<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://guided-security.com/2023/04/14/leveraging-terraform-and-aws-vpc-flow-logs-with-meta-fields-for-enhanced-monitoring/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2023/04/pexels-photo-710906.jpeg</image:loc><image:title>running water surrounded of trees and plants</image:title><image:caption>Photo by Tabitha  Mort on &lt;a href="https://www.pexels.com/photo/running-water-surrounded-of-trees-and-plants-710906/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-04-14T15:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2022/02/22/siem-use-cases/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2022/02/pexels-photo-356043.jpeg</image:loc><image:title>clear light bulb on black surface</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/clear-light-bulb-on-black-surface-356043/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-02-22T13:52:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2022/02/10/sumologic-and-terraform-detection-as-code/</loc><lastmod>2022-02-10T21:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2022/01/31/corporate-blog-mailguns-log4j-defense/</loc><lastmod>2022-01-31T15:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2021/09/13/so-you-want-to-get-into-cybersecurity/</loc><lastmod>2021-09-13T13:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2021/09/10/the-10-immutable-laws-of-security-administration/</loc><lastmod>2021-09-10T15:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2021/09/10/corporate-blog-a-look-at-the-kaseya-incident/</loc><lastmod>2021-09-10T15:07:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2020/07/28/s3-replication-with-kms/</loc><lastmod>2020-07-28T19:55:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2020/07/15/multiple-kms-principals-in-terraform/</loc><lastmod>2020-07-17T14:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/about/</loc><lastmod>2020-07-13T14:47:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://guided-security.com/reading-list/</loc><lastmod>2020-07-13T14:46:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://guided-security.com/2020/04/29/covid19-threat-sharing-group/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2020/04/cctc_logo_iconwithtext_white.png</image:loc><image:title>CCTC_Logo_IconWithText_White</image:title></image:image><lastmod>2020-04-29T11:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2020/04/07/initial-security-onion-problems/</loc><lastmod>2020-04-07T10:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2020/04/03/threat-emulation-tune-tune-tune/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2020/04/red-factor-canary-1.jpg</image:loc><image:title>red-factor-canary-1</image:title></image:image><image:image><image:loc>https://guided-security.com/wp-content/uploads/2020/04/transparent-redfactorcanary.png</image:loc><image:title>transparent-RedFactorCanary</image:title></image:image><lastmod>2020-04-03T12:24:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/11/24/network-flight-simulator/</loc><lastmod>2019-11-25T02:30:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/11/16/another-cloud-forensics-workshop/</loc><lastmod>2019-11-16T17:07:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/09/02/sans-gcih-log-5/</loc><lastmod>2019-09-02T15:34:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/08/13/sans-gcih-log-3/</loc><lastmod>2019-08-21T01:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/08/20/sans-gcih-log-4/</loc><lastmod>2019-08-21T01:49:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/08/06/sans-gcih-log-2/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/08/ipv4-headers.png</image:loc><image:title>IPv4-headers</image:title></image:image><lastmod>2019-08-07T01:10:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/07/31/sans-gcih-log-1/</loc><lastmod>2019-08-01T02:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/07/30/cult-of-the-dead-cow/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/07/cult-of-the-dead-cow.jpg</image:loc><image:title>cult of the dead cow</image:title></image:image><lastmod>2019-07-30T11:07:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/06/09/on-boarding-challenges/</loc><lastmod>2019-06-10T02:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/05/26/the-cuckoos-egg/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/05/cuckoosegg.png</image:loc><image:title>cuckoosEgg</image:title></image:image><lastmod>2019-05-26T15:34:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/05/26/boyd-the-fighter-pilot-who-changed-the-art-of-war/</loc><lastmod>2019-05-26T14:49:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/02/03/the-damn-vulnerable-serverless-application/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/01/1_16x1_xeclxt4mb0fn_xr2g.jpeg</image:loc><image:title>1_16x1_xeclxt4mb0fn_xr2g</image:title></image:image><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/01/serverless_mark_black_400x400_v3@2x-e1548822061977.jpg</image:loc><image:title>serverless_mark_black_400x400_v3@2x</image:title></image:image><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/01/acloudguru.png</image:loc><image:title>acloudguru</image:title></image:image><lastmod>2019-02-03T15:55:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2018/07/06/demisto-playbooks/</loc><lastmod>2019-01-27T15:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2018/07/05/incident-readiness/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2018/07/2dhmgm.jpg</image:loc><image:title>Mayhem</image:title></image:image><lastmod>2019-01-27T15:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2019/01/09/fingerprinting-with-aquatone/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2019/01/fingerprinting-913879566-701x423.jpg</image:loc><image:title>fingerprinting-913879566-701x423</image:title></image:image><lastmod>2019-01-27T14:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2018/07/10/vulnerability-management-fatigue/</loc><image:image><image:loc>https://guided-security.com/wp-content/uploads/2018/07/fatigue.jpg</image:loc><image:title>fatigue</image:title></image:image><lastmod>2019-01-20T02:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com/2018/04/19/asset-management/</loc><lastmod>2018-04-20T01:01:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://guided-security.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-04-14T15:32:56+00:00</lastmod></url></urlset>
