<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://safecontrols.blog/2026/04/03/how-can-you-make-your-ai-project-compliant/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/04/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-04-03T21:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2026/03/15/ai-powered-tabletop-exercises-risks-and-benefits/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title><image:caption>TTX from AI</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-15T21:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2026/01/23/beyond-seo-how-to-optimize-your-wordpress-blog-for-ai-answer-engines/</loc><lastmod>2026-01-29T19:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/12/02/a-small-ai-experiment-automated-newsletter-with-individual-messaging/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-23T09:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2026/01/01/supply-chain-security-transform-your-suppliers-from-swiss-cheese-to-fortress-in-12-months/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/01/trucking-posture.png</image:loc><image:title>trucking-posture</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2026/01/secure-trucking.png</image:loc><image:title>secure-trucking</image:title></image:image><lastmod>2026-01-23T09:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/10/10/how-cyber-resilience-is-different-from-security-posture/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/10/gemini_generated_image_nhnzrwnhnzrwnhnz.png</image:loc><image:title>Gemini_Generated_Image_nhnzrwnhnzrwnhnz</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/10/gemini_generated_image_vxdetfvxdetfvxde-1.png</image:loc><image:title>Gemini_Generated_Image_vxdetfvxdetfvxde</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/10/gemini_generated_image_vxdetfvxdetfvxde.png</image:loc><image:title>Gemini_Generated_Image_vxdetfvxdetfvxde</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-10T18:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/09/10/do-we-invest-too-much-in-risk-assessments-and-too-little-in-security/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-10T20:55:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/08/30/ot-and-cloud-sikkerhetsfestivalen-2025/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/08/pxl_20250825_082036108-1.jpg</image:loc><image:title>pxl_20250825_082036108-1</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/08/pxl_20250825_082036108.jpg</image:loc><image:title>pxl_20250825_082036108</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/08/image-1-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-30T21:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/07/18/sick-of-security-theater-focus-on-these-5-basics-before-anything-else/</loc><lastmod>2025-07-18T16:48:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/07/09/building-a-boom-barrier-for-a-security-conference/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/07/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/07/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/07/pxl_20250708_183235964.jpg</image:loc><image:title>pxl_20250708_183235964</image:title></image:image><lastmod>2025-07-10T07:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/caiberintel-free-threat-intel/</loc><lastmod>2025-06-18T06:12:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://safecontrols.blog/about/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/20150317_104325920_ios.jpg</image:loc><image:title>20150317_104325920_ios</image:title></image:image><lastmod>2025-06-18T06:10:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://safecontrols.blog/2025/06/14/connecting-ot-to-cloud-key-questions-for-practitioners/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/06/cranecloud.png</image:loc><image:title>cranecloud</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/06/gemini_generated_image_qsg2k7qsg2k7qsg2.jpg</image:loc><image:title>Gemini_Generated_Image_qsg2k7qsg2k7qsg2</image:title></image:image><lastmod>2025-06-16T19:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/05/23/ai-agents-and-cybersecurity-pitfalls/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-10T12:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/05/29/the-showdown-sast-vs-github-copilot-who-can-find-the-most-vulnerabilities/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/gemini_generated_image_t6eiqot6eiqot6ei.jpg</image:loc><image:title>Gemini_Generated_Image_t6eiqot6eiqot6ei</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/skjermbilde-2025-05-29-000433.png</image:loc><image:title>Skjermbilde 2025-05-29 000433</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/05/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-28T22:18:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/05/26/mastering-your-ai-kitchen-crafting-ai-prompts-for-business-efficiency-enhanced-learning/</loc><lastmod>2025-05-26T05:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/03/16/partnerships-over-products-the-path-to-robust-supply-chain-security/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-03-17T06:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2025/03/06/creating-an-automated-transaction-classifier-with-an-llm-agent-running-on-mistrals-la-platforme/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-03-06T22:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/09/27/avoiding-risk-by-doing-nothing-the-european-regulators-unintended-consequences/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/09/innovasjon_norge_regelverksfetisj.jpg</image:loc><image:title>innovasjon_norge_regelverksfetisj</image:title></image:image><lastmod>2024-09-27T17:48:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/08/14/does-the-ai-act-make-it-illegal-to-use-ai-for-european-companies/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/08/1bd305a0-bdfe-452e-a655-56ce71e811f7.jpg</image:loc><image:title>_1bd305a0-bdfe-452e-a655-56ce71e811f7</image:title></image:image><lastmod>2024-08-14T20:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/07/22/engaging-the-whole-workforce-in-cybersecurity-a-guide-for-security-managers/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/20240606_2141193.jpg</image:loc><image:title>20240606_2141193</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/black-and-white-people-bar-men.jpg</image:loc><image:title>black and white people bar men</image:title><image:caption>Photo by Gratisography on &lt;a href="https://www.pexels.com/photo/black-and-white-people-bar-men-4417/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/pexels-photo-1015568.jpeg</image:loc><image:title>photograph of men having conversation seating on chair</image:title><image:caption>Photo by Helena Lopes on &lt;a href="https://www.pexels.com/photo/photograph-of-men-having-conversation-seating-on-chair-1015568/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/bleeping_crowdstrike.png</image:loc><image:title>bleeping_crowdstrike</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/cnn_crowdstrike.png</image:loc><image:title>cnn_crowdstrike</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/20240716_150608.jpg</image:loc><image:title>20240716_150608</image:title></image:image><lastmod>2025-04-15T14:59:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/07/10/what-is-the-true-cost-of-a-cyber-attack/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/20240524_225451.jpg</image:loc><image:title>20240524_225451</image:title></image:image><lastmod>2024-07-10T08:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/07/05/zero-day-ot-nightmare-how-zero-trust-can-stop-apt-attacks/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/paper-mill-in-the-country-side-next-to-a-hospital.png</image:loc><image:title>paper-mill-in-the-country-side-next-to-a-hospital</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/20230506_173807.jpg</image:loc><image:title>20230506_173807</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/a-doctor-in-a-hospital-using-chromatographc-paper-to-get.png</image:loc><image:title>a-doctor-in-a-hospital-using-chromatographc-paper-to-get</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/07/mermaid_ot_killchain.png</image:loc><image:title>mermaid_ot_killchain</image:title></image:image><lastmod>2024-07-05T21:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/24/practical-saas-security-assessment-checklist-for-2024/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/saas_identity_checklist.png</image:loc><image:title>saas_identity_checklist</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/saas_security_scoring.png</image:loc><image:title>saas_security_scoring</image:title></image:image><lastmod>2024-06-24T20:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/24/free-saas-security-evaluation-template/</loc><lastmod>2024-06-24T20:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/22/the-security-sweet-spot-avoid-destroying-your-profitability-with-excessive-security-controls/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/20240622_113103.jpg</image:loc><image:title>20240622_113103</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/moving_sweet_spot.png</image:loc><image:title>moving_sweet_spot</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/attacker-paranoia-equilibrium.png</image:loc><image:title>attacker-paranoia-equilibrium</image:title></image:image><lastmod>2024-06-22T19:24:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/15/what-to-do-when-you-lose-your-mfa-device/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/facebook_recovery_codes.png</image:loc><image:title>facebook_recovery_codes</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/facebook_login_mfa.png</image:loc><image:title>facebook_login_mfa</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/google_logon.png</image:loc><image:title>google_logon</image:title></image:image><lastmod>2024-06-17T16:40:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/10/18/edge-browser-history-forensics/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/term1.png</image:loc><image:title>term1</image:title></image:image><lastmod>2024-06-17T16:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/05/09/create-a-google-site-with-a-section-requiring-authentication-with-forms-sheets-app-script/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/triggerbutton.png</image:loc><image:title>triggerbutton</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/appscriptlink-from-sheet.png</image:loc><image:title>appscriptlink-from-sheet</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/sheetbutton.png</image:loc><image:title>sheetbutton</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/signup-form.png</image:loc><image:title>signup-form</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/secret-page-in-separate-folder.png</image:loc><image:title>secret-page-in-separate-folder</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/05/publish.png</image:loc><image:title>publish</image:title></image:image><lastmod>2024-06-17T16:09:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/16/secure-multihomed-devices-in-control-networks-managing-risks-and-enhancing-resilience/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/multihomed_network.png</image:loc><image:title>multihomed_network</image:title></image:image><lastmod>2024-06-16T09:03:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/06/08/ai-powered-threat-hunting-on-linux-servers-honeypot-experiment-and-privilege-escalation/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/robot_forensics.jpg</image:loc><image:title>robot_forensics</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/etcpasswd_writable.png</image:loc><image:title>etcpasswd_writable</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/pipe_to_bash.png</image:loc><image:title>pipe_to_bash</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/root_i_am.png</image:loc><image:title>root_i_am</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/06/attacking_the_don.png</image:loc><image:title>attacking_the_don</image:title></image:image><lastmod>2024-06-08T19:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/05/26/teaching-smart-things-cyber-self-defense-ships-and-cars-that-fight-back/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/collision_avoidance.png</image:loc><image:title>collision_avoidance</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/autonom_fiskebat.jpg</image:loc><image:title>autonom_fiskebat</image:title></image:image><lastmod>2024-05-25T22:37:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2024/05/23/when-digital-goes-wrong-easypark-not-seeing-me-leave/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/rema1000.jpg</image:loc><image:title>rema1000</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/easypark_ongoing.jpg</image:loc><image:title>easypark_ongoing</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2024/05/easypark_text.jpg</image:loc><image:title>easypark_text</image:title></image:image><lastmod>2024-05-23T16:49:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/12/26/personal-cybersecurity-what-are-the-threats-we-need-to-protect-ourselves-from/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/old_lady_scammed.jpg</image:loc><image:title>old_lady_scammed</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/android_microphone_permissions.png</image:loc><image:title>android_microphone_permissions</image:title></image:image><lastmod>2025-10-01T13:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/12/17/get-ubuntu-vulnerability-scans-to-work-on-wazuh-4-7-0/</loc><lastmod>2024-05-03T17:03:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/12/16/how-vulnerable-do-you-want-to-be/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_dash_inventory_search.png</image:loc><image:title>wazuh_dash_inventory_search</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_api_console.png</image:loc><image:title>wazuh_api_console</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/browser_attacked_by_ransomware.jpg</image:loc><image:title>browser_attacked_by_ransomware</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_vulns_singleagent.png</image:loc><image:title>wazuh_vulns_singleagent</image:title></image:image><lastmod>2023-12-16T14:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/12/09/detecting-powershell-based-reverse-shells-with-wazuh/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_mitre_built_in.png</image:loc><image:title>wazuh_mitre_built_in</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_alert_with_mitre.png</image:loc><image:title>wazuh_alert_with_mitre</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_alert_with_scriptblock.png</image:loc><image:title>wazuh_alert_with_scriptblock</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_detected_revshell.png</image:loc><image:title>wazuh_detected_revshell</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_revshell_rule.png</image:loc><image:title>wazuh_revshell_rule</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/wazuh_pwsh_detect.png</image:loc><image:title>wazuh_pwsh_detect</image:title></image:image><lastmod>2023-12-09T20:32:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/12/05/can-enterprise-security-respect-privacy/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/12/itsecurity-lightsaber-fighting-sales.jpg</image:loc><image:title>itsecurity-lightsaber-fighting-sales</image:title></image:image><lastmod>2023-12-05T20:50:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/10/25/azure-arc-as-persistence-technique-stealthier-than-one-would-think-on-linux-servers/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/installed_apps_ec2_windows.png</image:loc><image:title>installed_apps_ec2_windows</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/arc_agent_winlog.png</image:loc><image:title>arc_agent_winlog</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/azure_arc_connect_with_ssh.png</image:loc><image:title>azure_arc_connect_with_ssh</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/azure_arc_config.png</image:loc><image:title>azure_arc_config</image:title></image:image><lastmod>2023-10-25T18:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/10/19/edge-history-forensics-part-2-downloads-and-search/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/downloaded_file.png</image:loc><image:title>downloaded_file</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/10/mastodonlink.png</image:loc><image:title>mastodonlink</image:title></image:image><lastmod>2023-10-19T07:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2023/09/15/cyber-incident-response-training-with-azure-labs/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-09-15T23:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/03/08/threat-hunting-using-powershell-and-event-logs/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/03/pexels-photo-10481246.jpeg</image:loc><image:title>photo of a crime scene</image:title><image:caption>Photo by cottonbro on &lt;a href="https://www.pexels.com/photo/photo-of-a-crime-scene-10481246/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-03-08T19:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/02/21/impact-of-ot-attacks-death-environmental-disasters-and-collapsing-supply-chains/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/weld-hot-soldering-radio-welder-73833.jpeg</image:loc><image:title>industry metal fire radio</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/industry-metal-fire-radio-73833/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/pexels-photo-189524.jpeg</image:loc><image:title>transmission tower under gray sky</image:title><image:caption>Photo by Pok Rie on &lt;a href="https://www.pexels.com/photo/transmission-tower-under-gray-sky-189524/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-02-21T08:08:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/02/06/pointing-fingers-solves-nothing/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/pexels-photo-7234471.jpeg</image:loc><image:title>a man purchasing a ticket in a movie theater</image:title><image:caption>Photo by Pavel Danilyuk on &lt;a href="https://www.pexels.com/photo/a-man-purchasing-a-ticket-in-a-movie-theater-7234471/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/us-army-soldiers-army-men-54098.jpeg</image:loc><image:title>soldiers in line to get in a plane</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/soldiers-in-line-to-get-in-a-plane-54098/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/pexels-photo-210237.jpeg</image:loc><image:title>silhouette of person riding horse on body of water under yellow sunset</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/silhouette-of-person-riding-horse-on-body-of-water-under-yellow-sunset-210237/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/02/pexels-photo-7234265.jpeg</image:loc><image:title>people watching a movie</image:title><image:caption>Photo by Pavel Danilyuk on &lt;a href="https://www.pexels.com/photo/people-watching-a-movie-7234265/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-02-06T17:59:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/30/catching-bad-guys-in-your-system-logs/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/20220123_132415.jpg</image:loc><image:title>20220123_132415</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-723997.jpeg</image:loc><image:title>person foot prints on sands photo</image:title><image:caption>Photo by Min An on &lt;a href="https://www.pexels.com/photo/person-foot-prints-on-sands-photo-723997/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-01-30T17:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/contact/</loc><lastmod>2022-01-24T18:19:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://safecontrols.blog/2022/01/18/can-chuck-norris-detect-the-hackers-in-his-home-folder/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-735911.jpeg</image:loc><image:title>photo of person typing on computer keyboard</image:title><image:caption>Photo by Soumil Kumar on &lt;a href="https://www.pexels.com/photo/photo-of-person-typing-on-computer-keyboard-735911/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-01-19T07:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/17/bears-out-for-honey-in-the-pot-some-statistics/</loc><lastmod>2022-01-17T21:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/11/firebase-iam-the-tale-of-excessive-permissions/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-260397.jpeg</image:loc><image:title>battle blaze burn burnt</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/battle-blaze-burn-burnt-260397/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/20211224_135510.jpg</image:loc><image:title>20211224_135510</image:title></image:image><lastmod>2022-01-11T19:46:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/04/firebase-does-serverless-mean-securityless/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-258510.jpeg</image:loc><image:title>railroad tracks in city</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/railroad-tracks-in-city-258510/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-5328666.jpeg</image:loc><image:title>red flag</image:title><image:caption>Photo by Ravi Kant on &lt;a href="https://www.pexels.com/photo/red-flag-5328666/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-01-04T22:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/03/how-to-discover-cyberattacks-in-time-to-avoid-disaster/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/img_20211011_161048.jpg</image:loc><image:title>img_20211011_161048</image:title></image:image><lastmod>2022-01-03T18:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2022/01/02/things-i-learned-from-starting-and-shutting-down-a-company/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/20211231_170728.jpg</image:loc><image:title>20211231_170728</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-9976167.jpeg</image:loc><image:title>front view of a two males sitting in car with lights turned on and during night time</image:title><image:caption>Photo by Vitaliy Mitrofanenko on &lt;a href="https://www.pexels.com/photo/front-view-of-a-two-males-sitting-in-car-with-lights-turned-on-and-during-night-time-9976167/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/pexels-photo-7213359.jpeg</image:loc><image:title>businessman man people woman</image:title><image:caption>Photo by Ivan Samkov on &lt;a href="https://www.pexels.com/photo/businessman-man-people-woman-7213359/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2022/01/20211016_085124.jpg</image:loc><image:title>20211016_085124</image:title></image:image><lastmod>2022-01-02T10:06:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2021/09/28/vendor-security-management-how-to-decide-if-tech-is-safe-enough-to-use/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2021/09/pexels-photo-9208561.jpeg</image:loc><image:title>restaurant man people woman</image:title><image:caption>Photo by cottonbro on &lt;a href="https://www.pexels.com/photo/restaurant-man-people-woman-9208561/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-09-28T13:02:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2021/07/20/how-conversations-help-us-grow/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2021/07/pexels-photo-6539925.jpeg</image:loc><image:title>women having a conversation while leaning on a wooden railing</image:title><image:caption>Photo by RODNAE Productions on &lt;a href="https://www.pexels.com/photo/women-having-a-conversation-while-leaning-on-a-wooden-railing-6539925/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-07-20T18:45:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2021/07/10/a-letter-to-the-manager/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2021/07/pexels-photo-3184405.jpeg</image:loc><image:title>photo of woman wearing eyeglasses</image:title><image:caption>Photo by fauxels on &lt;a href="https://www.pexels.com/photo/photo-of-woman-wearing-eyeglasses-3184405/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-07-10T06:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2020/11/08/application-security-in-django-projects/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2020/11/pexels-photo-683039.jpeg</image:loc><image:title>assorted decors with brown rack inside store</image:title><image:caption>Photo by Afta Putta Gunawan on &lt;a href="https://www.pexels.com/photo/assorted-decors-with-brown-rack-inside-store-683039/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2020-11-08T23:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2020/09/28/commercial-vpns-the-twitter-security-awareness-flamewar-edition/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2020/09/cat-eyes-angry-suspicious-1331821.jpeg</image:loc><image:title>closeup photo of gray cat</image:title><image:caption>Photo by Skitterphoto on &lt;a href="https://www.pexels.com/photo/closeup-photo-of-gray-cat-1331821/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2020-10-15T19:16:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/01/30/deploying-django-to-app-engine-with-python-3-7-runtime-fails-because-it-cant-find-pip/</loc><lastmod>2020-06-05T04:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2020/04/02/protecting-the-web-with-a-solid-content-security-policy/</loc><lastmod>2020-12-08T17:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2020/03/25/is-covid-19-killing-your-motivation/</loc><lastmod>2020-03-25T15:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2020/02/07/decsecops-embedded-security-in-agile-development/</loc><lastmod>2020-02-14T08:37:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/08/29/two-factor-auth-for-your-node-project-without-tears/</loc><lastmod>2019-08-29T18:24:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/08/12/keeping-your-conversations-private-in-the-age-of-supervised-machine-learning-and-government-snooping/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2019/08/eaton-centre-birds.jpg</image:loc><image:title>eaton-centre-birds</image:title></image:image><lastmod>2019-08-12T09:37:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/08/02/vacations-over-the-internet-is-still-a-dumpster-fire/</loc><lastmod>2019-08-02T18:52:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/portfolio/saltmine-the-throwaway-todo-list-with-privacy-built-in/</loc><lastmod>2019-07-12T18:32:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/07/12/securing-media-stored-in-cloud-storage-buckets-against-unauthorised-access/</loc><lastmod>2025-02-05T08:42:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/07/02/ccsk-domain-5-information-governance/</loc><lastmod>2019-07-12T03:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/06/29/ccsk-domain-4-compliance-and-audit-management/</loc><lastmod>2019-06-29T22:10:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/06/22/creating-a-simple-rss-reader-with-python/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2019/06/screenshot_20190621_233512_com2542191446035125423..jpg</image:loc><image:title>screenshot_20190621_233512_com2542191446035125423..jpg</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2019/06/screenshot_20190621_233512_com399773184336367427.jpg</image:loc><image:title>screenshot_20190621_233512_com399773184336367427.jpg</image:title></image:image><lastmod>2019-06-22T05:29:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/06/16/localization-in-vue-2-0-single-file-components-without-using-an-i18n-library/</loc><lastmod>2019-11-10T09:37:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/06/14/ccsk-domain-3-legal-and-contractual-issues/</loc><lastmod>2019-06-14T12:24:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/05/23/ccsk-domain-2-governance-and-enterprise-risk-management/</loc><lastmod>2019-05-23T22:01:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/05/19/ccsk-domain-1-cloud-computing-concepts-and-architecture/</loc><lastmod>2019-05-19T20:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/05/06/how-to-reduce-cybersecurity-risks-for-stores-shops-and-small-businesses/</loc><lastmod>2020-12-16T15:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/03/18/running-an-automated-security-audit-using-burp-professional/</loc><lastmod>2019-03-18T21:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/03/05/defending-against-osint-in-reconnaissance/</loc><lastmod>2019-03-05T21:45:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2019/02/25/storing-seeds-for-multifactor-authentication-tokens/</loc><lastmod>2019-02-25T12:24:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/12/19/combining-vuejs-and-django-to-build-forms-with-custom-widgets/</loc><lastmod>2018-12-19T22:41:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/08/09/security-awareness-the-tale-of-the-minister-of-fisheries-and-his-love-of-an-iranian-former-beauty-queen/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/08/080918_1940_securityawa1.png</image:loc><image:title>080918_1940_Securityawa1.png</image:title></image:image><lastmod>2018-08-09T20:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/08/08/making-django-elastic-beanstalk-and-aws-rds-play-well-together/</loc><lastmod>2019-01-09T12:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/07/14/how-a-desire-for-control-can-hurt-your-security-performance/</loc><lastmod>2018-07-14T22:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/07/05/how-to-manage-risk-and-security-when-outsourcing-development/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/07/outsourcing_framework.png</image:loc><image:title>outsourcing_framework</image:title></image:image><lastmod>2018-07-05T20:10:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/05/25/do-you-consider-security-when-buying-a-saas-subscription/</loc><lastmod>2018-05-25T19:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/05/22/when-society-breaks-down-how-do-we-respond/</loc><lastmod>2018-05-22T20:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/05/03/how-build-emergency-preparedness-for-cybersecurity-incidents/</loc><lastmod>2018-05-03T19:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/02/28/packaging-a-node-app-for-docker-from-windows/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/02/api_resposne.png</image:loc><image:title>api_resposne</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/02/app_crash_vulnback.png</image:loc><image:title>app_crash_vulnback</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/02/docker_build_failure.png</image:loc><image:title>docker_build_failure</image:title></image:image><lastmod>2018-03-06T11:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/02/25/how-to-recognize-a-customized-spear-phishing-email/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2018/02/img_0253.jpg</image:loc><image:title>img_0253</image:title></image:image><lastmod>2018-02-25T07:31:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2018/01/08/how-the-meltdown-cpu-bug-adds-50-million-tons-of-co2-to-the-atmosphere/</loc><lastmod>2018-01-08T19:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/12/02/making-your-signup-page-safe-to-use-by-knowing-how-a-secure-development-process-looks/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/12/secdev.png</image:loc><image:title>secdev</image:title></image:image><lastmod>2025-01-03T07:55:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/11/24/privacy-practice-and-the-gdpr/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/11/study-group_4460x4460.jpg</image:loc><image:title>study-group_4460x4460</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/11/gdprinventory.png</image:loc><image:title>gdprinventory</image:title></image:image><lastmod>2017-11-24T20:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/08/05/why-you-should-be-reading-privacy-statements-before-using-a-web-site/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/08/payphone-on-brick-wall_4460x4460.jpg</image:loc><image:title>payphone-on-brick-wall_4460x4460</image:title></image:image><lastmod>2017-08-05T07:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/07/02/does-cyber-insurance-make-sense/</loc><lastmod>2017-07-02T07:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/06/27/how-to-prepare-for-and-survive-a-computer-virus-epidemic/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/06/sleepwell.png</image:loc><image:title>sleepwell</image:title></image:image><lastmod>2017-06-27T18:57:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/06/18/what-is-your-vital-object-when-planning-security-measures/</loc><lastmod>2017-06-18T10:42:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/05/17/handling-suppliers-with-low-security-awareness/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/05/supplychainexpansion.png</image:loc><image:title>supplychainexpansion</image:title></image:image><lastmod>2017-05-17T06:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/05/14/why-secure-iframes-on-http-sites-are-bad-for-security/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/05/ssl_safecontrols.png</image:loc><image:title>ssl_safecontrols</image:title></image:image><lastmod>2017-05-14T21:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/05/07/trust-in-business-is-trust-in-the-security-of-those-you-do-business-with/</loc><lastmod>2017-05-07T09:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/05/02/social-engineering-and-relationship-management/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/05/ransomeware_process1.png</image:loc><image:title>ransomeware_process</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/05/ransomeware_process.png</image:loc><image:title>ransomeware_process</image:title></image:image><lastmod>2017-05-02T19:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/25/why-high-reliability-organizations-evaluate-the-threat-potential-of-suppliers/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/20150424_155646090_ios.jpg</image:loc><image:title>20150424_155646090_iOS</image:title></image:image><lastmod>2017-04-25T19:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/22/earth-day-fighting-climate-change-with-cybersecurity/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/trheimtorg.jpg</image:loc><image:title>trheimtorg</image:title></image:image><lastmod>2017-04-22T08:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/20/cross-site-scripting-for-fun-and-profit/</loc><lastmod>2017-04-20T14:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/17/how-do-leaked-cyber-weapons-change-the-threat-landscape-for-businesses/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/shadowbroker.png</image:loc><image:title>shadowbroker</image:title></image:image><lastmod>2017-04-17T21:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/14/how-to-embed-security-awareness-in-business-processes/</loc><lastmod>2017-04-14T05:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/04/03/the-cyber-barbarians-are-at-the-internet-gateways/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/dungeons_26_dragons_miniatures_2.jpg</image:loc><image:title>dungeons_26_dragons_miniatures_2</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/20160530_182843959_ios.jpg</image:loc><image:title>20160530_182843959_iOS</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/04/20160323_120416826_ios.jpg</image:loc><image:title>20160323_120416826_iOS</image:title></image:image><lastmod>2017-04-03T19:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/28/security-as-a-selling-point-for-your-business/</loc><lastmod>2017-03-28T12:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/21/extending-the-risk-assessment-mind-map-for-information-security/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/risk_assessment_security.png</image:loc><image:title>risk_assessment_security</image:title></image:image><lastmod>2017-03-21T20:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/20/4-habits-from-consulting-every-security-professional-should-steal/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/sec_pic_habits_consulting.png</image:loc><image:title>sec_pic_habits_consulting</image:title></image:image><lastmod>2017-03-20T19:51:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/18/how-do-you-tell-your-audience-that-somebody-found-a-vulnerability-on-your-site/</loc><lastmod>2017-03-18T16:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/14/can-cybersecurity-culture-be-measured-and-how-can-it-drive-national-policy/</loc><lastmod>2017-03-14T20:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/13/security-awareness-a-5-step-process-to-making-your-training-program-role-based-and-relevant/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/training_personal_targeting.png</image:loc><image:title>training_personal_targeting</image:title></image:image><lastmod>2017-09-01T21:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/12/avoid-keeping-sensitive-info-in-a-code-repo-how-to-remove-files-from-git-version-history/</loc><lastmod>2017-03-12T18:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/11/cybercrime-one-of-5-top-organized-crime-threats-to-europe-according-to-europol/</loc><lastmod>2017-03-11T19:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/07/hashtag-bots-spreading-spam-and-malicious-links/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/screenshot_20170307-1855041.png</image:loc><image:title>screenshot_20170307-185504.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/screenshot_20170307-185529.png</image:loc><image:title>screenshot_20170307-185529.png</image:title></image:image><lastmod>2017-03-07T18:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/06/is-complexity-better-than-length-when-it-comes-to-passwords/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/charset_entropy.png</image:loc><image:title>charset_entropy</image:title></image:image><lastmod>2017-03-06T09:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/04/top-of-the-iceberg-politicians-private-email-accounts-and-shadow-it/</loc><lastmod>2017-03-04T22:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/04/hijacking-existing-email-threads-taking-phishing-to-a-new-level/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/phishinglogin.png</image:loc><image:title>phishinglogin</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/clickphish.png</image:loc><image:title>clickphish</image:title></image:image><lastmod>2017-03-04T07:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/03/cybersecurity-for-boards-the-short-story/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/eforensics.png</image:loc><image:title>eforensics</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/kennethholley.png</image:loc><image:title>kennethholley</image:title></image:image><lastmod>2017-03-03T10:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/02/iec-61511-security-getting-the-right-detail-level/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/granularity.png</image:loc><image:title>granularity</image:title></image:image><lastmod>2017-03-02T21:36:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/27/how-boards-can-prioritize-cybersecurity-in-corporate-governance/</loc><lastmod>2017-03-01T11:01:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/03/01/how-can-you-defend-your-assets-against-distributed-reflective-attacks-via-dns/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/03/030117_0546_howcanyoude1.png</image:loc><image:title>030117_0546_Howcanyoude1.png</image:title></image:image><lastmod>2017-03-01T05:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/25/testing-the-cybersecurity-maturity-through-self-reported-practices/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/johnnyresult.png</image:loc><image:title>johnnyresult</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/johnny_app.png</image:loc><image:title>johnny_app</image:title></image:image><lastmod>2017-02-25T22:01:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/24/5-key-success-factors-for-dealing-with-ransomeware-free-whitepaper/</loc><lastmod>2017-02-24T23:55:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/23/rita-the-designers-ransomware-litigation-nightmare/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/wp-image-1016155025jpg.jpg</image:loc><image:title>wp-image-1016155025jpg.jpg</image:title></image:image><lastmod>2017-02-23T20:59:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/22/how-filesilo-ruined-rita-the-designers-weekend/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/022217_1129_howfilesilo2.png</image:loc><image:title>022217_1129_HowFileSilo2.png</image:title></image:image><lastmod>2017-02-22T11:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/21/hackers-try-to-trick-you-into-paying-ransome-using-simple-javascript-hijacking/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/ransom_fakebsod.jpg</image:loc><image:title>ransom_fakebsod</image:title></image:image><lastmod>2017-02-21T21:59:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/20/norwegian-cyber-command-warning-against-supply-chain-exploitation-for-f35-project/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/f-35a_flight_28cropped29.jpg</image:loc><image:title>Aerial refueling of F-35 Lightning II Joint Strike Fighters at Eglin AFB, Fla.</image:title></image:image><lastmod>2017-02-21T12:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/19/what-does-the-gdpr-general-data-protection-regulation-mean-for-your-companys-privacy-and-cybersecurity/</loc><lastmod>2017-02-20T19:52:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/20/free-infosec-crashcourse-for-insiders/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/summary_crash.png</image:loc><image:title>summary_crash</image:title></image:image><lastmod>2017-02-20T19:08:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/19/users-from-threats-to-security-enhancers/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/wp-image-10420430jpg.jpg</image:loc><image:title>wp-image-10420430jpg.jpg</image:title></image:image><lastmod>2017-02-19T19:24:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/18/physically-tracking-people-using-their-cloud-service-accounts/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/google_position_tracking.png</image:loc><image:title>google_position_tracking</image:title></image:image><lastmod>2017-02-18T10:46:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/17/can-we-build-a-vulnerability-tracking-system-using-open-cve-data/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/021717_1245_canwebuilda1.png</image:loc><image:title>021717_1245_Canwebuilda1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/021717_1244_canwebuilda1.png</image:loc><image:title>021717_1244_Canwebuilda1.png</image:title></image:image><lastmod>2017-02-17T12:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/16/integrating-power-grids-what-does-it-do-to-cyber-resilience/</loc><lastmod>2017-02-16T20:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/16/when-does-cybersecurity-awareness-training-actually-work/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/awareness_monkey.png</image:loc><image:title>awareness_monkey</image:title></image:image><lastmod>2017-02-16T09:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/12/getting-started-with-information-management-systems-based-on-iso-27001/</loc><lastmod>2017-12-09T12:11:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/12/what-is-threat-hunting-in-cybersecurity-defense/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/021217_1213_whatisthrea1.png</image:loc><image:title>021217_1213_Whatisthrea1.png</image:title></image:image><lastmod>2017-02-12T12:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/11/6-things-everyone-can-do-to-avoid-hacking-by-cyber-criminals/</loc><lastmod>2017-02-11T06:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/10/what-are-the-things-that-need-to-be-considered-when-doing-a-risk-assessment/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/risk_management.png</image:loc><image:title>risk_management</image:title></image:image><lastmod>2017-02-10T09:15:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/09/are-we-ready-security-wise-to-ditch-the-office/</loc><lastmod>2017-02-09T12:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/09/4-steps-to-engaging-people-in-risk-conversations/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020917_0711_4stepstoeng4.png</image:loc><image:title>020917_0711_4stepstoeng4.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020917_0711_4stepstoeng3.png</image:loc><image:title>020917_0711_4stepstoeng3.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020917_0711_4stepstoeng2.png</image:loc><image:title>020917_0711_4stepstoeng2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020917_0711_4stepstoeng1.png</image:loc><image:title>020917_0711_4stepstoeng1.png</image:title></image:image><lastmod>2017-02-09T07:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/08/how-do-you-update-failure-rates-and-test-intervals-based-on-limited-data-observations/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020817_0924_howdoyouupd4.png</image:loc><image:title>020817_0924_Howdoyouupd4.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020817_0924_howdoyouupd3.png</image:loc><image:title>020817_0924_Howdoyouupd3.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020817_0924_howdoyouupd2.png</image:loc><image:title>020817_0924_Howdoyouupd2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020817_0924_howdoyouupd1.png</image:loc><image:title>020817_0924_Howdoyouupd1.png</image:title></image:image><lastmod>2017-02-08T09:25:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/06/why-two-factor-authentication-is-not-foolproof-but-still-good-to-use/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/020617_1354_whytwofacto1.png</image:loc><image:title>020617_1354_Whytwofacto1.png</image:title></image:image><lastmod>2017-02-06T13:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/02/01/major-discount-grocery-store-chain-rema-1000-expose-their-whole-customer-database/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/02/ae_rema.png</image:loc><image:title>ae_rema</image:title></image:image><lastmod>2017-02-01T13:57:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/01/30/how-machine-learning-can-help-the-spread-of-fake-news/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/013017_0948_howmachinel2.png</image:loc><image:title>013017_0948_Howmachinel2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/013017_0948_howmachinel1.png</image:loc><image:title>013017_0948_Howmachinel1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/013017_0945_howmachinel2.png</image:loc><image:title>013017_0945_Howmachinel2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/013017_0945_howmachinel1.png</image:loc><image:title>013017_0945_Howmachinel1.png</image:title></image:image><lastmod>2017-01-30T09:48:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/01/29/automation-and-identity-loss/</loc><lastmod>2017-01-29T07:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/01/25/40-tracking-cookies-from-2-news-sites-this-is-why-you-need-vpn/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/wp-1485335078462.png</image:loc><image:title>wp-1485335078462.png</image:title></image:image><lastmod>2017-01-25T09:10:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/01/23/thinking-about-risk-through-methods/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/13768080_1067660556651700_1098663203_n.jpg</image:loc><image:title>13768080_1067660556651700_1098663203_n</image:title></image:image><lastmod>2017-01-23T13:35:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2017/01/14/teaching-process-safety-in-2017/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2017/01/20151108_093707211_ios.jpg</image:loc><image:title>20151108_093707211_ios</image:title></image:image><lastmod>2017-02-14T10:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2016/08/09/how-do-digital-control-systems-get-developed/</loc><lastmod>2016-08-09T09:05:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2016/05/31/iec-61511-security-requirements/</loc><lastmod>2016-05-31T21:54:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2016/05/20/telecommuting-and-the-environment/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2016/05/traffikk.jpg</image:loc><image:title>traffikk</image:title><image:caption>Toll roads - the only way to reduced congestion in cities?</image:caption></image:image><lastmod>2016-05-20T06:16:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2016/05/14/make-sure-security-does-not-stop-your-people-from-getting-stuff-done/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2016/05/lockouthorse.jpg</image:loc><image:title>lockouthorse</image:title></image:image><lastmod>2016-05-14T20:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2016/02/06/the-daily-reboot/</loc><lastmod>2016-02-06T16:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/12/13/do-scada-vulnerabilities-matter/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/12/shodan_cp343.png</image:loc><image:title>shodan_cp343</image:title></image:image><lastmod>2015-12-13T20:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/12/07/lean-thinking-in-functional-safety/</loc><lastmod>2015-12-07T16:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/11/23/sil-and-ballast-systems/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/11/ship-storm1.jpg</image:loc><image:title>ship-storm1</image:title></image:image><lastmod>2015-11-23T21:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/11/08/updating-failure-rates-based-on-operational-data-are-we-fooling-ourselves-again/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/11/110815_1619_updatingfai3.png</image:loc><image:title>110815_1619_Updatingfai3.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/11/110815_1619_updatingfai1.png</image:loc><image:title>110815_1619_Updatingfai1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/11/110815_1619_updatingfai2.png</image:loc><image:title>110815_1619_Updatingfai2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/11/110815_1613_updatingfai1.png</image:loc><image:title>110815_1613_Updatingfai1.png</image:title></image:image><lastmod>2015-11-08T16:20:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/10/23/clever-phishing-attempt-from-nigerian-scammers/</loc><lastmod>2015-10-23T09:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/10/09/solving-the-fragmentation-problem-in-documentation-of-reliability/</loc><lastmod>2015-10-09T12:21:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/10/02/when-risk-reduction-kills/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/10/100215_1554_whenriskred1.png</image:loc><image:title>100215_1554_Whenriskred1.png</image:title></image:image><lastmod>2015-10-02T15:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/10/01/get-results-by-running-fewer-but-better-meetings/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/10/20150424_105435001_ios.jpg</image:loc><image:title>20150424_105435001_iOS</image:title><image:caption>Meetings can vary a lot in format and location - selecting the architecture of your meeting carefully is one of the rules for driving great meeting experiences. </image:caption></image:image><lastmod>2023-09-10T16:03:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/09/27/securing-your-control-systems-what-are-your-priorities/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/09/092715_1618_securingyou1.png</image:loc><image:title>092715_1618_Securingyou1.png</image:title></image:image><lastmod>2015-09-27T16:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/09/25/5-days-of-ics-scada-security-in-amsterdam/</loc><lastmod>2015-09-25T16:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/09/20/what-does-the-iec-61508-requirement-to-have-a-safetey-management-system-mean-for-vendors/</loc><lastmod>2015-09-20T15:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/09/08/profiling-of-hackers-presented-at-esrel-2015/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/09/090815_1039_profilingof1.png</image:loc><image:title>090815_1039_Profilingof1.png</image:title></image:image><lastmod>2015-09-08T10:39:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/09/05/managing-information-security-should-be-a-natural-part-of-your-risk-management-system/</loc><lastmod>2015-09-05T18:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/22/would-you-operate-a-hydraulic-machine-with-no-cover-or-emergency-stop/</loc><lastmod>2015-08-22T09:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/17/your-safety-and-human-factors/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/bilmann.jpg</image:loc><image:title>bilmann</image:title></image:image><lastmod>2015-08-20T09:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/18/why-functional-safety-audits-are-useful/</loc><lastmod>2015-08-18T19:03:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/12/safety-versus-convenience/</loc><lastmod>2015-08-12T11:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/08/is-technical-competence-king-in-detecting-phishing/</loc><lastmod>2015-08-08T08:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/06/are-you-aware-of-the-effect-of-work-life-balance-issues-on-the-quality-of-your-teams-work/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/08/20150401_072922403_ios.jpg</image:loc><image:title>20150401_072922403_iOS</image:title><image:caption>Having a way to control the internal steam pressure of your team members may be utopia - but you should still look for ways to avoid disasters, together with your people. </image:caption></image:image><lastmod>2015-08-06T17:25:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/05/stages-of-process-safety-understanding/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/08/080515_1729_stagesofpro1.png</image:loc><image:title>080515_1729_Stagesofpro1.png</image:title></image:image><lastmod>2015-08-05T17:35:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/04/probabilities-do-they-have-a-place-in-cyber-security/</loc><lastmod>2015-08-04T17:30:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/08/02/how-does-your-approach-to-maintenance-change-the-reliability-of-your-system/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/08/080215_2002_howdoesyour2.png</image:loc><image:title>080215_2002_Howdoesyour2.png</image:title></image:image><lastmod>2015-08-02T20:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/29/why-updating-software-counts/</loc><lastmod>2015-07-29T18:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/28/follow-up-of-the-supply-chain-for-sil-rated-equipment/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072815_1320_followupoft1.png</image:loc><image:title>072815_1320_Followupoft1.png</image:title></image:image><lastmod>2015-07-28T13:19:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/25/avoiding-paralysis-by-analysis/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/img_0988.jpg</image:loc><image:title>IMG_0988</image:title></image:image><lastmod>2015-07-25T16:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/23/do-you-calculate-failure-probabilities-during-process-design/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072315_1941_doyoucalcul11.png</image:loc><image:title>072315_1941_Doyoucalcul1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072315_1941_doyoucalcul1.png</image:loc><image:title>072315_1941_Doyoucalcul1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072315_1940_doyoucalcul1.png</image:loc><image:title>072315_1940_Doyoucalcul1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072315_1937_doyoucalcul1.png</image:loc><image:title>072315_1937_Doyoucalcul1.png</image:title></image:image><lastmod>2015-07-25T13:53:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/21/when-does-production-downtime-equal-lost-production/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1635_whendoespro1.png</image:loc><image:title>072115_1635_Whendoespro1.png</image:title></image:image><lastmod>2015-07-21T16:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/21/uncertainty-and-effect-of-proof-test-intervals-on-failure-probabilities-of-critical-safety-functions/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1313_uncertainty5.png</image:loc><image:title>072115_1313_Uncertainty5.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1313_uncertainty4.png</image:loc><image:title>072115_1313_Uncertainty4.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1313_uncertainty3.png</image:loc><image:title>072115_1313_Uncertainty3.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1313_uncertainty2.png</image:loc><image:title>072115_1313_Uncertainty2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/072115_1313_uncertainty1.png</image:loc><image:title>072115_1313_Uncertainty1.png</image:title></image:image><lastmod>2015-07-21T13:13:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/20/do-you-consider-security-when-purchasing-control-system-equipment/</loc><lastmod>2015-07-20T08:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/19/progressing-from-design-to-operation-with-a-sil-rated-system/</loc><lastmod>2015-07-19T14:56:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/18/is-security-management-still-following-the-whack-a-mole-philosophy-of-yesteryear/</loc><lastmod>2015-07-18T15:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/16/the-problem-is-not-with-your-brain-sir-it-is-the-number-of-limbs/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1924_theproblemi2.png</image:loc><image:title>071615_1924_Theproblemi2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1924_theproblemi1.png</image:loc><image:title>071615_1924_Theproblemi1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1923_theproblemi2.png</image:loc><image:title>071615_1923_Theproblemi2.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1923_theproblemi1.png</image:loc><image:title>071615_1923_Theproblemi1.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi24.png</image:loc><image:title>071615_1919_Theproblemi24.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi22.png</image:loc><image:title>071615_1919_Theproblemi22.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi23.png</image:loc><image:title>071615_1919_Theproblemi23.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi21.png</image:loc><image:title>071615_1919_Theproblemi21.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi20.png</image:loc><image:title>071615_1919_Theproblemi20.png</image:title></image:image><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071615_1919_theproblemi19.png</image:loc><image:title>071615_1919_Theproblemi19.png</image:title></image:image><lastmod>2015-07-16T19:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/16/treat-your-people-well-if-you-want-your-safety-systems-to-work/</loc><lastmod>2015-07-16T14:06:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/16/favourite-boots-for-walking/</loc><lastmod>2015-07-16T09:29:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/15/machine-safety-what-is-it/</loc><lastmod>2015-07-15T16:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/14/four-golden-practices-for-functional-safety-management/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071415_0731_fourgoldenp1.png</image:loc><image:title>071415_0731_Fourgoldenp1.png</image:title></image:image><lastmod>2015-07-14T07:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/13/building-barriers-against-major-accidents/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071315_0901_buildingbar1.png</image:loc><image:title>071315_0901_Buildingbar1.png</image:title></image:image><lastmod>2015-07-13T09:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/11/do-you-trust-your-numbers/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/071115_2113_doyoutrusty1.png</image:loc><image:title>071115_2113_Doyoutrusty1.png</image:title><image:caption>A great safety management system is tailored to maintain the safety integrity level capability of the product from all four perspectives. Maintaining this integrity requires a high-reliability organization, as well as knowledgable individuals. </image:caption></image:image><lastmod>2015-07-11T21:13:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/10/contracts-interfaces-and-safety-integrity/</loc><lastmod>2015-07-10T13:17:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/10/a-quest-for-knowledge-and-the-usefulness-of-your-hr-department-in-functional-safety-management/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/knowledge_management.png</image:loc><image:title>knowledge_management</image:title></image:image><lastmod>2015-07-10T09:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/09/taking-the-human-factor-into-account-when-setting-sil-requirements/</loc><lastmod>2015-07-09T07:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/08/how-independent-should-your-fsa-leader-be/</loc><lastmod>2015-07-08T09:25:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/07/what-is-the-demand-rate-on-a-safety-function/</loc><lastmod>2015-07-07T20:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/07/electrical-isolation-of-ignition-sources-on-offshore-installations/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/triangle-of-fire.jpg</image:loc><image:title>triangle-of-fire</image:title></image:image><lastmod>2015-07-07T08:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/06/stupid-resource-planning-in-projects/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/070615_1946_stupidresou1.png</image:loc><image:title>070615_1946_Stupidresou1.png</image:title></image:image><lastmod>2015-07-06T19:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/06/new-security-requirements-to-safety-instrumented-systems-in-iec-61511/</loc><lastmod>2015-07-06T10:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/05/the-false-sense-of-security-people-gain-from-firewalls/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/070515_2011_thefalsesen1.png</image:loc><image:title>070515_2011_Thefalsesen1.png</image:title></image:image><lastmod>2015-07-06T05:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/06/gas-stations-tank-monitoring-systems-open-to-cyber-attacks/</loc><lastmod>2015-07-06T05:19:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/05/the-good-and-bad-sides-of-proof-testing/</loc><lastmod>2015-07-05T07:27:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/04/operating-systems-and-safety-critical-software-does-the-os-matter/</loc><lastmod>2015-07-04T17:39:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/03/what-is-the-difference-between-software-and-hardware-failures-in-a-reliability-context/</loc><lastmod>2015-07-03T11:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/03/does-safety-engineering-require-security-engineering/</loc><lastmod>2015-07-03T07:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/02/obtaining-the-necessary-documenation-from-vendors-why-is-it-so-hard/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/infographic_vendorfollowup.png</image:loc><image:title>infographic_vendorfollowup</image:title><image:caption>Infographic showing how to follow up with vendors to obtain the necessary documentation on SIL compliance.</image:caption></image:image><lastmod>2015-07-02T18:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/02/is-the-necessary-sil-related-to-layers-of-protection-or-operating-practices/</loc><image:image><image:loc>https://safecontrols.blog/wp-content/uploads/2015/07/risk_figure.png</image:loc><image:title>risk_figure</image:title><image:caption>Figure showing how risk reducing measures work together to bring the risk down to an acceptable level.</image:caption></image:image><lastmod>2015-07-02T15:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/02/what-does-a-sil-requirement-really-mean/</loc><lastmod>2015-07-02T15:16:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog/2015/07/02/planning-lifecycle-activities-for-safety-instrumented-systems/</loc><lastmod>2015-07-02T14:59:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://safecontrols.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-03T21:29:09+00:00</lastmod></url></urlset>
