<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersecuritynews.org/2013/07/22/cybersecurity-round-up-critical-infrastructure-and-cyber-resignations/</loc><lastmod>2015-04-30T15:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/07/15/cybersecurity-round-up-commerces-big-cyber-spend-and-def-con/</loc><lastmod>2017-08-13T00:42:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/07/01/cybersecurity-round-up-fireworks-and-phishing/</loc><lastmod>2025-08-09T18:25:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/about/</loc><lastmod>2013-06-27T18:23:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecuritynews.org/2013/06/24/cybersecurity-round-up-sec-nist-doe-and-russia/</loc><lastmod>2016-06-01T07:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/06/10/president-obama-talks-cybersecurity-with-chinese-leader-same-day-report-leaks-on-u-s-hacking-initiative/</loc><lastmod>2019-06-12T15:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/06/03/obama-to-confront-china-on-cyber-espionage/</loc><lastmod>2015-02-24T00:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/05/28/california-new-york-working-to-tackle-cyber-challenges/</loc><lastmod>2017-08-17T05:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/05/13/pentagon-says-china-modernizing-military-program/</loc><lastmod>2015-01-07T16:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/04/15/house-to-take-up-cispa-amid-privacy-concerns/</loc><lastmod>2017-07-13T05:55:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/04/22/senate-has-work-to-do-as-house-passes-three-cyber-bills/</loc><lastmod>2015-11-05T19:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/05/06/u-s-confronts-top-cyber-adversaries/</loc><lastmod>2020-02-08T18:08:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/04/09/north-and-south-korea-prep-for-cyberwar/</loc><lastmod>2017-02-27T04:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/03/25/us-presses-china-on-cyber-attacks/</loc><lastmod>2016-01-01T14:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/03/05/white-house-debating-vigorously-when-to-respond-to-cyber-attacks/</loc><lastmod>2015-06-04T05:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/03/11/pentagon-unprepared-to-defend-against-cyber-attacks/</loc><lastmod>2015-06-15T08:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/02/18/executive-order-receives-mixed-reviews/</loc><lastmod>2015-08-04T10:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/02/11/white-house-cyber-order-and-renewed-cispa-both-expected-this-week/</loc><lastmod>2016-08-29T01:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/02/04/fortune-500-companies-back-cyber-reform/</loc><lastmod>2015-02-19T09:28:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/01/28/senate-democrats-propose-new-cybersecurity-bill/</loc><lastmod>2013-09-15T03:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/01/22/red-october-attack-goes-dark-after-big-reveal/</loc><lastmod>2015-06-09T15:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/11/19/with-legislation-stalling-whats-next-for-us-cybersecurity/</loc><lastmod>2014-10-24T07:04:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/01/14/ceos-call-for-increased-public-private-cyber-collaboration/</loc><lastmod>2014-12-13T07:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2013/01/07/2013-defense-budget-outlines-new-mandates-to-enhance-cybersecurity/</loc><lastmod>2015-01-18T14:32:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/12/17/targeted-cyber-attack-poses-credible-threat-to-us-banks/</loc><lastmod>2015-01-07T16:42:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/12/03/new-draft-of-white-house-cyber-executive-order-surfaces/</loc><lastmod>2013-05-09T17:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/11/12/little-hope-for-cybersecurity-in-the-lame-duck/</loc><lastmod>2016-03-17T02:32:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/10/29/un-criticizes-irans-cybersecurity-strategy/</loc><lastmod>2014-08-25T08:53:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/04/13/hackers-take-on-cyber-bill/</loc><lastmod>2012-10-31T20:32:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/04/27/cispa-passes-house-faces-senate-hurdles/</loc><lastmod>2012-10-31T20:32:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/10/23/kaspersky-discovers-miniflame-and-develops-new-exploit-free-os/</loc><lastmod>2014-09-26T13:17:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/10/15/dod-adopts-new-rules-for-defending-us-in-cyber-space/</loc><lastmod>2014-10-01T20:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/10/08/cyber-dialogue-attacks-seen-around-cybersecurity-awareness-month/</loc><lastmod>2015-05-04T08:06:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/10/02/new-report-examines-the-future-of-cyber/</loc><lastmod>2014-09-23T14:07:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/09/24/iran-refutes-charges-of-cyber-attacks-on-us-banks/</loc><lastmod>2013-07-28T07:04:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/09/17/leaked-draft-of-executive-order-causes-cyber-stir/</loc><lastmod>2012-10-09T13:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/contact/</loc><lastmod>2012-09-21T01:20:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecuritynews.org/2012/09/07/companies-committees-take-on-looming-cyber-threats/</loc><lastmod>2014-09-19T15:24:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/08/31/obama-administration-considers-cybersecurity/</loc><lastmod>2012-09-17T15:17:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/08/24/federal-agency-audits-show-cyber-vulnerabilities/</loc><lastmod>2013-06-06T01:21:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/08/17/cyber-threats-rise-to-interplanetary-level/</loc><lastmod>2012-10-13T22:59:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/08/03/cyber-bill-stalls-in-the-senate/</loc><lastmod>2012-08-19T18:50:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/07/27/senate-votes-to-move-on-cyber-legislation-in-last-ditch-effort/</loc><lastmod>2015-10-20T06:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/07/20/report-information-sharing-not-meeting-nations-needs/</loc><lastmod>2014-06-06T08:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/07/13/intelligence-insiders-advise-senate-to-move-on-cyber-legislation/</loc><lastmod>2012-07-29T14:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/06/29/hackers-take-a-hit-as-cybersecurity-industry-booms/</loc><lastmod>2013-02-03T09:49:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/05/18/new-us-cyber-czar-amid-emerging-cyber-threats/</loc><lastmod>2014-10-05T14:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/05/25/al-qaeda-cyber-capabilities-and-us-regulations-raise-concern/</loc><lastmod>2013-04-12T09:31:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/06/01/middle-east-fights-flame-cyber-attack/</loc><lastmod>2012-06-25T18:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/06/08/obama-reacts-as-flame-cyber-attack-ignites-controversy/</loc><lastmod>2012-06-25T18:08:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/06/15/senators-see-cyber-attack-demo-urge-legislative-action/</loc><lastmod>2013-06-12T00:23:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/06/22/iran-detects-attack-japan-develops-daedalus/</loc><lastmod>2012-07-09T13:32:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/30/stuxnet-and-the-cyber-storm/</loc><lastmod>2012-06-07T16:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/04/19/report-global-critical-infrastructure-at-risk-as-cyber-threats-rise/</loc><lastmod>2012-06-05T16:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/01/06/2012-outlook-japans-cyber-defense-congress-considers-legislation/</loc><lastmod>2012-05-22T15:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/01/13/the-pentagon-power-grid-and-israel-on-the-cyber-defense/</loc><lastmod>2014-06-25T16:07:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/01/20/sopa-cyber-attacks-and-security-legislation-on-the-way/</loc><lastmod>2012-05-22T15:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/02/03/house-senate-dhs-cyber-initiatives/</loc><lastmod>2017-07-22T20:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/02/10/awaiting-the-senate-cyber-bill/</loc><lastmod>2012-05-22T15:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/02/17/senate-cyber-bill-gets-mixed-reviews/</loc><lastmod>2012-05-22T15:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/03/05/alternative-senate-cyber-bill-and-the-rsa-conference-recap/</loc><lastmod>2014-06-07T20:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/03/16/cyber-attacks-up-for-public-and-private-review/</loc><lastmod>2012-05-22T15:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/03/30/congress-dod-and-north-korea-move-on-cyber/</loc><lastmod>2012-05-22T15:17:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2012/04/05/senator-casts-outlook-on-national-interest-in-global-conflicts/</loc><lastmod>2012-05-22T15:15:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/07/hackers-wanted-for-cyber-fast-track/</loc><lastmod>2012-03-22T02:30:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/03/11/ethical-vs-unethical-hackers-reaping-monetary-rewards-this-week/</loc><lastmod>2012-03-22T02:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/07/26/new-leader-for-us-cert-new-wrist-slap-for-dod/</loc><lastmod>2013-04-16T16:52:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/08/10/china-denies-being-villain-in-newly-reported-global-cyber-attacks/</loc><lastmod>2012-03-05T14:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/28/senators-kill-the-kill-switch-with-call-for-cyber-transparency/</loc><lastmod>2012-03-19T01:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/03/18/beyond-the-budget-democrats-back-cyber-bills/</loc><lastmod>2012-02-10T02:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/12/23/happy-holidays-from-cybersecurity-news-2/</loc><image:image><image:loc>https://cybersecuritynews.org/wp-content/uploads/2011/12/1189456_26.jpg</image:loc><image:title>Happy Holidays</image:title></image:image><lastmod>2014-04-13T09:52:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/07/15/pentagon-reveals-new-cyber-strategy/</loc><lastmod>2013-06-14T10:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/06/21/senate-committee-holds-hearing-on-cybersecurity-today/</loc><lastmod>2011-06-21T16:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/06/07/catching-up-on-cybersecurity-news/</loc><lastmod>2011-06-07T09:54:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/05/25/with-gratitude-milestone-hit-cybersecurity-news-turns-1/</loc><lastmod>2011-05-25T19:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/05/17/obama-administration-pushes-for-more-national-international-cyber-oversight/</loc><lastmod>2011-05-17T20:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/02/more-senate-cyber-legislation-and-house-smart-grid-cyber-concerns/</loc><lastmod>2011-05-17T18:58:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/14/us-cio-unveils-government-shift-to-cloud-computing/</loc><lastmod>2014-09-02T17:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/05/09/third-time-a-charm-for-sony/</loc><lastmod>2014-10-12T05:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/27/un-uk-va-aiming-for-cyber-control/</loc><lastmod>2011-04-28T20:11:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/30/black-hat-white-collar-former-nsa-cia-director-makes-his-cyber-mark/</loc><lastmod>2013-10-18T23:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/15/a-shot-in-the-defense-dark-for-cybersecurity/</loc><lastmod>2011-04-28T20:10:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/04/27/%e2%80%98stars%e2%80%99-out-for-irans-information-systems/</loc><lastmod>2015-07-20T07:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/04/14/wordpress-livejournal-blog-beaches-effect-millions-across-globe/</loc><lastmod>2011-04-14T16:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/04/04/cyber-hit-puts-banking-and-retail-customers-at-risk/</loc><lastmod>2015-02-19T17:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/03/30/cybersecurity-mission-impossible/</loc><lastmod>2011-05-13T04:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/03/08/attacks-abroad-raise-cyber-debate-at-home/</loc><lastmod>2011-03-08T17:16:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/03/the-vulnerabilities-of-the-power-grid-and-the-private-sector/</loc><lastmod>2012-02-19T02:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/29/deals-and-steals-for-wikileaks-on-cyber-monday/</loc><lastmod>2011-02-28T17:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/16/white-house-cybersecurity-team-pushes-for-private-sector-collaboration/</loc><lastmod>2011-02-16T19:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/15/us-deputy-defense-secretary-reveals-cyber-3-0-details/</loc><lastmod>2011-02-15T23:43:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/25/update-deputy-of-defense-publishes-paper-to-confirm-2008-cyber-breach/</loc><lastmod>2014-12-23T03:02:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/09/rsa-conference-preview-the-cloud-mobile-security-and-privacy/</loc><lastmod>2014-08-30T00:24:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/02/01/egypt%e2%80%99s-web-disconnect-spurs-us-cyber-debate/</loc><lastmod>2014-10-04T22:10:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/01/27/enhancing-state-of-the-union-will-require-private-sector-support/</loc><lastmod>2011-01-27T22:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/01/18/examining-the-power-of-a-cyber-attack/</loc><lastmod>2011-11-27T14:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/01/11/new-cybersecurity-posts-create-new-jobs-and-same-old-fears/</loc><lastmod>2014-10-17T19:42:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2011/01/04/catching-up-with-cybersecurity/</loc><lastmod>2011-01-04T21:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/24/happy-holidays-from-cybersecurity-news/</loc><lastmod>2010-12-24T18:39:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/16/dhs-secretary-napolitano-cybersecurity-is-a-collaborative-effort/</loc><lastmod>2023-02-16T15:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/14/cyber-legislation-introduced-amidst-attacks/</loc><lastmod>2015-06-03T11:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/09/more-notables-fall-victim-to-wikileaks-supporters%e2%80%99-cyber-attacks/</loc><lastmod>2010-12-09T22:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/08/increase-in-cyber-attacks-seen-around-the-globe/</loc><lastmod>2010-12-08T22:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/12/03/wikileaks-faces-more-cyber-attacks-congressional-condemnation/</loc><lastmod>2010-12-31T06:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/25/thanksgiving-catch-up/</loc><lastmod>2010-11-25T19:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/17/dhs-official-stuxnet-is-a-%e2%80%98game-changer%e2%80%99-threat-to-us-cybersecurity/</loc><lastmod>2010-11-22T17:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/16/facebook-friends-cybersecurity/</loc><lastmod>2012-01-14T13:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/16/new-reports-find-us-cyber-vulnerabilities/</loc><lastmod>2010-11-16T17:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/11/congress-cybersecurity-on-again-off-again%e2%80%a6-again/</loc><lastmod>2010-11-11T18:06:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/10/cyberheisting-a-hackers-story/</loc><lastmod>2013-11-01T00:48:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/11/04/elections-cause-delays-here-attacks-there/</loc><lastmod>2010-11-04T20:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/10/28/lame-ducking-cybersecurity/</loc><lastmod>2010-10-28T19:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/10/26/a-week-of-spooks-for-cybersecurity/</loc><lastmod>2014-09-23T19:13:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/10/22/abstinence-the-best-cybersecurity/</loc><lastmod>2015-05-27T08:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/24/us-and-iran-both-focus-on-cyber-defense-this-week/</loc><lastmod>2010-09-24T16:57:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/10/sealing-a-senate-cyber-deal-and-battening-down-dhs-hatches/</loc><lastmod>2010-09-10T18:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/02/the-fate-of-a-cyber-bill-post-pentagon-breach/</loc><lastmod>2010-09-10T15:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/09/08/nist-releases-guidelines-for-smart-gird-cyber-security/</loc><lastmod>2010-09-08T18:29:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/25/defending-the-cyber-world-news-from-the-pentagon-and-beyond/</loc><lastmod>2023-06-21T08:28:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/19/twitter-and-the-tale-of-the-two-koreas/</loc><lastmod>2010-08-19T17:35:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/16/cyber-tensions-in-asia/</loc><lastmod>2010-08-16T22:36:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/11/sen-lieberman-and-more-overkill-for-the-kill-switch/</loc><lastmod>2010-08-11T17:02:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/05/senate-committee-approves-cyber-legislation/</loc><lastmod>2010-08-05T19:29:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/08/02/preventing-a-cyber-attack-the-100-million-question/</loc><lastmod>2010-08-02T19:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/29/wikileaks-and-black-hat-a-busy-week-for-the-cyber-world/</loc><lastmod>2010-07-29T15:33:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/21/preparing-for-cyberwar/</loc><lastmod>2010-07-22T17:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/20/650/</loc><lastmod>2010-07-20T13:46:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/14/update-white-house-cyber-meeting-today/</loc><lastmod>2016-01-08T01:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/13/white-house-plans-mysterious-cyber-meeting/</loc><lastmod>2010-07-13T16:39:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/08/a-%e2%80%98perfect-citizen%e2%80%99-in-a-cyber-world/</loc><lastmod>2010-07-09T21:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/07/cracking-code-and-taking-cyber-heat/</loc><lastmod>2010-07-07T22:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/07/06/recapping-the-july-4-attack-and-calling-for-a-cyber-step-up/</loc><lastmod>2014-04-14T14:04:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/29/us-russia-cyber-ties-and-spies/</loc><lastmod>2010-07-07T14:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/22/cybersecurity-heats-up-in-washington/</loc><lastmod>2010-07-07T14:25:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/25/cybersecurity-coming-a-long-way-since-september-11/</loc><lastmod>2010-07-07T14:24:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/28/cyber-bill-concerns-and-competition/</loc><lastmod>2010-07-07T14:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/21/cybersecurity-legislation-and-a-license-to-kill-switch/</loc><lastmod>2010-06-23T22:37:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/17/dhs-cyber-woes-and-congressional-cybersecurity-%e2%80%98solutions%e2%80%99/</loc><lastmod>2014-03-16T19:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/16/dhs-inspector-general-to-testify-on-us-cybersecurity-shortfalls-today/</loc><lastmod>2010-06-16T14:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/15/update-senate-security-hearing-on-protecting-cyberspace-as-a-national-asset-act/</loc><lastmod>2010-06-15T22:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/15/us-canada-linked-in-attack-att-and-ipad-still-on-cyber-radar/</loc><lastmod>2010-06-15T16:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/14/more-attacks-hit-s-korea-and-apple-irks-congress/</loc><lastmod>2022-07-13T07:15:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/09/317/</loc><lastmod>2010-06-14T15:33:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/11/iphone-ipad-isecurity/</loc><lastmod>2010-06-13T21:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/10/cybersecurity-a-national-asset/</loc><lastmod>2010-06-11T19:32:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/11/fast-tracks-for-cyber-attacks/</loc><lastmod>2010-06-11T19:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/10/new-cyber-legislation-expected-today/</loc><lastmod>2010-06-10T13:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/09/computer-security-and-national-security-finding-a-link/</loc><lastmod>2014-04-01T18:53:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/08/afternoon-wrap-senators-penn-state-and-cyber-crime/</loc><lastmod>2010-06-09T01:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/03/morning-roundup-4/</loc><lastmod>2010-06-09T01:15:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/03/afternoon-wrap-the-potential-for-cyber-sabotage/</loc><lastmod>2014-10-13T00:27:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/28/morning-roundup/</loc><lastmod>2010-06-09T01:13:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/28/afternoon-fix-2/</loc><lastmod>2010-06-09T01:12:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/01/morning-roundup-2/</loc><lastmod>2013-12-17T17:57:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/02/morning-roundup-3/</loc><lastmod>2010-06-09T01:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/02/afternoon-wrap-imminent-cyber-attacks-legislation-and-lobbying/</loc><lastmod>2010-06-09T01:11:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/04/morning-roundup-us-cyber-ties-to-india-russia/</loc><lastmod>2010-06-09T01:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/07/afternoon-wrap-the-iphone-4-and-mobile-security/</loc><lastmod>2010-06-09T01:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/06/08/morning-roundup-nato-and-attacks-across-asia/</loc><lastmod>2010-06-09T01:08:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/27/morning-roundup-may-27-2010/</loc><lastmod>2011-08-31T16:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/27/afternoon-fix/</loc><lastmod>2010-06-09T01:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/25/17/</loc><lastmod>2010-06-03T14:55:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/26/industry-pushes-obama-for-cyber-policy/</loc><lastmod>2010-06-03T14:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org/2010/05/27/intelligence-committee-staffer-to-white-house/</loc><lastmod>2010-06-03T14:50:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritynews.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-09T18:25:30+00:00</lastmod></url></urlset>
