<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//secure-scroll.com/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://secure-scroll.com/2025/07/02/decoding-the-layers-of-cybersecurity-the-invisible-guardians/</loc>
  <lastmod>2025-07-02T10:27:41Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/07/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/07/18/from-hours-to-minutes-role-of-generative-ai/</loc>
  <lastmod>2025-07-15T15:03:26Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/07/image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/09/17/grc-demystified-turning-boardroom-policy-into-actionable-security/</loc>
  <lastmod>2025-09-17T14:53:17Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/09/gemini_generated_image_3z9pfm3z9pfm3z9p.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/09/17/grc-demystified-turning-boardroom-policy-into-actionable-security/</loc>
  <lastmod>2025-09-17T14:55:12Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/09/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/10/27/dont-wait-for-a-breach-a-beginners-guide-to-threat-modeling/</loc>
  <lastmod>2025-10-27T10:42:10Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/10/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/06/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool/</loc>
  <lastmod>2025-11-06T13:12:17Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/11/screenshot-2025-11-06-184158.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/06/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool/</loc>
  <lastmod>2025-11-06T13:35:14Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/11/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/06/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool/</loc>
  <lastmod>2025-11-06T13:36:42Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/11/image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/24/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool-part-2/</loc>
  <lastmod>2025-11-24T13:42:14Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/11/image-2.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/12/02/taming-the-beast-how-to-analyze-and-fix-your-threat-model-results/</loc>
  <lastmod>2025-12-02T09:30:30Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2025/12/gemini_generated_image_a6989ga6989ga698.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/01/12/the-sandworm-in-your-software-understanding-the-shai-hulud-npm-attack/</loc>
  <lastmod>2026-01-12T12:57:47Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/01/gemini_generated_image_4l35b24l35b24l35.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/01/22/the-watchtower-chronicles-part-1-decoding-the-soc-the-essential-vocabulary/</loc>
  <lastmod>2026-01-22T09:56:18Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/01/gemini_generated_image_hyeziohyeziohyez.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/03/the-watchtower-chronicles-part-2-the-eyes-of-the-beast-mastering-visibility/</loc>
  <lastmod>2026-02-03T14:54:53Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/02/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/03/the-watchtower-chronicles-part-2-the-eyes-of-the-beast-mastering-visibility/</loc>
  <lastmod>2026-02-03T14:56:05Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/02/image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/17/the-watchtower-chronicles-part-4-the-red-phone-rings-triaging-your-first-alert/</loc>
  <lastmod>2026-02-17T10:02:28Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/02/Screenshot-2026-02-17-153149.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/18/the-watchtower-chronicles-part-5-beyond-the-screen-automation-improvement/</loc>
  <lastmod>2026-02-18T14:21:40Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/02/Screenshot-2026-02-18-194821.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/11/the-ai-whisperer-how-to-analyze-soc-logs-with-local-ai-without-leaking-company-secrets/</loc>
  <lastmod>2026-03-11T09:07:06Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/Screenshot-2026-03-11-143632.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/20/the-evolution-of-the-all-seeing-eye-part-1-from-legacy-siem-to-xdr/</loc>
  <lastmod>2026-03-20T11:39:52Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/Screenshot-2026-03-20-170919.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/20/the-evolution-of-the-all-seeing-eye-part-1-from-legacy-siem-to-xdr/</loc>
  <lastmod>2026-03-20T12:13:19Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/Screenshot-2026-03-20-174216.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/23/the-evolution-of-the-all-seeing-eye-part-2-the-smart-radar-threat-intel-ueba/</loc>
  <lastmod>2026-03-23T09:52:10Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/24/the-evolution-of-the-all-seeing-eye-part-3-the-universal-playbook-mitre-attck/</loc>
  <lastmod>2026-03-24T14:19:00Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/image-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/24/the-evolution-of-the-all-seeing-eye-part-3-the-universal-playbook-mitre-attck/</loc>
  <lastmod>2026-03-24T14:30:48Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/image-2.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/25/the-evolution-of-the-all-seeing-eye-part-4-the-hunters-toolkit-navigating-the-data-lake/</loc>
  <lastmod>2026-03-25T09:45:54Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/03/image-3.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/04/01/the-evolution-of-the-all-seeing-eye-part-5-building-the-radar-implementation-pitfalls/</loc>
  <lastmod>2026-04-01T10:31:58Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/04/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/04/01/the-evolution-of-the-all-seeing-eye-part-5-building-the-radar-implementation-pitfalls/</loc>
  <lastmod>2026-04-01T10:33:10Z</lastmod>
  <image:image>
   <image:loc>https://secure-scroll.com/wp-content/uploads/2026/04/image-1.png</image:loc>
  </image:image>
 </url>
</urlset>
