<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.securityin45.com/blog/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/casb/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/cisco/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2026-03-30-cisco-ise-configuration-guide/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/endpoint-security/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/firewall/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/identity/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/incident-response/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/mfa/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/network-security/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/secure-access/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>1</priority></url><url><loc>https://www.securityin45.com/tags/segmentation/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/sse/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/swg/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/threat-intelligence/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/vpn/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/xdr/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/zero-trust/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/ztna/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/authentication/</loc><lastmod>2026-03-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2026-03-27-identity-is-the-new-perimeter-how-attackers-bypass-mfa-in-2026/</loc><lastmod>2026-03-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/iga/</loc><lastmod>2026-03-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/podcast/</loc><lastmod>2026-03-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/security-in-45/</loc><lastmod>2026-03-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/automation/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/compliance/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/encryption/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2026-02-09-zero-trust-in-the-real-world/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/duo/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/multicloud/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/season-2/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/aws/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/azure/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/dlp/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/gcp/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/ai-security/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/pillars/firewall/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/cloud-security/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/pillars/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/siem/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/snort/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/tags/vulnerability-management/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/pillars/xdr/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</loc><lastmod>2026-03-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/pillars/zero-trust/</loc><lastmod>2026-03-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://www.securityin45.com/about/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/glossary/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/search/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.securityin45.com/seasons/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>