<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <!-- This file was automatically generated by https://github.com/bartholomej/svelte-sitemap v2.7.1 -->
  <url>
    <loc>https://adversarial.com/404</loc>
  </url>
  <url>
    <loc>https://adversarial.com/a-new-post</loc>
  </url>
  <url>
    <loc>https://adversarial.com/about</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-ep-16-cyber-policy-wishlist-rednote-tiktok-marshs-cyber-insurance-report-do-cisos-need-deep-technical-skills</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-ep-17</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-ep-21-chris-krebs-sentinel-ones-clearances-revoked-oracle-hack-how-goldberg-got-added-to-signal-chat-2</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-ep-24-global-lumma-takedown-coinbase-employee-bribed-malicious-mcp-integrations-and-npm-packages</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-ep-27-is-ai-necessary-for-cyber-investment-microsoft-moving-away-from-kernel-based-av-moonlighting-and-fake-it-workers</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-s4e02-cyber-acquisitions-and-raises-95-of-genai-pilots-failing-zelles-alleged-security-lapses</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-s4e06-f5-breach-aws-outage-risk-management-vs-security-engineering</loc>
  </url>
  <url>
    <loc>https://adversarial.com/adversarial-podcast-s4e09-new-pentagon-cio-age-verification-in-australia-microsoft-overhauls-bug-bounty-program</loc>
  </url>
  <url>
    <loc>https://adversarial.com/badcisos</loc>
  </url>
  <url>
    <loc>https://adversarial.com/bio</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog</loc>
  </url>
  <url>
    <loc>https://adversarial.com/bounty</loc>
  </url>
  <url>
    <loc>https://adversarial.com/briefing-your-board-on-cybersecurity-part-1-3-corporate-governance-101-for-security-professionals</loc>
  </url>
  <url>
    <loc>https://adversarial.com/briefing-your-board-on-cybersecurity-part-2-3-full-board-meetings</loc>
  </url>
  <url>
    <loc>https://adversarial.com/briefing-your-board-on-cybersecurity-part-3-3-board-committees-metrics-and-materials</loc>
  </url>
  <url>
    <loc>https://adversarial.com/careers</loc>
  </url>
  <url>
    <loc>https://adversarial.com/content</loc>
  </url>
  <url>
    <loc>https://adversarial.com/cyber-governance-what-is-fair-to-expect-from-board-directors-and-management-2-of-4</loc>
  </url>
  <url>
    <loc>https://adversarial.com/cyber-governance-what-is-fair-to-expect-from-board-directors-and-management-3-of-4</loc>
  </url>
  <url>
    <loc>https://adversarial.com/cyber-governance-what-is-fair-to-expect-from-directors-and-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/cybersecurity-for-investor-relations-and-corporate-governance</loc>
  </url>
  <url>
    <loc>https://adversarial.com/cybersecurity-in-the-three-lines-model</loc>
  </url>
  <url>
    <loc>https://adversarial.com/encryption-is-overrated</loc>
  </url>
  <url>
    <loc>https://adversarial.com/episode-07</loc>
  </url>
  <url>
    <loc>https://adversarial.com/how-much-appsec-is-too-much</loc>
  </url>
  <url>
    <loc>https://adversarial.com/iocs-arent-for-blocking-they-are-for-control-validation</loc>
  </url>
  <url>
    <loc>https://adversarial.com/its-not-the-2fa-its-the-1tp</loc>
  </url>
  <url>
    <loc>https://adversarial.com/making-sense-of-geographic-network-and-travel-restrictions</loc>
  </url>
  <url>
    <loc>https://adversarial.com/network-egress-and-ingress-fundamentals</loc>
  </url>
  <url>
    <loc>https://adversarial.com/on-tprm-sbom-solarwinds-and-supply-chain-security</loc>
  </url>
  <url>
    <loc>https://adversarial.com/patching-is-overrated</loc>
  </url>
  <url>
    <loc>https://adversarial.com/podcast</loc>
  </url>
  <url>
    <loc>https://adversarial.com/privacy</loc>
  </url>
  <url>
    <loc>https://adversarial.com/quick-trick-to-assess-your-vulnerability-to-sim-swapping</loc>
  </url>
  <url>
    <loc>https://adversarial.com/release-notes</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e02</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e03</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e04</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e05</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s01e06</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s02e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s02e02</loc>
  </url>
  <url>
    <loc>https://adversarial.com/s03e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/season-01-episode-04-the-ciso-professor</loc>
  </url>
  <url>
    <loc>https://adversarial.com/subprocessors</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-10-the-ciso-job-market-crq-beg-bounties-cryptography</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-11-incoming-trump-administration-microsofts-leaked-saas-creds-and-software-liability-policy</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-12-rsa-conference-making-competition-winners-accept-investment-inefficacy-of-phishing-training</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-13-east-west-coast-cisos-top-ciso-expenses-in-2024-crypto-regulation</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-14-future-of-cisa-sec-under-trump-us-telco-news-dao-faces-50m-hack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-15-us-china-taiwan-cyber-relations-mobile-app-ads-facilitating-spying-holiday-dos-vulnerabilities</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-18-cisa-cuts-north-koreans-steal-1-5b-in-crypto-planning-for-rsa-conference</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-19-ai-powered-cybercrime-ciso-job-market-the-byol-elephant-in-the-room</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-2-chrome-extension-vulns-cyber-job-market-mouse-jigglers-and-the-ransomware-plague</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-20-corporate-espionage-among-saas-companies-dcs-signal-snafu-where-is-the-cyber-market-going</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-22-rsa-conference-is-here-verizons-2025-data-breach-investigations-report-china-names-alleged-us-hackers</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-23-crowdstrike-layoffs-rsa-innovation-sandbox-new-pentagon-cio</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-25</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-26-us-treasurys-cybersecurity-failures-sec-scraps-proposed-cybersecurity-rules-what-makes-ai-security-different</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-3-crowdstrike-wiz-acquisition-rumors-and-solarwinds</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-4-crowdstrike-lawsuits-overhyped-exploits-and-fake-remote-employees</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-5-why-boards-want-more-joe-sullivans-and-tim-browns-and-less-cisos-jerry-perullo-live-at-evanta</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-6-ssn-leaks-cloud-misconfigurations-and-passkeys</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-7-security-certs-vulnerability-disclosure-and-effective-security-controls</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-8-pagers-and-supply-chain-attacks-github-stealers-founder-mode</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-ep-9-nist-password-guidelines-cups-vulnerabilities-breach-vs-hack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-pilot-cybersecurity-investments-secure-configurations-vs-code-and-risk-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e03-fumbled-npm-attack-entering-the-ai-browser-market-salesloft-breach</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e04-moving-the-needle-awards-effect-of-h-1b-changes-on-cyber-industry-salesloft-aftermath</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e05-oracle-zero-day-us-cyber-info-sharing-law-expires-uk-government-guarantor-for-jaguar-attack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e07-the-password-is-louvre-ai-ransomware-nevada-stands-up-to-ransomware</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e08-shai-hulud-critical-react-vuln-crowdstrike-insider-threat</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e1-trumps-ai-action-plan-chip-security-act-receiving-gifts-from-vendors</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e10-ai-impact-on-cyber-jobs-soc-2-fraud-cisa-polygraph-failure</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-adversarial-podcast-s4e11-iran-internet-blackout-threat-intelligence-briefings-cyber-framework-alignment</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-cisos-guide-to-early-stage-investing</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-risk-acceptance-myth</loc>
  </url>
  <url>
    <loc>https://adversarial.com/the-value-of-the-true-positive</loc>
  </url>
  <url>
    <loc>https://adversarial.com/tos</loc>
  </url>
  <url>
    <loc>https://adversarial.com/vdp</loc>
  </url>
  <url>
    <loc>https://adversarial.com/vulnerability-management-is-dead-but-grc-is-hiring</loc>
  </url>
  <url>
    <loc>https://adversarial.com/what-are-they-after-a-threat-based-approach-to-cybersecurity-risk-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/a-new-post</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-ep-16-cyber-policy-wishlist-rednote-tiktok-marshs-cyber-insurance-report-do-cisos-need-deep-technical-skills</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-ep-17</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-ep-21-chris-krebs-sentinel-ones-clearances-revoked-oracle-hack-how-goldberg-got-added-to-signal-chat-2</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-ep-24-global-lumma-takedown-coinbase-employee-bribed-malicious-mcp-integrations-and-npm-packages</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-ep-27-is-ai-necessary-for-cyber-investment-microsoft-moving-away-from-kernel-based-av-moonlighting-and-fake-it-workers</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-s4e02-cyber-acquisitions-and-raises-95-of-genai-pilots-failing-zelles-alleged-security-lapses</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-s4e06-f5-breach-aws-outage-risk-management-vs-security-engineering</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/adversarial-podcast-s4e09-new-pentagon-cio-age-verification-in-australia-microsoft-overhauls-bug-bounty-program</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/badcisos</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/briefing-your-board-on-cybersecurity-part-1-3-corporate-governance-101-for-security-professionals</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/briefing-your-board-on-cybersecurity-part-2-3-full-board-meetings</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/briefing-your-board-on-cybersecurity-part-3-3-board-committees-metrics-and-materials</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/cyber-governance-what-is-fair-to-expect-from-board-directors-and-management-2-of-4</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/cyber-governance-what-is-fair-to-expect-from-board-directors-and-management-3-of-4</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/cyber-governance-what-is-fair-to-expect-from-directors-and-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/cybersecurity-for-investor-relations-and-corporate-governance</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/cybersecurity-in-the-three-lines-model</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/encryption-is-overrated</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/episode-07</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/how-much-appsec-is-too-much</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/iocs-arent-for-blocking-they-are-for-control-validation</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/its-not-the-2fa-its-the-1tp</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/making-sense-of-geographic-network-and-travel-restrictions</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/network-egress-and-ingress-fundamentals</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/on-tprm-sbom-solarwinds-and-supply-chain-security</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/patching-is-overrated</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/quick-trick-to-assess-your-vulnerability-to-sim-swapping</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e02</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e03</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e04</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e05</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s01e06</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s02e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s02e02</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/s03e01</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/season-01-episode-04-the-ciso-professor</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-10-the-ciso-job-market-crq-beg-bounties-cryptography</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-11-incoming-trump-administration-microsofts-leaked-saas-creds-and-software-liability-policy</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-12-rsa-conference-making-competition-winners-accept-investment-inefficacy-of-phishing-training</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-13-east-west-coast-cisos-top-ciso-expenses-in-2024-crypto-regulation</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-14-future-of-cisa-sec-under-trump-us-telco-news-dao-faces-50m-hack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-15-us-china-taiwan-cyber-relations-mobile-app-ads-facilitating-spying-holiday-dos-vulnerabilities</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-18-cisa-cuts-north-koreans-steal-1-5b-in-crypto-planning-for-rsa-conference</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-19-ai-powered-cybercrime-ciso-job-market-the-byol-elephant-in-the-room</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-2-chrome-extension-vulns-cyber-job-market-mouse-jigglers-and-the-ransomware-plague</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-20-corporate-espionage-among-saas-companies-dcs-signal-snafu-where-is-the-cyber-market-going</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-22-rsa-conference-is-here-verizons-2025-data-breach-investigations-report-china-names-alleged-us-hackers</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-23-crowdstrike-layoffs-rsa-innovation-sandbox-new-pentagon-cio</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-25</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-26-us-treasurys-cybersecurity-failures-sec-scraps-proposed-cybersecurity-rules-what-makes-ai-security-different</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-3-crowdstrike-wiz-acquisition-rumors-and-solarwinds</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-4-crowdstrike-lawsuits-overhyped-exploits-and-fake-remote-employees</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-5-why-boards-want-more-joe-sullivans-and-tim-browns-and-less-cisos-jerry-perullo-live-at-evanta</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-6-ssn-leaks-cloud-misconfigurations-and-passkeys</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-7-security-certs-vulnerability-disclosure-and-effective-security-controls</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-8-pagers-and-supply-chain-attacks-github-stealers-founder-mode</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-ep-9-nist-password-guidelines-cups-vulnerabilities-breach-vs-hack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-pilot-cybersecurity-investments-secure-configurations-vs-code-and-risk-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e03-fumbled-npm-attack-entering-the-ai-browser-market-salesloft-breach</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e04-moving-the-needle-awards-effect-of-h-1b-changes-on-cyber-industry-salesloft-aftermath</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e05-oracle-zero-day-us-cyber-info-sharing-law-expires-uk-government-guarantor-for-jaguar-attack</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e07-the-password-is-louvre-ai-ransomware-nevada-stands-up-to-ransomware</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e08-shai-hulud-critical-react-vuln-crowdstrike-insider-threat</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e1-trumps-ai-action-plan-chip-security-act-receiving-gifts-from-vendors</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e10-ai-impact-on-cyber-jobs-soc-2-fraud-cisa-polygraph-failure</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-adversarial-podcast-s4e11-iran-internet-blackout-threat-intelligence-briefings-cyber-framework-alignment</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-cisos-guide-to-early-stage-investing</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-risk-acceptance-myth</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/the-value-of-the-true-positive</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/vulnerability-management-is-dead-but-grc-is-hiring</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/what-are-they-after-a-threat-based-approach-to-cybersecurity-risk-management</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/advisory</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/ai</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/angel-investing</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/appsec</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/architecture</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/board-of-directors</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/ciso</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/consulting</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/contrarian</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/cyberops</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/departmental-organization</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/entrepreneurship</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/governance</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/grc</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/iam</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/podcast</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/policies</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/talent</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/threat-intelligence</loc>
  </url>
  <url>
    <loc>https://adversarial.com/blog/tag/vulnerability-management</loc>
  </url>
</urlset>