<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://defensive-targeteering.net/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='April 14, 2026 9:13 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://defensive-targeteering.net/world-series-field-sensor-security-2/</loc>
		<lastmod>2014-10-28T03:43:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/sandworm-black-energy-ongoing-campaign/</loc>
		<lastmod>2014-10-31T16:21:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/nists-draft-cyber-threat-information-sharing-guide/</loc>
		<lastmod>2014-11-04T16:37:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/zetter-and-stuxnet-why-ics-integrators-and-asset-owner-should-care/</loc>
		<lastmod>2014-11-11T22:43:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/nist-info-sharing-guidance-and-intelligence-requirements/</loc>
		<lastmod>2014-11-07T17:55:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/but-weve-got-two-isacs/</loc>
		<lastmod>2014-11-11T21:30:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/article-on-spy-photographer/</loc>
		<lastmod>2014-11-13T16:33:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/critical-intelligence-quarterly-report/</loc>
		<lastmod>2014-11-18T16:56:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/finding-scada-honeynets-on-shodan/</loc>
		<lastmod>2014-11-20T16:58:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/pcii-and-black-energy-2-incident-response/</loc>
		<lastmod>2014-11-20T21:02:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/alms-for-the-cyber-poor-municipal-water-industry/</loc>
		<lastmod>2014-11-22T04:08:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/vendors-shirk-responsibility-for-writing-advisories/</loc>
		<lastmod>2014-11-24T18:44:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/scada-security-poetry/</loc>
		<lastmod>2014-12-01T15:58:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/pwned-up-industrial-routers/</loc>
		<lastmod>2014-12-01T21:52:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/black-energy-and-ics/</loc>
		<lastmod>2014-12-10T17:25:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/head-start-on-patching-honeywell-vulns/</loc>
		<lastmod>2014-12-11T19:13:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/warning-intelligence-and-negligence/</loc>
		<lastmod>2014-12-11T19:15:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/pipeline-cyber-explosion-yesteryears-news/</loc>
		<lastmod>2014-12-11T21:31:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/covert-emerson-vuln-update/</loc>
		<lastmod>2014-12-18T22:56:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/warning-intelligence/</loc>
		<lastmod>2014-12-11T17:08:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/reconnaissance-exposure/</loc>
		<lastmod>2014-12-18T17:10:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/thoughts-on-countdown-to-zero-day/</loc>
		<lastmod>2014-12-29T18:29:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/schneider-proclima-vulns-ics-or-not/</loc>
		<lastmod>2014-12-22T18:47:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/revisiting-copycats-and-stuxnet/</loc>
		<lastmod>2014-12-22T19:06:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/three-ideas-for-federal-advancement/</loc>
		<lastmod>2015-01-12T17:31:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/national-security-systems-and-ics/</loc>
		<lastmod>2015-01-17T04:33:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/on-info-sharing/</loc>
		<lastmod>2015-01-19T18:17:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/fines-or-traffic-school-for-online-ics/</loc>
		<lastmod>2015-01-27T03:33:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/secure-your-buildings-uhhhh/</loc>
		<lastmod>2015-01-27T22:46:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/ics-vendors-seven-ways-to-smell-like-a-security-champ/</loc>
		<lastmod>2015-02-06T19:32:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/0x0564-is-an-act-of-war/</loc>
		<lastmod>2015-02-04T19:39:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/from-gao-osint-to-cne/</loc>
		<lastmod>2015-02-17T16:17:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/shaking-foundations/</loc>
		<lastmod>2015-02-19T19:33:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/monitoring-for-exploits-vs-vulnerabilities/</loc>
		<lastmod>2015-02-26T04:46:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/six-reasons-government-led-info-sharing-wont-die/</loc>
		<lastmod>2015-03-02T17:03:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/dni-clappers-threat-assessment-something-sensible-something-exaggerated/</loc>
		<lastmod>2015-03-03T17:45:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/five-reasons-ics-security-fragility-hasnt-mattered-yet/</loc>
		<lastmod>2015-03-02T22:38:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/automated-pre-cyber-terrorism-indicators-anyone/</loc>
		<lastmod>2015-03-19T14:54:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/protecting-what-matters-most/</loc>
		<lastmod>2015-03-20T03:49:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/swc-audit-lessons/</loc>
		<lastmod>2015-03-25T04:55:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/plain-convo-about-threat-intelligence/</loc>
		<lastmod>2017-09-30T04:32:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/more-plain-convo-about-cyber-threat-intelligence/</loc>
		<lastmod>2017-09-30T04:50:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/plain-convo-iii/</loc>
		<lastmod>2017-12-22T23:35:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/plan-conversation-no-4/</loc>
		<lastmod>2017-12-21T19:49:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/the-big-4-cyber-threat-intelligence-types/</loc>
		<lastmod>2017-12-30T06:10:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/striking-the-match-with-cyber-threat-intelligence/</loc>
		<lastmod>2017-12-30T05:46:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/on-indications/</loc>
		<lastmod>2017-12-30T06:20:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/434-2/</loc>
		<lastmod>2018-01-23T05:22:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/thinking-like-an-intelligence-analyst/</loc>
		<lastmod>2018-01-23T06:05:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/indicationvsindicator/</loc>
		<lastmod>2018-02-14T06:02:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/dealing-with-the-biggies/</loc>
		<lastmod>2018-02-14T05:56:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://defensive-targeteering.net/wrap-up-on-cyber-risk-intelligence-process/</loc>
		<lastmod>2018-03-01T05:27:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- Request ID: a8f1dbe8478a46fbebefb90e539744b3; Queries for sitemap: 4; Total queries: 46; Seconds: 0.01; Memory for sitemap: 1KB; Total memory: 36MB -->
