<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7-a.7'-->
<!--Jetpack_Sitemap_Buffer_Page_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//secure-scroll.com/sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 <url>
  <loc>https://secure-scroll.com/</loc>
 </url>
 <url>
  <loc>https://secure-scroll.com/about/</loc>
  <lastmod>2025-06-30T13:35:00Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/06/30/the-digital-guardians-genesis-how-cybersecurity-entered-our-world/</loc>
  <lastmod>2025-07-01T09:35:03Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/07/01/from-locked-doors-to-ai-defense-three-important-stages-of-cyber-security-from-then-to-now/</loc>
  <lastmod>2025-07-01T14:02:24Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/07/02/decoding-the-layers-of-cybersecurity-the-invisible-guardians/</loc>
  <lastmod>2025-07-02T13:10:54Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/07/03/cyber-security-organizations-evolution-beyond-the-shield/</loc>
  <lastmod>2025-07-03T14:46:18Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/07/18/from-hours-to-minutes-role-of-generative-ai/</loc>
  <lastmod>2025-07-18T08:15:41Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/09/17/grc-demystified-turning-boardroom-policy-into-actionable-security/</loc>
  <lastmod>2025-09-17T15:00:12Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/10/27/dont-wait-for-a-breach-a-beginners-guide-to-threat-modeling/</loc>
  <lastmod>2025-10-27T10:56:57Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/06/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool/</loc>
  <lastmod>2025-11-06T15:44:56Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/11/24/demystifying-digital-defenses-a-beginners-guide-to-microsofts-threat-modeling-tool-part-2/</loc>
  <lastmod>2025-11-24T13:45:38Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/12/02/taming-the-beast-how-to-analyze-and-fix-your-threat-model-results/</loc>
  <lastmod>2025-12-02T09:41:27Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2025/12/09/from-modeling-to-hunting-using-your-blueprints-to-catch-hackers/</loc>
  <lastmod>2025-12-09T14:09:26Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/01/12/the-sandworm-in-your-software-understanding-the-shai-hulud-npm-attack/</loc>
  <lastmod>2026-01-12T13:33:11Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/01/22/the-watchtower-chronicles-part-1-decoding-the-soc-the-essential-vocabulary/</loc>
  <lastmod>2026-01-22T10:03:00Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/03/the-watchtower-chronicles-part-2-the-eyes-of-the-beast-mastering-visibility/</loc>
  <lastmod>2026-02-03T15:01:37Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/12/the-watchtower-chronicles-part-3-signal-in-the-noise-writing-your-first-detection-rule/</loc>
  <lastmod>2026-02-12T15:15:33Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/17/the-watchtower-chronicles-part-4-the-red-phone-rings-triaging-your-first-alert/</loc>
  <lastmod>2026-02-17T10:04:59Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/02/18/the-watchtower-chronicles-part-5-beyond-the-screen-automation-improvement/</loc>
  <lastmod>2026-02-18T14:28:01Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/11/the-ai-whisperer-how-to-analyze-soc-logs-with-local-ai-without-leaking-company-secrets/</loc>
  <lastmod>2026-03-11T09:08:45Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/20/the-evolution-of-the-all-seeing-eye-part-1-from-legacy-siem-to-xdr/</loc>
  <lastmod>2026-03-20T12:33:19Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/23/the-evolution-of-the-all-seeing-eye-part-2-the-smart-radar-threat-intel-ueba/</loc>
  <lastmod>2026-03-23T10:45:16Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/24/the-evolution-of-the-all-seeing-eye-part-3-the-universal-playbook-mitre-attck/</loc>
  <lastmod>2026-03-24T14:34:21Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/03/25/the-evolution-of-the-all-seeing-eye-part-4-the-hunters-toolkit-navigating-the-data-lake/</loc>
  <lastmod>2026-03-25T09:47:49Z</lastmod>
 </url>
 <url>
  <loc>https://secure-scroll.com/2026/04/01/the-evolution-of-the-all-seeing-eye-part-5-building-the-radar-implementation-pitfalls/</loc>
  <lastmod>2026-04-01T10:36:11Z</lastmod>
 </url>
</urlset>
