<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://showmecyber.com/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='April 6, 2026 10:46 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://showmecyber.com/hello-world/</loc>
		<lastmod>2018-08-03T00:51:09+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/driving-forces-for-security-automation/</loc>
		<lastmod>2018-08-03T02:02:12+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/identifying-threats-and-managing-risks/</loc>
		<lastmod>2018-08-04T19:02:42+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/moving-target-defenses/</loc>
		<lastmod>2018-08-04T19:03:17+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/they-came-in-peace/</loc>
		<lastmod>2018-08-14T11:22:56+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/adaptive-cyber-defense-and-the-observe-orient-decide-act-ooda-loop/</loc>
		<lastmod>2018-08-21T12:03:16+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/the-downfall-of-wang-why-scenario-planning-matters/</loc>
		<lastmod>2018-08-28T11:24:10+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/motivational-factors-information-security-compliance/</loc>
		<lastmod>2018-08-30T00:22:46+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/narrowing-the-gap-a-conceptual-framework-for-adaptive-cyber-defense/</loc>
		<lastmod>2018-09-04T02:20:46+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/how-a-failed-drug-became-a-huge-success/</loc>
		<lastmod>2018-09-11T12:01:46+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/join-me-at-integrated-cyber/</loc>
		<lastmod>2018-09-23T22:37:49+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/denial-and-deception-the-art-of-intelligence/</loc>
		<lastmod>2018-10-09T01:18:52+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/enhancing-defense-with-deception/</loc>
		<lastmod>2018-11-05T12:33:29+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/what-it-means-to-be-a-veteran/</loc>
		<lastmod>2018-11-10T01:29:34+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/mumbai-terrorist-attack-10th-anniversary/</loc>
		<lastmod>2018-11-15T15:52:37+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/insider-threat-detection-with-data-analytics/</loc>
		<lastmod>2019-02-10T20:13:54+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/update-on-my-research/</loc>
		<lastmod>2019-05-14T00:59:17+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/my-first-journal-publication/</loc>
		<lastmod>2023-02-19T16:50:58+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/join-me-borderless-cyber/</loc>
		<lastmod>2019-09-30T00:44:41+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/security-engineering-and-pancakes/</loc>
		<lastmod>2019-11-06T19:42:55+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/deepfakes-or-ai-generated-synthetic-media-not-just-for-porn-anymore/</loc>
		<lastmod>2023-07-11T18:18:48+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/machine-learning-overview-for-cybersecurity-professionals/</loc>
		<lastmod>2023-07-11T18:12:43+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/machine-learning-cybersecurity-securing-ml-in-an-adversarial-environment/</loc>
		<lastmod>2023-07-11T18:12:57+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/ty-detmer-was-better-than-tom-brady-confirmation-bias-in-the-age-of-chatgpt/</loc>
		<lastmod>2023-07-11T18:10:33+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/the-need-for-automation-in-the-threat-intelligence-process/</loc>
		<lastmod>2023-07-31T20:03:40+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/machine-learning-cybersecurity-securing-ml-in-an-adversarial-environment-2/</loc>
		<lastmod>2023-07-11T18:14:27+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/the-cybersecurity-trinity-ai-automation-and-active-defense/</loc>
		<lastmod>2024-11-01T22:10:26+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/the-cybersecurity-trinity-a-new-model-for-modern-threat-defense/</loc>
		<lastmod>2025-07-03T05:59:27+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/when-uncle-ronnie-teaches-your-ai-defending-machine-learning-in-adversarial-environments/</loc>
		<lastmod>2025-07-04T18:46:04+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/beyond-buzzwords-how-ai-is-quietly-redefining-cyber-defense/</loc>
		<lastmod>2025-07-22T01:10:04+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/why-offensive-ai-security-must-be-built-into-ai-strategy-from-day-one/</loc>
		<lastmod>2026-03-24T16:15:04+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/the-false-sense-of-security-in-ai-driven-cyber-defense/</loc>
		<lastmod>2026-03-24T16:13:40+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/from-experimentation-to-operationalization-the-ai-maturity-gap/</loc>
		<lastmod>2026-03-24T16:14:39+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://showmecyber.com/why-most-ai-strategies-fail-before-they-scale/</loc>
		<lastmod>2026-03-30T17:52:02+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- Request ID: e00487d3bd6102453f6f942d1eb49d88; Queries for sitemap: 4; Total queries: 20; Seconds: 0; Memory for sitemap: 1KB; Total memory: 10MB -->
