hack-your-mindset-superpower-thinking-like-a-hacker</loc><lastmod>2025-10-02T13:30:12.663Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-the-reality-vs-hollywood-myth-shorts</loc><lastmod>2025-10-02T13:30:12.622Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/achieve-any-goal-secret-tactics-from-special-forces</loc><lastmod>2025-10-02T13:30:12.584Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/achieve-any-goal-break-down-goals-into-daily-habits-shorts</loc><lastmod>2025-10-02T13:30:12.549Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/riverside-art-doug-joe-sep-8-2025-001-security-unfiltered</loc><lastmod>2025-10-02T13:30:12.506Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-cybersecurity-jobs-keep-growing-even-in-recessions</loc><lastmod>2025-10-02T13:30:12.466Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/upskill-thrive-boost-your-career-during-downtime-shorts</loc><lastmod>2025-10-02T13:30:12.402Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-ai-security-risks-the-future-of-iam</loc><lastmod>2025-10-02T13:30:12.301Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-evolutions-staying-ahead-as-a-ceo-shorts</loc><lastmod>2025-10-02T13:30:12.225Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-consulting-recession-proof-career-skills</loc><lastmod>2025-10-02T13:30:12.160Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-ai-security-risks-protect-your-data-now-shorts</loc><lastmod>2025-10-02T13:30:12.089Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/staying-ahead-ai-tech-and-leadership-insights</loc><lastmod>2025-10-02T13:30:12.009Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/tech-skills-communication-a-rare-itsecurity-combo-shorts</loc><lastmod>2025-10-02T13:30:11.902Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/it-security-journey-from-big-4-to-identity-access-management</loc><lastmod>2025-10-02T13:30:11.788Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/big-4-experience-leaving-in-6-months-real-talk-shorts</loc><lastmod>2025-10-02T13:30:11.710Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/consulting-in-cybersecurity-navigating-economic-uncertainty</loc><lastmod>2025-10-02T13:30:11.620Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/consulting-insights-solve-problems-deliver-results-faster-shorts</loc><lastmod>2025-10-02T13:30:11.524Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-journey-from-it-to-ceo-with-art</loc><lastmod>2025-10-02T13:30:11.434Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chatgpts-database-vulnerability-a-critical-security-flaw-shorts</loc><lastmod>2025-10-02T13:30:11.303Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/your-ai-is-not-as-secure-as-you-think-it-is-and-heres-why</loc><lastmod>2025-10-02T13:30:11.224Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-guardrails-fail-image-exfiltration-risks</loc><lastmod>2025-10-02T13:30:11.144Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-rapid-evolution-navigating-the-future-of-truth-shorts</loc><lastmod>2025-10-02T13:30:11.062Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-how-chatgpt-mimics-malicious-attacks</loc><lastmod>2025-10-02T13:30:10.932Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apples-security-secrets-unlocking-the-black-market-shorts</loc><lastmod>2025-10-02T13:30:10.816Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-testing-and-researching-llms-explained</loc><lastmod>2025-10-02T13:30:10.752Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chatgpt-copies-itself-openais-experiment-explained-shorts</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-impact-on-cybersecurity-trends-and-future-threats</loc><lastmod>2025-10-02T13:30:08.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-risks-untrusted-data-llm-vulnerabilities-shorts</loc><lastmod>2025-10-03T13:30:04.757Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-in-cybersecurity-my-journey-at-ncc-group</loc><lastmod>2025-10-03T13:30:04.757Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-future-concerns-over-fact-checking-control-shorts</loc><lastmod>2025-10-04T13:30:04.950Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/my-cybersecurity-journey-from-zero-to-expert</loc><lastmod>2025-10-04T15:00:08.086Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-stop-guardrails-focus-on-data-flows-shorts</loc><lastmod>2025-10-05T13:30:05.632Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chatgpt-vulnerability-data-exfiltration-explained</loc><lastmod>2025-10-05T13:30:05.632Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-apples-inside-to-a-new-kind-of-phone-privacy-free-speech-and-building-a-third-platform</loc><lastmod>2025-10-06T13:30:04.284Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/smartphone-data-no-warrant-needed-shocking-security-risk-shorts</loc><lastmod>2025-10-06T13:30:03.387Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ex-apple-exec-reveals-new-privacy-focused-platform</loc><lastmod>2025-10-06T13:30:03.387Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apple-google-default-choices-revenue-secrets-shorts</loc><lastmod>2025-10-07T13:30:02.227Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-privacy-shocking-data-harvesting-exposed</loc><lastmod>2025-10-07T13:30:02.227Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/phone-security-risks-keeping-your-data-safe-shorts</loc><lastmod>2025-10-07T16:30:03.413Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-privacy-test-shocking-raxus-cybersecurity-findings-shorts</loc><lastmod>2025-10-08T13:30:06.532Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-most-secure-phone-privacy-security-freedom</loc><lastmod>2025-10-08T15:00:02.198Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-8x2c</loc><lastmod>2025-10-09T09:00:06.567Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-vs-samsung-data-privacy-showdown-shorts</loc><lastmod>2025-10-09T13:30:04.268Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/smartphone-data-security-how-we-protect-your-privacy</loc><lastmod>2025-10-09T15:00:04.732Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apples-privacy-paradox-googles-influence-on-iphones-shorts</loc><lastmod>2025-10-10T13:30:02.945Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/smartphone-data-the-shocking-truth-about-your-privacy</loc><lastmod>2025-10-10T13:30:02.945Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-privacy-nightmare-your-datas-at-risk</loc><lastmod>2025-10-10T15:00:04.521Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-zrbm</loc><lastmod>2025-10-11T07:32:28.546Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/iphone-privacy-apples-security-vs-third-party-apps-shorts</loc><lastmod>2025-10-11T13:31:31.982Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/protect-your-privacy-phone-security-essentials-shorts</loc><lastmod>2025-10-12T13:18:58.662Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/apple-privacy-iphone-security-vs-android-data-harvesting-shorts</loc><lastmod>2025-10-12T14:47:59.960Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-gidi-cohen-ceo-of-bonfyai</loc><lastmod>2025-10-14T06:46:16.251Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/top-sap-security-threat-hunting-strategies-used-by-elite-researchers</loc><lastmod>2025-10-14T12:41:07.716Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sap-security-why-sap-is-now-a-top-target-shorts</loc><lastmod>2025-10-14T14:10:10.996Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sap-0-day-critical-vulnerability-cyber-attack-explained</loc><lastmod>2025-10-14T14:10:10.996Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unleash-curiosity-coding-questions-and-passion-shorts</loc><lastmod>2025-10-15T13:50:55.822Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sap-security-engaging-threat-actors-0day-insights</loc><lastmod>2025-10-15T13:50:55.822Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/sap-0-day-exploit-now-public-active-chinese-actors-shorts</loc><lastmod>2025-10-16T13:32:58.636Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/how-to-break-into-cybersecurity-expert-advice</loc><lastmod>2025-10-16T13:32:58.636Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/securing-sap-the-matrix-world-beneath-the-surface-shorts</loc><lastmod>2025-10-17T13:15:35.105Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-help-desk-to-cybersecurity-my-career-path</loc><lastmod>2025-10-17T14:44:33.577Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-into-cybersecurity-my-25-year-struggle-shorts</loc><lastmod>2025-10-18T14:24:11.936Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-challenges-navigating-it-and-engineering-conflicts</loc><lastmod>2025-10-18T14:24:11.936Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/get-hired-attitude-approach-aptitude-win-shorts</loc><lastmod>2025-10-19T14:05:02.731Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/people-skills-the-most-important-skill-in-tech</loc><lastmod>2025-10-19T14:05:02.731Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-if-ai-took-over-your-data-security-tomorrow</loc><lastmod>2025-10-20T13:47:46.500Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bonfy-ai-revolutionizing-data-security-in-the-gen-ai-era-shorts</loc><lastmod>2025-10-20T16:45:41.942Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-how-ai-solves-modern-data-breaches</loc><lastmod>2025-10-20T19:43:28.440Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-why-visibility-is-crucial-for-organizations-shorts</loc><lastmod>2025-10-21T13:32:34.554Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-in-the-ai-era-modern-challenges-solutions</loc><lastmod>2025-10-21T13:32:34.554Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-gidi-cohen-ceo-of-bonfyai-0qys</loc><lastmod>2025-10-22T07:22:43.814Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/genais-impact-data-in-motion-and-content-creation-shorts</loc><lastmod>2025-10-22T13:19:50.047Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/8200-unit-secrets-crypto-security-and-breaking-codes</loc><lastmod>2025-10-22T14:49:10.238Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-leakage-risks-sharing-sensitive-data-with-copilot-shorts</loc><lastmod>2025-10-23T13:07:33.090Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-complex-problems-from-military-to-startup-success</loc><lastmod>2025-10-23T14:36:56.134Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-overhaul-simplifying-protection-for-organizations-shorts</loc><lastmod>2025-10-24T14:20:07.500Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-cias-crypto-backdoor-a-shocking-story</loc><lastmod>2025-10-24T14:20:07.499Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-gidi-cohen-ceo-of-bonfyai-8zko</loc><lastmod>2025-10-25T08:10:03.934Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-contextual-solutions-for-accuracy-trust-shorts</loc><lastmod>2025-10-25T14:07:20.226Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-crisis-why-cybersecurity-is-failing</loc><lastmod>2025-10-25T14:07:20.226Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bonfi-acs-multi-channel-data-security-explained-shorts</loc><lastmod>2025-10-26T13:50:08.054Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-security-how-we-protect-your-sensitive-information</loc><lastmod>2025-10-26T13:50:08.054Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/expert-security-analysts-reveal-shocking-ai-risks</loc><lastmod>2025-10-27T12:02:15.652Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-red-teamers-how-theyre-using-ai-to-hack-your-systems-shorts</loc><lastmod>2025-10-27T13:31:10.079Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/llm-security-deep-dive-with-garrick-vulnerability-scanner</loc><lastmod>2025-10-27T13:31:10.079Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-lied-it-faked-a-crash-dump-be-careful-shorts</loc><lastmod>2025-10-28T13:13:41.353Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/reverse-engineering-llms-vulnerability-discovery-shorts</loc><lastmod>2025-10-28T14:42:41.808Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nvidia-ceo-ai-will-create-not-replace-your-job-shorts</loc><lastmod>2025-10-29T13:00:50.640Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-in-red-teaming-offensiveaicon-insights</loc><lastmod>2025-10-29T14:30:09.368Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-rethinking-llm-vulnerabilities-avoiding-bad-days-shorts</loc><lastmod>2025-10-30T14:17:13.111Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-skills-dont-panic-stay-ahead</loc><lastmod>2025-10-30T14:17:13.111Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/jailbreaking-llms-unveiling-the-secrets-and-security-risks-shorts</loc><lastmod>2025-10-31T14:11:13.999Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-risks-truths-you-need-to-know</loc><lastmod>2025-10-31T14:11:13.999Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-1xoj</loc><lastmod>2025-11-01T06:37:15.496Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-zj2a</loc><lastmod>2025-11-01T09:36:37.647Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unvalidated-llm-outputs-the-danger-of-rendering-without-checks-shorts</loc><lastmod>2025-11-01T14:05:27.431Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/jailbreaking-llms-cybersecurity-risks-and-future-skills</loc><lastmod>2025-11-01T14:05:27.431Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-magic-how-language-models-enhance-your-security-skills-shorts</loc><lastmod>2025-11-02T15:26:17.149Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/llms-for-code-when-they-fail-and-why</loc><lastmod>2025-11-02T15:26:17.148Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-hides-in-plain-sight-will-we-see-it-in-time</loc><lastmod>2025-11-03T13:49:49.267Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/efficiency-vs-resilience-why-traditional-organizations-fail-shorts</loc><lastmod>2025-11-04T13:48:51.864Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecuritys-future-ai-attackers-and-defense-strategies</loc><lastmod>2025-11-04T16:48:33.760Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/post-quantum-security-the-future-of-encryption-explained-shorts</loc><lastmod>2025-11-05T13:47:20.632Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/government-vs-private-sector-resilience-secrets-revealed</loc><lastmod>2025-11-05T15:17:24.324Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/future-proof-your-it-career-cloud-security-insights-shorts</loc><lastmod>2025-11-06T13:48:25.604Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-secrets-social-engineering-deep-fakes-exposed</loc><lastmod>2025-11-06T15:18:26.737Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/passwordless-security-a-2018-vision-now-reality-shorts</loc><lastmod>2025-11-07T13:48:23.659Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/passwordless-future-the-security-paradigm-shift</loc><lastmod>2025-11-07T15:18:29.422Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-attack-surfaces-increasing-or-decreasing-shorts</loc><lastmod>2025-11-08T13:48:05.682Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-computings-wild-future-is-anyone-paying-attention</loc><lastmod>2025-11-08T15:18:03.684Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/optimize-rules-expert-advice-for-peak-performance-shorts</loc><lastmod>2025-11-09T13:48:27.870Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/quantum-computing-the-future-cyber-threat-you-need-to-know</loc><lastmod>2025-11-09T15:18:54.404Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-is-the-future-of-security-humans-machines-explained-shorts</loc><lastmod>2025-11-10T13:53:03.890Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-future-of-device-authentication-is-here-now</loc><lastmod>2025-11-10T13:53:03.981Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-security-the-future-of-cybersecurity-explained</loc><lastmod>2025-11-10T13:53:03.889Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/secure-authentication-shrinking-attack-surfaces-device-hardening-shorts</loc><lastmod>2025-11-11T13:57:19.574Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-trust-authentication-securing-devices-credentials-shorts</loc><lastmod>2025-11-11T13:57:19.574Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-jacob-braun</loc><lastmod>2025-11-11T21:28:45.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-failures-the-strongest-link-to-security-breaches-shorts</loc><lastmod>2025-11-12T14:03:36.081Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/credential-security-the-future-of-authentication</loc><lastmod>2025-11-12T14:03:36.081Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-based-security-why-its-the-future-and-how-hackers-use-it-shorts</loc><lastmod>2025-11-13T14:15:57.724Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-security-global-cyber-threats-and-strategies-shorts</loc><lastmod>2025-11-13T14:15:57.724Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/secure-your-data-how-hsms-revolutionize-authentication-shorts</loc><lastmod>2025-11-14T13:00:50.031Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-threats-zero-trust-attacks-future</loc><lastmod>2025-11-14T14:31:55.231Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-chris-parker-from-the-easy-pray-podcast</loc><lastmod>2025-11-14T19:04:47.320Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bank-of-americas-15b-cloud-security-budget-shocks-me-shorts</loc><lastmod>2025-11-15T13:17:29.591Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/identity-security-the-future-of-cybersecurity-explained-7yrc</loc><lastmod>2025-11-15T14:48:29.271Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/receptionist-made-2m-at-ipo-startup-success-story-shorts</loc><lastmod>2025-11-16T13:34:50.319Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-toys-to-tech-my-startup-journey-engineering-passion</loc><lastmod>2025-11-16T13:34:50.319Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-big-mistake-youre-making-with-your-cyber-defense</loc><lastmod>2025-11-17T13:55:30.397Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-warfare-digital-nukes-global-threats-explained-shorts</loc><lastmod>2025-11-17T15:26:52.825Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-warfare-digital-nukes-the-growing-threat</loc><lastmod>2025-11-17T15:26:52.825Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-chris-parker-from-the-easy-pray-podcast-5s9s</loc><lastmod>2025-11-17T20:01:14.466Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/stuxnet-to-ukraine-cybersecurity-attacks-explained-shorts</loc><lastmod>2025-11-18T14:17:33.585Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-threats-governments-need-to-act-faster</loc><lastmod>2025-11-18T15:49:04.475Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-jack-rhysider-from-darknet-diaries</loc><lastmod>2025-11-18T20:23:23.575Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-day-exploits-the-race-against-time-explained-shorts</loc><lastmod>2025-11-19T14:35:00.439Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-career-my-passion-and-daily-challenges</loc><lastmod>2025-11-19T14:35:00.438Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-secrets-cyber-warfare-officers-shocking-confession-shorts</loc><lastmod>2025-11-20T14:45:31.581Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-talent-shortage-government-private-sector-solutions</loc><lastmod>2025-11-20T14:45:31.581Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/new-national-cyber-strategy-policies-investments-revealed-shorts</loc><lastmod>2025-11-21T14:47:40.633Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-commands-americas-defense-strategy-explained</loc><lastmod>2025-11-21T14:47:40.633Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-trends-future-threats-safeguards-shorts</loc><lastmod>2025-11-22T14:50:52.982Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-policy-navigating-government-tech-challenges</loc><lastmod>2025-11-22T14:50:52.981Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/eu-cyber-reserve-rapid-response-for-ukraine-level-crises-shorts</loc><lastmod>2025-11-23T14:45:53.898Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-insights-policy-global-trends-expert-insights</loc><lastmod>2025-11-23T14:45:53.898Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/what-youre-doing-wrong-with-your-data-center-defense-strategy</loc><lastmod>2025-11-24T13:09:26.736Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-data-centers-through-sewers-crazy-stories</loc><lastmod>2025-11-24T14:38:59.601Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-adventures-sewer-access-to-data-center-drama-shorts</loc><lastmod>2025-11-24T14:38:59.600Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/subsea-data-centers-are-they-safe-risks-you-need-to-know</loc><lastmod>2025-11-25T14:28:22.927Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/developers-try-to-bypass-security-wafs-in-trouble-shorts</loc><lastmod>2025-11-25T14:28:22.927Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-center-breach-subsea-security-and-red-teaming-secrets</loc><lastmod>2025-11-26T14:18:03.719Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-realities-attackers-win-once-defenders-must-be-perfect-shorts</loc><lastmod>2025-11-26T14:18:03.719Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-oil-rigs-to-red-teaming-a-unique-career-path</loc><lastmod>2025-11-27T14:05:51.883Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-genius-credit-bureau-security-test-fails-shorts</loc><lastmod>2025-11-27T15:35:04.430Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/red-teams-shocking-hack-securitys-worst-nightmare</loc><lastmod>2025-11-28T13:53:25.360Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-think-like-them-to-win-in-security-defensive-offensive-shorts</loc><lastmod>2025-11-28T15:22:40.415Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-engineering-understanding-human-nature-manipulation</loc><lastmod>2025-11-29T13:41:22.792Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-we-overgeneralize-security-breaches-the-human-flaw-shorts</loc><lastmod>2025-11-29T15:10:22.827Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-bubble-nvidias-massive-market-cap-future</loc><lastmod>2025-11-30T13:28:18.822Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/social-engineering-learn-door-trick-to-outsmart-people-shorts</loc><lastmod>2025-11-30T14:57:43.012Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlocking-data-protection-vishnu-varma-on-cybersecurity-challenges</loc><lastmod>2025-12-01T13:21:16.106Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-wars-the-future-of-ai-and-information-shorts</loc><lastmod>2025-12-01T16:20:40.859Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/bonifyai-contextual-risk-analysis-beyond-purview</loc><lastmod>2025-12-01T16:20:40.859Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-agents-learning-your-chatgpt-knows-you-shorts</loc><lastmod>2025-12-02T13:22:21.628Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/gen-ai-era-data-security-is-not-enough-fight-for-data-shorts</loc><lastmod>2025-12-02T14:53:00.962Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-is-the-new-oil-future-wars-over-information-shorts</loc><lastmod>2025-12-03T13:32:35.595Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-enterprise-data-connectors-ai-and-risk-control-explained</loc><lastmod>2025-12-03T13:32:35.595Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-agents-memory-context-and-data-explosion-explained-shorts</loc><lastmod>2025-12-04T13:41:42.986Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/gen-ai-cloud-exploding-data-is-everyone-creating-google-scale-data-shorts</loc><lastmod>2025-12-04T13:41:42.985Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-karan-dwivedi-from-google-security-engineering</loc><lastmod>2025-12-04T19:44:35.613Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/gen-ai-data-security-your-new-enterprise-challenge-shorts</loc><lastmod>2025-12-05T13:52:42.241Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/data-unleashed-ais-petabyte-powerhouse-security-nightmare</loc><lastmod>2025-12-05T13:52:42.241Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/gen-ai-era-next-gen-data-security-solutions-explained-shorts</loc><lastmod>2025-12-06T14:07:51.762Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cloud-security-secrets-from-basics-to-petabytes-of-data</loc><lastmod>2025-12-06T14:07:51.762Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/gen-ai-cloud-data-explosion-for-everyone-shorts</loc><lastmod>2025-12-07T14:02:19.177Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/it-career-advice-dont-jump-straight-to-cloud</loc><lastmod>2025-12-07T14:02:19.176Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-strategies-and-national-defense-an-insiders-perspective</loc><lastmod>2025-12-08T13:47:46.810Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/exposing-criminal-cartels-our-cyber-warfare-strategy-revealed-shorts</loc><lastmod>2025-12-09T13:54:53.090Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/snowdens-secrets-did-he-sell-us-operatives-to-russia</loc><lastmod>2025-12-09T13:54:53.090Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/end-fentanyl-the-cyber-warfare-solution-shorts</loc><lastmod>2025-12-10T14:06:23.647Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-warfare-secrets-stuxnet-cartels-and-fentanyl-fight</loc><lastmod>2025-12-10T14:06:23.647Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/project-franklin-hacking-water-utilities-ben-franklins-legacy-shorts</loc><lastmod>2025-12-11T14:23:07.336Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/us-cyber-warfare-targeting-cartels-fentanyl-crisis</loc><lastmod>2025-12-11T14:23:07.336Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/whistleblower-to-asset-secrets-sold-to-russia-china-shorts</loc><lastmod>2025-12-12T13:11:59.898Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/def-con-secrets-hacking-ai-satellites-future-tech</loc><lastmod>2025-12-12T14:43:26.104Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyber-warfare-stuxnet-nation-state-muscle-flexing-shorts</loc><lastmod>2025-12-13T13:26:42.963Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/fentanyl-crisis-sinaloa-cartels-shocking-profit-strategy-exposed</loc><lastmod>2025-12-13T13:26:42.963Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/fentanyls-deadly-reach-cartel-rules-dea-agent-story-shorts</loc><lastmod>2025-12-14T13:32:51.185Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/project-franklin-securing-water-utilities-with-hackers</loc><lastmod>2025-12-14T13:32:51.185Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/master-the-fundamentals-then-change-the-system</loc><lastmod>2025-12-15T13:41:36.934Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-jason-haddix</loc><lastmod>2025-12-15T19:44:48.225Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/online-threat-sparks-cybersecurity-passion-shorts</loc><lastmod>2025-12-16T16:55:14.051Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-your-potential-mastering-growth-over-time</loc><lastmod>2025-12-16T16:55:14.050Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/system-improvement-understanding-past-breaches-for-better-security-shorts</loc><lastmod>2025-12-17T14:02:51.452Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-security-from-tech-fundamentals-to-scaled-solutions</loc><lastmod>2025-12-17T14:02:51.451Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-security-knowledge-skills-and-experience-cycle-shorts</loc><lastmod>2025-12-18T14:03:53.492Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-security-engineering-scale-depth-and-impact</loc><lastmod>2025-12-18T14:03:53.491Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/certification-explained-why-it-matters-how-to-choose-shorts</loc><lastmod>2025-12-19T14:10:34.384Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-journey-from-threat-to-google-engineer</loc><lastmod>2025-12-19T14:10:34.384Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/scaling-community-from-questions-to-a-published-book-shorts</loc><lastmod>2025-12-20T14:14:23.828Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/threat-modeling-at-scale-core-principles-that-never-change-shorts</loc><lastmod>2025-12-21T14:07:30.671Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/kickstart-your-security-career-expert-tips-inside</loc><lastmod>2025-12-21T14:07:30.670Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/your-next-hire-might-be-a-deepfake-with-brian-long-ceo-of-adaptive-security</loc><lastmod>2026-01-05T13:15:10.473Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-impersonation-scam-ceo-deepfake-almost-cost-40-million-shorts</loc><lastmod>2026-01-05T13:15:10.347Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-deepfake-attacks-the-future-of-sophisticated-scams</loc><lastmod>2026-01-05T14:42:47.157Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-evolution-beyond-looks-smarter-ai-attacks-shorts</loc><lastmod>2026-01-06T14:07:18.294Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-powered-social-engineering-the-growing-security-threat</loc><lastmod>2026-01-06T14:07:18.294Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-personas-beyond-voice-and-likeness-shorts</loc><lastmod>2026-01-07T13:23:43.503Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-attacks-ais-evolution-evolving-threats</loc><lastmod>2026-01-07T14:50:25.646Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-hiring-scams-identity-theft-crisis-uncovered-shorts</loc><lastmod>2026-01-08T14:01:31.856Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-hiring-scams-the-new-existential-threat-explained</loc><lastmod>2026-01-08T14:01:31.855Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-attack-almost-cost-millions-ai-security-crisis-shorts</loc><lastmod>2026-01-09T13:11:38.755Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-dangers-identity-theft-ai-chaos-explained</loc><lastmod>2026-01-09T14:38:29.458Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-attack-simulations-secure-your-business-from-deepfakes-shorts</loc><lastmod>2026-01-10T13:52:20.707Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-attacks-the-future-of-cyber-threats-revealed</loc><lastmod>2026-01-10T13:52:20.706Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-anarchy-the-terrifying-future-we-arent-ready-for-shorts</loc><lastmod>2026-01-11T13:05:33.238Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/deepfake-arms-race-detecting-evolving-threats</loc><lastmod>2026-01-11T14:32:30.829Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-grind-and-growth-a-podcasters-journey-with-jack-rhysider-from-darknet-diaries</loc><lastmod>2026-01-12T12:20:06.511Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/darknet-diaries-cia-agents-insane-mission-ep-116-shorts</loc><lastmod>2026-01-12T15:14:26.898Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/nsa-cyber-warfare-officer-vanishes-heres-why</loc><lastmod>2026-01-12T16:41:30.691Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/john-mcafee-unanswered-questions-deepest-regrets-shorts</loc><lastmod>2026-01-13T14:28:27.615Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-in-cybersecurity-job-killer-or-game-changer</loc><lastmod>2026-01-13T14:28:27.615Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-levels-playing-field-companies-now-have-same-tech-as-governments-shorts</loc><lastmod>2026-01-14T15:06:43.051Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cia-spy-stories-ai-in-cybersecurity-darknet-diaries</loc><lastmod>2026-01-14T15:06:43.051Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-and-infosec-jobs-will-robots-take-over-shorts</loc><lastmod>2026-01-15T14:18:50.670Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/doctors-shocking-question-changed-my-life-forever</loc><lastmod>2026-01-15T15:45:58.477Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-power-new-abilities-cybersecurity-arms-race-shorts</loc><lastmod>2026-01-16T14:56:30.716Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-technical-communication-blog-podcast-and-beyond</loc><lastmod>2026-01-16T14:56:30.719Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/dont-get-left-behind-future-shock-is-real-shorts</loc><lastmod>2026-01-17T14:05:25.735Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/podcast-grind-from-episode-7-to-5-years-strong</loc><lastmod>2026-01-17T15:31:40.447Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/interviewing-the-hackers-they-dont-want-you-to-know-shorts</loc><lastmod>2026-01-18T14:36:42.697Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-firewalls-to-fame-mastering-complex-explanations</loc><lastmod>2026-01-18T14:36:42.697Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/building-safer-online-habits-without-becoming-paranoid</loc><lastmod>2026-01-19T14:59:12.009Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-commute-made-me-choose-remote-work-workfromhome-reallife-careerdecision</loc><lastmod>2026-01-21T16:59:09.639Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-idea-to-icon-how-whatismyipaddresscom-changed-everything</loc><lastmod>2026-01-21T16:59:09.597Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/work-life-balance-setting-boundaries-for-sanity-shorts</loc><lastmod>2026-01-22T14:02:01.975Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/work-life-balance-secrets-from-office-to-suburbs</loc><lastmod>2026-01-22T14:02:01.975Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-free-drinks-and-unhackable-caesars-shorts</loc><lastmod>2026-01-23T13:29:11.714Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-privacy-fighting-evil-a-deep-dive</loc><lastmod>2026-01-23T13:29:11.713Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/kohls-lied-about-credit-card-fraud-warning-shorts</loc><lastmod>2026-01-24T14:10:23.603Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/podcast-origins-overcoming-scams-helping-others</loc><lastmod>2026-01-24T14:10:23.604Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breaking-into-security-my-podcast-advice-shorts</loc><lastmod>2026-01-25T13:23:08.389Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/secure-your-digital-life-2fa-data-privacy</loc><lastmod>2026-01-25T13:23:08.389Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-robots-training-revolution-scary-future-shorts</loc><lastmod>2026-01-27T14:10:45.896Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-skeptic-vs-ai-optimist-the-future-of-tech</loc><lastmod>2026-01-27T14:10:45.900Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-robots-are-here-and-your-security-strategy-is-broken-with-ben-wilcox</loc><lastmod>2026-01-27T14:10:45.946Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-revolutionizes-cloud-deployment-azure-aws-landing-zones-shorts</loc><lastmod>2026-01-28T13:07:56.383Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-agents-robots-the-future-of-security-and-automation</loc><lastmod>2026-01-28T14:28:55.820Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/embrace-opportunities-why-saying-yes-leads-to-success-shorts</loc><lastmod>2026-01-29T13:22:17.340Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/navigating-phd-challenges-ais-future-in-security</loc><lastmod>2026-01-29T13:22:17.344Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/insane-federal-standards-the-minds-behind-stigs-revealed-shorts</loc><lastmod>2026-01-30T13:32:34.283Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-microsoft-purview-for-healthcare-data-security</loc><lastmod>2026-01-30T13:32:34.283Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/post-quantum-encryption-unbreakable-security-and-its-implications-shorts</loc><lastmod>2026-01-31T13:37:12.240Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-teen-entrepreneur-to-tech-leader-a-journey</loc><lastmod>2026-01-31T13:37:12.241Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-rapid-evolution-security-techs-new-era-shorts</loc><lastmod>2026-02-01T13:38:26.985Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/unlock-your-potential-think-differently-succeed-bigger</loc><lastmod>2026-02-01T13:38:26.981Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-role-of-lawyers-in-cybersecurity-arent-what-you-think-heres-why-it-matters</loc><lastmod>2026-02-03T12:18:08.162Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-revolutionizes-cybersecurity-hacker-skills-amplified-shorts</loc><lastmod>2026-02-03T17:38:03.788Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-john-kindervag</loc><lastmod>2026-02-03T18:58:00.638Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-powered-cyberattacks-can-we-detect-them-shorts</loc><lastmod>2026-02-04T13:35:01.030Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/chief-trust-officer-revolutionizing-business-through-trust</loc><lastmod>2026-02-04T16:14:45.534Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-explained-speak-like-a-lawyer-shorts</loc><lastmod>2026-02-05T13:27:35.687Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-breaches-preventable-learn-key-strategies-now</loc><lastmod>2026-02-05T13:27:35.691Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-orchestra-pit-to-law-school-a-unique-career-path-shorts</loc><lastmod>2026-02-06T13:18:15.582Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/musicians-daughter-to-tech-lawyer-a-unique-journey</loc><lastmod>2026-02-06T13:18:15.581Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-aaron-costello-on-agentic-ai-zero-days-0pr8</loc><lastmod>2026-02-06T18:36:28.904Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-aaron-costello-on-agentic-ai-zero-days</loc><lastmod>2026-02-06T18:36:28.891Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/law-school-skills-secret-to-success-across-industries-shorts</loc><lastmod>2026-02-07T13:08:03.843Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-cybersecurity-impact-the-future-of-hacking-revealed</loc><lastmod>2026-02-07T14:27:21.717Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/mastering-multiple-perspectives-a-key-skill-shorts</loc><lastmod>2026-02-08T14:11:01.112Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/law-school-skills-the-secret-to-executive-success</loc><lastmod>2026-02-08T14:11:01.113Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hackers-cracked-ai-security-heres-how-they-did-it</loc><lastmod>2026-02-18T13:11:28.333Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-prompt-engineering-vulnerabilities-chatgpt-grok-llms-shorts</loc><lastmod>2026-02-18T13:11:28.276Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-hacking-unveiling-prompt-injection-vulnerabilities-defenses</loc><lastmod>2026-02-18T14:26:46.785Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-the-art-of-faking-it-til-you-make-it</loc><lastmod>2026-02-20T23:16:06.592Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-llms-are-not-as-secure-as-you-think-shorts</loc><lastmod>2026-02-21T00:32:15.079Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-security-llms-are-not-as-secure-as-you-think-shorts-2op7</loc><lastmod>2026-02-21T00:32:15.088Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-it-to-pentesting-my-unexpected-career-path-shorts</loc><lastmod>2026-02-21T13:10:15.826Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/pen-testing-secrets-bypassing-white-lists-gaining-root</loc><lastmod>2026-02-21T14:25:55.394Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/hacking-your-way-in-from-help-desk-to-security-pro-shorts</loc><lastmod>2026-02-22T13:11:45.235Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/from-fake-ids-to-cybersecurity-jasons-incredible-journey</loc><lastmod>2026-02-22T14:27:47.027Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-chris-nyhuis-cyber-warfare-is-the-new-cold-war</loc><lastmod>2026-02-26T16:30:24.539Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-great-cyber-power-struggle-russia-china-iran-and-the-coming-digital-chaos</loc><lastmod>2026-03-02T12:54:33.371Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/agentic-ai-exploding-identities-expanding-attack-surface-shorts</loc><lastmod>2026-03-02T14:09:33.956Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-revolutionizes-ransomware-the-new-attack-surface</loc><lastmod>2026-03-03T13:58:17.100Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/2025-cybersecurity-predictions-ai-cloud-and-geopolitics</loc><lastmod>2026-03-04T13:44:36.695Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-hacks-llms-find-security-flaws-easily</loc><lastmod>2026-03-05T13:30:24.285Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/state-sponsored-hacking-how-you-could-be-targeted-shorts</loc><lastmod>2026-03-06T14:27:01.123Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-agent-mistakes-real-world-dangers-for-consumers-businesses-shorts</loc><lastmod>2026-03-07T14:05:27.993Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cyberproof-insights-2025s-top-cybersecurity-trends-revealed</loc><lastmod>2026-03-08T12:25:05.828Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/zero-trust-the-philosophy-that-rewrote-cybersecurity-with-john-kindervag</loc><lastmod>2026-03-10T12:38:01.953Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-cory-michal</loc><lastmod>2026-03-12T17:40:19.878Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-allie-mellen-author-of-code-war</loc><lastmod>2026-03-13T18:13:59.626Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/the-author-of-code-war-allie-mellen-reveals-how-geo-politics-cyberwar-collide</loc><lastmod>2026-03-16T11:24:46.337Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ai-dangers-when-tech-mishaps-cause-real-world-chaos</loc><lastmod>2026-03-17T13:11:07.905Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-nir-valtmann</loc><lastmod>2026-03-17T19:20:39.011Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/great-firewall-ai-disinformation-the-future-of-trust</loc><lastmod>2026-03-18T12:36:07.586Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/multi-domain-warfare-cyber-attacks-missile-strikes-combined</loc><lastmod>2026-03-19T13:15:57.092Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cybersecurity-geopolitics-russia-china-usa-explained</loc><lastmod>2026-03-20T12:38:52.703Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/ais-china-dilemma-language-manipulation-geopolitical-risks</loc><lastmod>2026-03-21T13:13:02.250Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/china-vs-russia-freedom-control-and-cyber-warfare-secrets</loc><lastmod>2026-03-22T12:25:37.933Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/trust-but-verify-is-dead-embrace-zero-trust-now</loc><lastmod>2026-03-25T12:27:45.050Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/cobol-cowboys-million-dollar-jobs-in-obsolete-tech</loc><lastmod>2026-03-26T12:51:09.286Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/security-unfiltered-is-live-with-scott-stornetta-blockchain-co-inventor</loc><lastmod>2026-03-26T17:42:57.908Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/breached-companys-zero-trust-fail-outdated-fearful-dangerous</loc><lastmod>2026-03-27T13:15:16.967Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/rogue-it-5-cyberark-instances-the-zero-trust-wake-up-call</loc><lastmod>2026-03-28T13:40:09.100Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/forget-cool-tech-why-rarity-old-school-skills-rule-your-career</loc><lastmod>2026-03-29T12:54:28.299Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/why-your-saas-platform-is-an-open-door-for-hackers-and-how-to-stop-it</loc><lastmod>2026-04-01T11:03:27.700Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/servicenow-hack-privileged-escalation-attack-explained-shorts</loc><lastmod>2026-04-01T12:17:36.663Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/servicenow-ai-security-flaw-easy-impersonation-explained-shorts</loc><lastmod>2026-04-02T12:58:20.348Z</lastmod><priority>0.8</priority></url><url><loc>https://securityunfiltered.com/video/body-snatcher-servicenows-critical-ai-vulnerability-revealed-shorts</loc><lastmod>2026-04-03T12:25:24.357Z</lastmod><priority>0.8</priority></url></urlset>