<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.sysrisk.com/2024/01/10/%e3%81%aa%e3%81%9c%e3%81%82%e3%81%aa%e3%81%9f%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e9%98%b2%e5%be%a1%e3%81%af%e5%bc%b1%e3%81%84%e3%81%ae/</loc><lastmod>2024-01-12T01:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2024/01/05/introducing-tanuki-the-autonomous-ai-penetration-testing-ninja/</loc><lastmod>2024-01-05T01:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2024/01/04/why-your-cybersecurity-defenses-are-weak-humans-vs-robots/</loc><lastmod>2024-01-04T01:16:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/05/29/getting-in-the-groove/</loc><lastmod>2023-12-27T03:10:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/04/17/lazy-sunday/</loc><lastmod>2023-12-27T03:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/03/25/funny-job-posting-on-elance/</loc><lastmod>2023-12-27T03:03:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/03/23/back-to-normal/</loc><lastmod>2023-12-27T03:01:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/03/18/sensation-sells-cnn-is-a-cauldron-of-liars/</loc><lastmod>2023-12-27T02:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/03/16/all-shook-up-in-japan/</loc><lastmod>2023-12-27T02:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/03/01/playing-with-python-trying-to-get-back-to-pictures/</loc><lastmod>2023-12-27T01:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/01/31/460/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/wpbrowser-300x168-1.jpg</image:loc><image:title>wpbrowser-300x168-1</image:title></image:image><lastmod>2023-12-27T01:18:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2011/01/07/addicted-to-web-apps-11-services-i-use/</loc><lastmod>2023-12-27T01:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/12/24/tis-the-season-to-play-with-gadgets/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/imag0035-179x300-1.jpg</image:loc><image:title>imag0035-179x300-1</image:title></image:image><lastmod>2023-12-27T01:14:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/11/10/another-workpapers-milestone-desktop-release/</loc><lastmod>2023-12-27T01:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/10/11/workpapers-desktop-coming-soon/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/wpdesktopmenu-300x85-1.png</image:loc><image:title>wpdesktopmenu-300x85-1</image:title></image:image><lastmod>2023-12-27T01:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/09/26/application-security-another-look-at-jvm/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/l_2048_1536_170ea8d7-328b-4b86-a5ed-30d86e43dfd4.jpeg</image:loc><image:title>l_2048_1536_170ea8d7-328b-4b86-a5ed-30d86e43dfd4</image:title></image:image><lastmod>2023-12-27T01:05:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/09/04/is-it-time-to-start-blocking-all-china-ips/</loc><lastmod>2023-12-27T01:03:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/09/03/let-the-tablet-wars-begin/</loc><lastmod>2023-12-27T01:01:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/08/23/bullet-trains-and-small-bladders/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/e7618577-4e50-4f5f-945c-6c0800970fffiphone_photo.jpg</image:loc><image:title>e7618577-4e50-4f5f-945c-6c0800970fffiphone_photo</image:title></image:image><lastmod>2023-12-27T00:59:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/08/11/cloud-consultants/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/newinterface_beta2_aya-300x204-1.png</image:loc><image:title>newinterface_beta2_aya-300x204-1</image:title></image:image><lastmod>2023-12-27T00:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/07/06/workpapers-release-some-great-os-x-applications/</loc><lastmod>2023-12-27T00:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/07/05/accent-zip-password-recovery-a-career-saver/</loc><lastmod>2023-12-27T00:53:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/07/05/workpapers-release-around-the-corner/</loc><lastmod>2023-12-27T00:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/05/18/whew-coming-up-for-air/</loc><lastmod>2023-12-27T00:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/04/14/new-workpapers-release-coming/</loc><lastmod>2023-12-27T00:45:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/03/25/mysql-setup-on-os-x-10-5x-the-missing-procedures/</loc><lastmod>2023-12-27T00:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/03/24/workpapers-software-java-google-web-toolkit-and-dcma/</loc><lastmod>2023-12-27T00:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/03/07/the-next-wave-preventive-security-and-statisticians/</loc><lastmod>2023-12-27T00:39:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/24/increasing-attacks-against-grid-systems/</loc><lastmod>2023-12-27T00:36:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/24/saltzer-and-schroeder/</loc><lastmod>2023-12-27T00:35:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/21/it-and-infosec-auditor-shortcomings-sans-joins-the-dialog/</loc><lastmod>2023-12-27T00:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/20/twitter-phishing-rampant-todays-flavor/</loc><lastmod>2023-12-27T00:30:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/18/principal-remote-monitoring-students-at-home/</loc><lastmod>2023-12-27T00:28:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/18/this-is-big-news-on-a-cyberattack-75000-systems-breached/</loc><lastmod>2023-12-27T00:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/18/facebook-social-networking-and-spammers/</loc><lastmod>2023-12-27T00:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/17/fight-spam-with-this-email-signature-image-generator/</loc><lastmod>2023-12-27T00:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/15/old-ham-radio-movie-a-video-documentary-gives-a-glimpse-of-history-in-ham-radio/</loc><lastmod>2023-12-27T00:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/15/tinkering-in-the-shack-looking-at-allstar-link/</loc><lastmod>2023-12-26T23:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/14/gmail-picasa-identity-leakage/</loc><lastmod>2023-12-26T23:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/11/iphone-security-becomes-topic-at-blackhat/</loc><lastmod>2023-12-26T23:39:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/09/anti-piracy-first-internet-cafe-arrest-in-japan/</loc><lastmod>2023-12-26T23:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/02/03/facebook-as-biggest-security-threat/</loc><lastmod>2023-12-26T23:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/31/suck-your-guts-in-full-body-scanner-coming-to-an-airport-near-you/</loc><lastmod>2023-12-26T23:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2008/02/09/%e6%97%a5%e6%9c%ac%e8%aa%9e%e3%81%ae%e3%83%97%e3%83%ad%e3%82%b0%e3%81%8c%e3%81%a7%e3%81%8d%e3%81%9f%ef%bc%81/</loc><lastmod>2023-12-26T23:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2008/02/08/three-day-weekend/</loc><lastmod>2023-12-26T23:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2008/02/02/been-a-while/</loc><lastmod>2023-12-26T23:05:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2008/01/04/354/</loc><lastmod>2023-12-26T23:03:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2008/01/01/nervous-new-years-trading-an-interesting-1700-jp-time-pattern/</loc><lastmod>2023-12-26T23:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2007/12/31/another-day-in-paradise/</loc><lastmod>2023-12-26T22:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2007/12/08/japanese-keyboards-and-leopard/</loc><lastmod>2023-12-26T22:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2007/12/08/blogger-kickstart/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2023/12/e58699e79c9f-10.jpg</image:loc><image:title>e58699e79c9f-10</image:title></image:image><lastmod>2023-12-26T22:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/28/it-auditors-and-logging-systems/</loc><lastmod>2023-12-26T13:14:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/20/takashimaya-department-stores-going-led/</loc><lastmod>2023-12-26T13:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/18/smart-google-dumb-google/</loc><lastmod>2023-12-26T13:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/17/helicopter-project-eye-in-the-sky/</loc><lastmod>2023-12-26T13:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/13/too-many-generalists-internal-auditor-magazine-example/</loc><lastmod>2023-12-26T13:10:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/06/ubiquitous-security-2010-brings-focus-to-mobile-issues/</loc><lastmod>2023-12-26T13:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/06/god-mode-the-only-way-to-admin-windows/</loc><lastmod>2023-12-26T13:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/22/windows-7-critique-by-an-osx-user/</loc><lastmod>2023-12-26T13:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/19/active-directory-analysis/</loc><lastmod>2023-12-26T13:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/12/the-wanaway-a-work-in-progress/</loc><lastmod>2023-12-26T13:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/26/security-through-obscurity-word-processor-redaction/</loc><lastmod>2023-12-26T12:59:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2010/01/01/workpapers-latest-version-now-freeware/</loc><lastmod>2023-12-26T12:58:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/29/german-researcher-cracks-gsm-codes-offensive-security-research-illegal/</loc><lastmod>2023-12-26T12:56:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/27/the-last-10-years-in-mobile-phones/</loc><lastmod>2023-12-26T12:55:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/27/again-digital-photo-frames-infected-for-2009-christmas-too/</loc><lastmod>2023-12-26T12:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/24/cool-serial-logging-device-logomatic-v2-serial-sd-datalogger/</loc><lastmod>2023-12-26T12:53:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/23/dissecting-japanese-it-organizations/</loc><lastmod>2023-12-26T12:52:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2009/12/13/altoids-wireless-microphone/</loc><lastmod>2023-12-26T12:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/16/timely-consistent-and-accurate-event-handling/</loc><lastmod>2022-06-15T09:36:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/17/event-management-workflow/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2020/10/workflow-1.png</image:loc><image:title>workflow</image:title></image:image><lastmod>2022-06-15T09:36:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2021/09/22/attack-surface-analysis/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2021/09/channelbannerimage.png</image:loc><image:title>ChannelBannerImage</image:title></image:image><lastmod>2022-06-10T23:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2022/01/23/five-hacking-tips-grc-is-not-cybersecurity/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2022/01/cybersectrainingresourcesthumbnail.png</image:loc><image:title>CybersecTrainingResourcesThumbnail</image:title></image:image><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2022/01/bloodhoundthumbnail.jpg</image:loc><image:title>BloodHoundThumbNail</image:title></image:image><lastmod>2022-06-10T23:57:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2022/01/29/five-hacking-tips/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2022/01/networkenum2thumbnail.png</image:loc><image:title>NetworkEnum2Thumbnail</image:title></image:image><lastmod>2022-06-10T23:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2022/06/11/cve2022-30190/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2022/06/follina-msdt.png</image:loc><image:title>Follina-MSDT</image:title></image:image><lastmod>2022-06-10T23:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2022/01/29/five-hacking-tips-pwnkit/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2022/01/pwnkitthumbnail.png</image:loc><image:title>PwnkitThumbnail</image:title><image:caption>PWNKit</image:caption></image:image><lastmod>2022-06-10T23:50:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/home-2/</loc><lastmod>2022-06-10T23:30:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.sysrisk.com/blog-2/</loc><lastmod>2022-01-23T00:58:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.sysrisk.com/2021/08/17/are-you-sinking-dns/</loc><lastmod>2021-08-16T19:54:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/14/human-intervention-in-event-analysis/</loc><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2020/10/dashmagiqrecording-1.jpg</image:loc><image:title>DashMagiqRecording</image:title></image:image><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2020/10/dashmagiqpatchworkflow-1.jpg</image:loc><image:title>DashMagiqPatchWorkflow</image:title></image:image><image:image><image:loc>https://blog.sysrisk.com/wp-content/uploads/2020/10/dashmagiq-solutions.jpg</image:loc><image:title>dashmagiq-solutions</image:title></image:image><lastmod>2020-10-15T06:07:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/15/consistent-event-management/</loc><lastmod>2020-10-14T23:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/13/the-ciso-role-is-technical/</loc><lastmod>2020-10-13T04:53:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/2020/10/13/example-post/</loc><lastmod>2020-10-13T04:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.sysrisk.com/about/</loc><lastmod>2020-10-13T01:55:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.sysrisk.com/contact/</loc><lastmod>2020-10-13T01:55:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.sysrisk.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-01-12T01:13:25+00:00</lastmod></url></urlset>
