<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://designingrisk.com/2025/07/01/homelab-with-ubuntu/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-01T20:03:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2025/01/04/ahagai-day-6-of-30-fika-and-ikigai-in-the-era-of-ai/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/01/screenshot-2025-01-04-091528.png</image:loc><image:title>Screenshot 2025-01-04 091528</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-04T16:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/podcast/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/ll-sponsor-podcast.png</image:loc><image:title>LL-sponsor-podcast</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/ccp_bg2.png</image:loc><image:title>CCP_BG2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/ccp_bg.png</image:loc><image:title>CCP_BG</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/pandora_listen.webp</image:loc><image:title>pandora_listen</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/apple_pod_logo.png</image:loc><image:title>apple_pod_logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/5f04653b436ce90dc60f0580_apple-1.png</image:loc><image:title>5f04653b436ce90dc60f0580_apple-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/download-2.png</image:loc><image:title>download-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/listen-on-tunein-badge.webp</image:loc><image:title>listen-on-tunein-badge</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/5f05ed902d51d49cdb775382_overcast-p-500.png</image:loc><image:title>5f05ed902d51d49cdb775382_overcast-p-500</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/5f04653b436ce90dc60f0580_apple.png</image:loc><image:title>5f04653b436ce90dc60f0580_apple</image:title></image:image><lastmod>2024-12-30T15:45:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/2024/12/26/ahagai-day-3-of-30-kaizen/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-12-26T17:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/12/24/how-to-use-generative-ai-to-be-a-better-person/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/12/ccp-11-7.png</image:loc><image:title>CCP-11 (7)</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/12/ccp-11-6.png</image:loc><image:title>CCP-11 (6)</image:title></image:image><lastmod>2024-12-24T18:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/11/04/addressing-gaps-in-open-source-llm-vulnerability-scanners/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/ai-llm-scanners-2-1.png</image:loc><image:title>AI-LLM-SCANNERS-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/ai-llm-scanners-2.png</image:loc><image:title>AI-LLM-SCANNERS-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/ai-vuln-scanners.png</image:loc><image:title>AI-Vuln-scanners</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-04T12:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/author/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/british-columbia-institute-of-technology-bcit-vector-logo.png</image:loc><image:title>british-columbia-institute-of-technology-bcit-vector-logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/ubc_3.png</image:loc><image:title>ubc_3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/400pngdpilogo-1024x619-1.png</image:loc><image:title>400pngdpilogo-1024x619-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/summitlogo-flat3.jpg</image:loc><image:title>summitlogo-flat3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/btex-logo.png</image:loc><image:title>BTEX-logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/csa-logo-rgb-079e6ddcc112faad8b9d3fd3c64a7e78.png.webp</image:loc><image:title>csa-logo-rgb-079e6ddcc112faad8b9d3fd3c64a7e78.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/a02217d52a5da189c32aa5946c8222bd_icon.png</image:loc><image:title>a02217d52a5da189c32aa5946c8222bd_icon</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/11/screenshot-2024-11-03-165222.png</image:loc><image:title>Screenshot 2024-11-03 165222</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/vmug_userconlogo_stacked.jpg</image:loc><image:title>Print</image:title></image:image><lastmod>2024-11-03T22:54:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/2024/08/28/international-ai-standards/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/int-ai-standards.png</image:loc><image:title>Int-AI-standards</image:title></image:image><lastmod>2024-11-02T10:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/08/13/episode-10-the-owasp-top-10-for-llms-apps-cybersecurity-and-governance-checklist-with-sandy-dunn/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/db-profile-2.png</image:loc><image:title>db--profile-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/sdunn-profile.png</image:loc><image:title>sdunn-profile</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/08/ccp-11-3.png</image:loc><image:title>CCP-11 (3)</image:title></image:image><lastmod>2024-08-14T12:02:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/05/27/episode-09-emerging-threats/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/113.png</image:loc><image:title>113</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/df-image.png</image:loc><image:title>df-image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/btex-ef.png</image:loc><image:title>btex-ef</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/ccp-logo-black.png</image:loc><image:title>ccp-logo-black</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/ccp-logo.png</image:loc><image:title>ccp-logo</image:title></image:image><lastmod>2024-05-27T11:06:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/05/09/focus-on-gen-ai-prompt-engineering/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/prompt-engineering.png</image:loc><image:title>prompt-engineering</image:title></image:image><lastmod>2024-05-09T11:48:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2024/05/06/focus-on-gen-ai-the-fundamentals/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/not-working-2.png</image:loc><image:title>not-working-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/not-working.png</image:loc><image:title>not-working</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-05-06T11:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/11/23/using-chatgpt-for-defensive-security-operations/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2024/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/11/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/11/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/11/2023-isc2-security-congress-daemon-behr-using-chatgpt-for-defensive-security-operations-v910.png</image:loc><image:title>2023-isc2-security-congress-daemon-behr-using-chatgpt-for-defensive-security-operations-v910</image:title></image:image><lastmod>2024-04-30T02:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/08/30/episode-08-operational-technology-security/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/ag-podcast-header.png</image:loc><image:title>ag-podcast-header</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/ag-profile.jpg</image:loc><image:title>ag-profile</image:title></image:image><lastmod>2023-08-30T13:34:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/08/18/global-ai-regulation/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/ai-world_flags.png</image:loc><image:title>ai-world_flags</image:title></image:image><lastmod>2023-08-18T12:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/08/17/chatgpt-for-threat-actors/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/darkbart.png</image:loc><image:title>darkbart</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/fraudgpt.png</image:loc><image:title>fraudgpt</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/wormgpt.png</image:loc><image:title>wormgpt</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/evil-chatbot.png</image:loc><image:title>evil-chatbot</image:title></image:image><lastmod>2023-08-17T12:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/08/10/episode-07-llm-governance-security-policies-enterprise-integration/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/08/1690305694776.jpg</image:loc><image:title>1690305694776</image:title></image:image><lastmod>2023-08-10T04:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/07/07/chatgpt-in-the-cybersecurity-industry/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/07/lb-profile.jpg</image:loc><image:title>lb-profile</image:title></image:image><lastmod>2023-07-07T22:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/06/07/key-findings-verizon-2023-dbir/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/dbir_blog_featured.png</image:loc><image:title>dbir_blog_featured</image:title></image:image><lastmod>2023-06-07T11:28:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/06/02/episode-05-preparing-for-cyber-threats/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/db_profile.png</image:loc><image:title>db_profile</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/lc_profile-1.png</image:loc><image:title>lc_profile-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/lc_profile.png</image:loc><image:title>lc_profile</image:title></image:image><lastmod>2023-06-03T02:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/06/01/i-wrote-a-cybersecurity-article-every-day/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-47.png</image:loc><image:title>image-47</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-46.png</image:loc><image:title>image-46</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-45.png</image:loc><image:title>image-45</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-44.png</image:loc><image:title>image-44</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/30-days-of-articles.png</image:loc><image:title>30-days-of-articles</image:title></image:image><lastmod>2023-06-01T16:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/30/unlocking-your-cybersecurity-budget/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/cyber_budget.png</image:loc><image:title>cyber_budget</image:title></image:image><lastmod>2023-05-30T15:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/29/a-comprehensive-analysis-of-cisas-stopransomware-guide/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-43.png</image:loc><image:title>image-43</image:title></image:image><lastmod>2023-05-29T10:46:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/28/3-emerging-cyber-threat-actors/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-42.png</image:loc><image:title>image-42</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-41.png</image:loc><image:title>image-41</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-40.png</image:loc><image:title>image-40</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_collage_of_images_related_to_cyber_warfare_bursting_f_2fffaa6f-cfb0-4724-ba24-49c4cec7c94f.png</image:loc><image:title>decibel_a_collage_of_images_related_to_cyber_warfare_bursting_f_2fffaa6f-cfb0-4724-ba24-49c4cec7c94f</image:title></image:image><lastmod>2023-05-28T12:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/27/10-must-read-cybersecurity-books/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-39.png</image:loc><image:title>image-39</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-38.png</image:loc><image:title>image-38</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-37.png</image:loc><image:title>image-37</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-36.png</image:loc><image:title>image-36</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-35.png</image:loc><image:title>image-35</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_an_expansive_private_library_with_ladders_and_staircase_b3e38d89-5482-4a50-a631-fe885e6220c4.png</image:loc><image:title>decibel_an_expansive_private_library_with_ladders_and_staircase_b3e38d89-5482-4a50-a631-fe885e6220c4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-34.png</image:loc><image:title>image-34</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-33.png</image:loc><image:title>image-33</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-32.png</image:loc><image:title>image-32</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-31.png</image:loc><image:title>image-31</image:title></image:image><lastmod>2023-05-27T04:24:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/25/unmasking-volt-typhoon/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-29.png</image:loc><image:title>image-29</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-27.png</image:loc><image:title>image-27</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_volt_typhoon_6610ca9d-c067-4168-b82e-1d9528379529-1.png</image:loc><image:title>decibel_volt_typhoon_6610ca9d-c067-4168-b82e-1d9528379529-1</image:title></image:image><lastmod>2023-05-26T03:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/25/cybersecurity-budget-a-simplified-guide/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-26.png</image:loc><image:title>image-26</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-25.png</image:loc><image:title>image-25</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-22.png</image:loc><image:title>image-22</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel__a_small_pile_of_gold_coins_2_63e35595-c3d8-4677-a8ae-20c2f8e6a073.png</image:loc><image:title>decibel__a_small_pile_of_gold_coins_2_63e35595-c3d8-4677-a8ae-20c2f8e6a073</image:title></image:image><lastmod>2023-05-25T11:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/23/ai-voice-cloning-threats/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/voice_clone_2.png</image:loc><image:title>voice_clone_2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/descript_logo_horizontal_color_invert-v2.png</image:loc><image:title>descript_logo_horizontal_color_invert-v2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/logo-dark.png</image:loc><image:title>logo-dark</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/logo.png</image:loc><image:title>logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_create_an_surreal_image_of_a_voice_cloning_threat_in_th_e671eb7d-3389-440d-92e6-eed569228aca.png</image:loc><image:title>decibel_create_an_surreal_image_of_a_voice_cloning_threat_in_th_e671eb7d-3389-440d-92e6-eed569228aca</image:title></image:image><lastmod>2023-05-24T03:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/23/building-a-security-operations-center/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/soc.png</image:loc><image:title>soc</image:title></image:image><lastmod>2023-05-23T11:25:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/17/unique-executive-perspectives/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/sophia_einarsdottir-portait.png</image:loc><image:title>sophia_einarsdottir-portait</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/marcus_anderson-portrait.png</image:loc><image:title>marcus_anderson-portrait</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/emily_collins-portrait.png</image:loc><image:title>emily_collins-portrait</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/ben_hyun-portrait.png</image:loc><image:title>ben_hyun-portrait</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/amelia_thompson-portrait.png</image:loc><image:title>amelia_thompson-portrait</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-19.png</image:loc><image:title>image-19</image:title></image:image><lastmod>2023-05-22T13:45:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/22/understanding-the-future-a-ctos-guide/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_female_executive_holding_a_crystal_ball_in_her_hand_1_53bb9b6a-e652-4626-97e1-6d6eb789cef6.png</image:loc><image:title>decibel_a_female_executive_holding_a_crystal_ball_in_her_hand_1_53bb9b6a-e652-4626-97e1-6d6eb789cef6</image:title></image:image><lastmod>2023-05-22T12:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/21/fiscal-responsibility-and-technology-strategy/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_woman_in_her_50s_in_a_suit_in_a_boardroom_in_the_styl_56389a12-6f81-4fe2-b873-a94c0d8f9a66.png</image:loc><image:title>decibel_a_woman_in_her_50s_in_a_suit_in_a_boardroom_in_the_styl_56389a12-6f81-4fe2-b873-a94c0d8f9a66</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_an_older_woman_in_a_suit_in_a_boardroom_in_the_style_of_81814000-90e5-4217-9494-6e1746fe8173.png</image:loc><image:title>decibel_an_older_woman_in_a_suit_in_a_boardroom_in_the_style_of_81814000-90e5-4217-9494-6e1746fe8173</image:title></image:image><lastmod>2023-05-21T15:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/20/canadas-new-artificial-intelligence-law/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/aida-post-pic.png</image:loc><image:title>aida-post-pic</image:title></image:image><lastmod>2023-05-20T15:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/19/30in30-post-19-striking-the-balance-innovation-and-security-in-cloud-transformation-projects/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_woman_stands_in_front_of_a_ted_wall_in_the_style_of_pet_3f38870a-83f0-494d-b274-a274b4edd806.png</image:loc><image:title>decibel_woman_stands_in_front_of_a_ted_wall_in_the_style_of_pet_3f38870a-83f0-494d-b274-a274b4edd806</image:title></image:image><lastmod>2023-05-19T12:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/18/cybersecurity-initiatives-to-protect-our-city/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_business_person_in_front_of_city_hall_0ab14ab0-4281-42b9-a6fe-6561859bada8.png</image:loc><image:title>decibel_business_person_in_front_of_city_hall_0ab14ab0-4281-42b9-a6fe-6561859bada8</image:title></image:image><lastmod>2023-05-18T10:30:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/16/emerging-frontiers-in-cybersecurity/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/article_16.png</image:loc><image:title>article_16</image:title></image:image><lastmod>2023-05-16T11:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/15/access-the-dark-web-safely/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/tor.png</image:loc><image:title>tor</image:title></image:image><lastmod>2023-05-15T04:16:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/14/high-security-environment-collaboration/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/hisec_colab.png</image:loc><image:title>hisec_colab</image:title></image:image><lastmod>2023-05-15T02:01:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/14/gardening-and-cybersecurity/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/tractor-1.png</image:loc><image:title>tractor</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/tractor.png</image:loc><image:title>tractor</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_futuristic_tractor_plowing_a_garden_astronaut_on_mars_7d7364a6-e672-44ed-9d99-e3e81414c60d.png</image:loc><image:title>decibel_a_futuristic_tractor_plowing_a_garden_astronaut_on_mars_7d7364a6-e672-44ed-9d99-e3e81414c60d</image:title></image:image><lastmod>2023-05-14T06:11:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/12/reporting-cyber-attacks-in-canada/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/call-center.png</image:loc><image:title>call-center</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/report_attack.png</image:loc><image:title>report_attack</image:title></image:image><lastmod>2023-05-12T11:25:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/11/co-option-of-hacker-culture/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/gf_capitalism.png</image:loc><image:title>gf_capitalism</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/mask_factory.png</image:loc><image:title>mask_factory</image:title></image:image><lastmod>2023-05-11T17:11:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/10/cybercrime-law-in-canada/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/img_2023_05_10_11_39_38.jpeg</image:loc><image:title>Img_2023_05_10_11_39_38</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/cybercrime.png</image:loc><image:title>cybercrime</image:title></image:image><lastmod>2023-05-10T21:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/09/cse-annual-report-2021-2022/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/cse_2021-22_post.png</image:loc><image:title>cse_2021-22_post</image:title></image:image><lastmod>2023-05-09T18:20:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/08/recorded-future-ceo-generative-ai/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/blog_8_featured_image.png</image:loc><image:title>blog_8_featured_image</image:title></image:image><lastmod>2023-05-08T08:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/07/gamification-of-cybersecurity-part-1/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_cybersecurity_themed_card_game_in_the_style_of_magic__2dd539d3-ab94-4063-8c36-f6e89cb8fa2f-1.png</image:loc><image:title>decibel_a_cybersecurity_themed_card_game_in_the_style_of_magic__2dd539d3-ab94-4063-8c36-f6e89cb8fa2f</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_a_cybersecurity_themed_card_game_in_the_style_of_magic__2dd539d3-ab94-4063-8c36-f6e89cb8fa2f.png</image:loc><image:title>decibel_a_cybersecurity_themed_card_game_in_the_style_of_magic__2dd539d3-ab94-4063-8c36-f6e89cb8fa2f</image:title></image:image><lastmod>2023-05-07T10:48:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/06/balancing-it-spend/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/optimizing_it_spend.png</image:loc><image:title>optimizing_it_spend</image:title></image:image><lastmod>2023-05-06T16:45:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/05/sase-for-remote-work/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_none_1_5f263f06-f1ef-4d51-ab04-257356150820-1.png</image:loc><image:title>decibel_None_1_5f263f06-f1ef-4d51-ab04-257356150820</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_none_1_5f263f06-f1ef-4d51-ab04-257356150820.png</image:loc><image:title>decibel_none_1_5f263f06-f1ef-4d51-ab04-257356150820</image:title></image:image><lastmod>2023-05-05T13:26:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/04/zta-a-paradigm-shift-in-cybersecurity-architecture/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_zero_trust_a_game-changer_in_cybersecurity_architecture_37b4dd4d-bd56-41f1-899c-e42ed897ed91-1.png</image:loc><image:title>decibel_Zero_Trust_A_Game-Changer_in_Cybersecurity_Architecture_37b4dd4d-bd56-41f1-899c-e42ed897ed91</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_zero_trust_a_game-changer_in_cybersecurity_architecture_37b4dd4d-bd56-41f1-899c-e42ed897ed91.png</image:loc><image:title>decibel_zero_trust_a_game-changer_in_cybersecurity_architecture_37b4dd4d-bd56-41f1-899c-e42ed897ed91</image:title></image:image><lastmod>2023-05-04T13:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/03/security-modernization-how-to-keep-up-with-evolving-threats/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_security_modernization._how_to_keep_up_with_evolving_th_713ac70e-01c4-4247-b5a8-06b58667e4fc.png</image:loc><image:title>decibel_security_modernization._how_to_keep_up_with_evolving_th_713ac70e-01c4-4247-b5a8-06b58667e4fc</image:title></image:image><lastmod>2023-05-03T12:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/02/the-rise-of-ai-in-cybersecurity-separating-hype-from-reality/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_the_rise_of_artificial_intelligence_in_cybersecurity._s_b894a8b1-445e-4efa-a46d-0e206efbfb81.png</image:loc><image:title>decibel_the_rise_of_artificial_intelligence_in_cybersecurity._S_b894a8b1-445e-4efa-a46d-0e206efbfb81</image:title></image:image><lastmod>2023-05-02T10:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/05/01/why-mdr-is-a-must-have-in-your-cybersecurity-strategy/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/05/decibel_why_managed_detection_and_response_is_a_must-have_in_yo_97fefd66-a13d-4637-881e-134554ce4e45.png</image:loc><image:title>decibel_why_managed_detection_and_response_is_a_must-have_in_yo_97fefd66-a13d-4637-881e-134554ce4e45</image:title></image:image><lastmod>2023-05-01T14:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/04/25/calculating-the-cost-of-a-breach-casino-edition-spoiler-over-36m/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-25T20:11:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/04/12/episode-04-the-evolution-of-zero-trust-architecture-ztna-and-sase-the-canadian-cybersecurity-podcast/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/ek_profile.png</image:loc><image:title>ek_profile</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/sec-pod-image.png</image:loc><image:title>sec-pod-image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/04/ek-profile.jpg</image:loc><image:title>ek-profile</image:title></image:image><lastmod>2023-04-13T05:04:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/03/20/episode-03-level-up-your-red-team-campaigns-with-redstack-the-canadian-cybersecurity-podcast/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/redstack_logo-1.png</image:loc><image:title>redstack_logo-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/redstack_logo.png</image:loc><image:title>redstack_logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/03/ec_linkedin_profile.jpeg</image:loc><image:title>ec_linkedin_profile</image:title></image:image><lastmod>2023-03-20T13:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/02/28/the-canadian-cybersecurity-podcast-episode-02-the-state-of-the-cyber-insurance-market-in-2023/</loc><lastmod>2023-02-28T00:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/02/21/the-canadian-cybersecurity-podcast-episode-01-the-disparity-between-the-number-of-cybersecurity-professionals-in-the-industry-and-the-vacant-positions-in-the-market/</loc><lastmod>2023-02-24T02:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2023/01/03/trust-and-bias-in-ai-public-sentiment-and-regulatory-frameworks/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2023/01/sherlock_v1.png</image:loc><image:title>sherlock_v1</image:title></image:image><lastmod>2023-01-03T16:55:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/12/19/using-generative-ai-for-cybersecurity-part-1-of-4-workflow-classification/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/ai_cybersecurity_mgmt.png</image:loc><image:title>ai_cybersecurity_mgmt</image:title></image:image><lastmod>2022-12-19T12:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/11/07/the-canadian-centre-for-cyber-security-recently-released-the-national-cyber-threat-assessment-for-2023-2024/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/aw-banner.png</image:loc><image:title>aw-banner</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/blog_article_2022-11-002.png</image:loc><image:title>blog_article_2022-11-002</image:title></image:image><lastmod>2022-12-15T11:27:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/10/12/recommendations-to-improve-the-resilience-of-canadas-digital-supply-chain/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/aw-banner.jpg</image:loc><image:title>aw-banner</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/article-2022-10-001.png</image:loc><image:title>article-2022-10-001</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/sw-doctored.png</image:loc><image:title>sw-doctored</image:title></image:image><lastmod>2022-12-15T11:24:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/10/14/bill-c-26-and-what-it-means-for-cybersecurity-in-canada-part-1-telecommunications-services/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/bill-c26.png</image:loc><image:title>bill-c26</image:title></image:image><lastmod>2022-12-15T11:23:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/10/21/bill-c-26-arcs-and-what-it-means-for-cybersecurity-in-canada-part-2-banking-systems/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/10/article-2022-10-002.png</image:loc><image:title>article-2022-10-002</image:title></image:image><lastmod>2022-12-15T11:22:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/11/02/bill-c-26-arcs-and-what-it-means-for-cybersecurity-in-canada-part-3-energy-sector/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-12-15T11:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/11/22/bill-c-26-arcs-and-what-it-means-for-cybersecurity-in-canada-part-4-transportation-systems/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/toronto-to-vancouver-by-train-with-the-canadian.webp</image:loc><image:title>toronto-to-vancouver-by-train-with-the-canadian</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/11/article-4-2022-11.png</image:loc><image:title>article-4-2022-11</image:title></image:image><lastmod>2022-12-15T11:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/12/05/2022-countdown-to-a-massive-surge-in-cyber-attacks-how-to-mitigate-attack-impact-before-the-holidays/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/krampus_malware.png</image:loc><image:title>krampus_malware</image:title></image:image><lastmod>2022-12-15T11:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/12/09/the-unspoken-truth-of-ransomware-payouts-in-canada/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/dallc2b7e-2022-12-09-00.19.04-a-neighborhood-on-fire-with-grass-in-front-of-it.-photorealistic-news-footage.-canon-dslr-2.png</image:loc><image:title>dallc2b7e-2022-12-09-00.19.04-a-neighborhood-on-fire-with-grass-in-front-of-it.-photorealistic-news-footage.-canon-dslr-2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/ransom-katz.png</image:loc><image:title>ransom-katz</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/12/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2022-12-14T20:11:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2022/08/17/30-days-of-cyber-nights-day-1-hacking-starlink/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/08/screenshot-2022-08-17-154844.png</image:loc><image:title>screenshot-2022-08-17-154844</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2022/08/hacking-starlink.png</image:loc><image:title>hacking-starlink</image:title></image:image><lastmod>2022-08-17T19:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/buy/</loc><lastmod>2018-11-29T19:09:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/2018/08/18/vmworld-2018-sessions-with-daemon-behr/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/db-session.png</image:loc><image:title>db-session</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/vmtn7703u.png</image:loc><image:title>VMTN7703U</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/code5543u.png</image:loc><image:title>CODE5543U</image:title></image:image><lastmod>2018-08-18T05:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/08/18/win-a-free-conference-pass-to-vmworld-2018-when-you-purchase-designing-risk-in-it-infrastructure/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/snoop-dogg-9.jpg</image:loc><image:title>snoop-dogg-9</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/hqdefault.jpg</image:loc><image:title>hqdefault</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/driii-vmworld.png</image:loc><image:title>DRIII-vmworld</image:title></image:image><lastmod>2018-08-18T04:38:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/08/11/001-operational-risk-for-global-organizations-in-the-wake-of-a-ballistic-missile-attack/</loc><lastmod>2018-08-16T19:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/08/11/002-beyond-bitcoin-vmware-and-the-future-of-blockchain-technology/</loc><lastmod>2018-08-16T19:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/08/11/003-vmware-enterprise-blockchain-solutions/</loc><lastmod>2018-08-16T19:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/08/11/004-rubrik-msp-model/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/podcast_logo2.png</image:loc><image:title>Podcast_logo2</image:title></image:image><lastmod>2018-08-16T19:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/ita-series/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/b5856-410ad2_1ff70deb32c249629a74f5cff6a3189fmv2.png</image:loc><image:title>b5856-410ad2_1ff70deb32c249629a74f5cff6a3189fmv2</image:title></image:image><lastmod>2018-08-16T17:29:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/contact/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/08/old-letters2-1.jpg</image:loc><image:title>old-letters2-1</image:title></image:image><lastmod>2018-08-16T17:15:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/blog/</loc><lastmod>2018-08-16T16:20:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://designingrisk.com/2017/08/25/probability-and-assumptions-the-monty-hall-problem/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/247ea-410ad2_5e1c8d535dc24097b7a8276b440ef954mv2.png</image:loc><image:title>247ea-410ad2_5e1c8d535dc24097b7a8276b440ef954mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/d8acf-410ad2_6f63a26e06b34f04b144c59e95499cdamv2.jpg</image:loc><image:title>d8acf-410ad2_6f63a26e06b34f04b144c59e95499cdamv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_6f63a26e06b34f04b144c59e95499cdamv2.jpg</image:loc><image:title>410ad2_6f63a26e06b34f04b144c59e95499cda~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_5e1c8d535dc24097b7a8276b440ef954mv2.png</image:loc><image:title>410ad2_5e1c8d535dc24097b7a8276b440ef954~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_5e1c8d535dc24097b7a8276b440ef954mv2-1.png</image:loc><image:title>410ad2_5e1c8d535dc24097b7a8276b440ef954~mv2.png</image:title></image:image><lastmod>2018-08-13T03:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/book-release-and-signing-at-vmworld-us-2017/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/08e58-410ad2_756f213634a0481dbf0ec71e29abc48cmv2.png</image:loc><image:title>08e58-410ad2_756f213634a0481dbf0ec71e29abc48cmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/cd56e-410ad2_b1180e94b8a44f7d8ec76bc83b7e77e3mv2.jpg</image:loc><image:title>cd56e-410ad2_b1180e94b8a44f7d8ec76bc83b7e77e3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_b1180e94b8a44f7d8ec76bc83b7e77e3mv2.jpg</image:loc><image:title>410ad2_b1180e94b8a44f7d8ec76bc83b7e77e3~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_756f213634a0481dbf0ec71e29abc48cmv2.png</image:loc><image:title>410ad2_756f213634a0481dbf0ec71e29abc48c~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_756f213634a0481dbf0ec71e29abc48cmv2.png</image:loc><image:title>410ad2_756f213634a0481dbf0ec71e29abc48c~mv2.png</image:title></image:image><lastmod>2018-08-13T03:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/tech-talks/</loc><lastmod>2018-08-13T03:40:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/site-reliability-engineering-and-embracing-risk/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/1cdad-410ad2_0f0e26138f2f41f18538d73add80c6admv2.jpg</image:loc><image:title>1cdad-410ad2_0f0e26138f2f41f18538d73add80c6admv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_0f0e26138f2f41f18538d73add80c6admv2.jpg</image:loc><image:title>410ad2_0f0e26138f2f41f18538d73add80c6ad~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_0f0e26138f2f41f18538d73add80c6admv2.jpg</image:loc><image:title>410ad2_0f0e26138f2f41f18538d73add80c6ad~mv2.jpg</image:title></image:image><lastmod>2018-08-13T03:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/transparency-in-the-site-failure-of-jan-31st-2017-and-post-mortem-for-gitlab/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/ca720-410ad2_2d2e655ab92b42bfb12d15ed77ffe9f2mv2_d_3285_1900_s_2.png</image:loc><image:title>ca720-410ad2_2d2e655ab92b42bfb12d15ed77ffe9f2mv2_d_3285_1900_s_2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/5acc6-410ad2_22897c44a243475cb8bca86bbec64633mv2.png</image:loc><image:title>5acc6-410ad2_22897c44a243475cb8bca86bbec64633mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/f67ed-410ad2_c3f9345669384af6b3b25ed242875e42mv2.png</image:loc><image:title>f67ed-410ad2_c3f9345669384af6b3b25ed242875e42mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_22897c44a243475cb8bca86bbec64633mv2.png</image:loc><image:title>410ad2_22897c44a243475cb8bca86bbec64633~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_22897c44a243475cb8bca86bbec64633mv2-1.png</image:loc><image:title>410ad2_22897c44a243475cb8bca86bbec64633~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_c3f9345669384af6b3b25ed242875e42mv2.png</image:loc><image:title>410ad2_c3f9345669384af6b3b25ed242875e42~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_2d2e655ab92b42bfb12d15ed77ffe9f2mv2_d_3285_1900_s_2.png</image:loc><image:title>410ad2_2d2e655ab92b42bfb12d15ed77ffe9f2~mv2_d_3285_1900_s_2.png</image:title></image:image><lastmod>2018-08-13T03:33:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/the-continual-search-for-creative-perspectives-in-infrastructure-design/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/b704c-410ad2_eb5376b5ceeb4404a60bf2b692d3a2b5mv2.png</image:loc><image:title>b704c-410ad2_eb5376b5ceeb4404a60bf2b692d3a2b5mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/b2b5b-410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0mv2.png</image:loc><image:title>b2b5b-410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0mv2.png</image:loc><image:title>410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_eb5376b5ceeb4404a60bf2b692d3a2b5mv2.png</image:loc><image:title>410ad2_eb5376b5ceeb4404a60bf2b692d3a2b5~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0mv2.png</image:loc><image:title>410ad2_9b4bd39ad0eb4ab49e09d0b17caf04b0~mv2.png</image:title></image:image><lastmod>2018-08-13T03:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/the-cost-of-an-outage/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/c359c-410ad2_1c4adf4741f24183ac405a58ff6c3f5dmv2.png</image:loc><image:title>c359c-410ad2_1c4adf4741f24183ac405a58ff6c3f5dmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_1c4adf4741f24183ac405a58ff6c3f5dmv2.png</image:loc><image:title>410ad2_1c4adf4741f24183ac405a58ff6c3f5d~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_1c4adf4741f24183ac405a58ff6c3f5dmv2-1.png</image:loc><image:title>410ad2_1c4adf4741f24183ac405a58ff6c3f5d~mv2.png</image:title></image:image><lastmod>2018-08-13T03:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/02/16/beyond-bitcoin-vmware-and-the-future-of-blockchain-technologies/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/a594e-410ad2_1341c8e72a004c289b8268c534bbf3a3mv2.png</image:loc><image:title>a594e-410ad2_1341c8e72a004c289b8268c534bbf3a3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/06e08-410ad2_609d4e661766410e8a88601e48445bc8mv2.png</image:loc><image:title>06e08-410ad2_609d4e661766410e8a88601e48445bc8mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/246ba-410ad2_b1dcc5a679d54125b057645ca391446fmv2.png</image:loc><image:title>246ba-410ad2_b1dcc5a679d54125b057645ca391446fmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/4b2c6-410ad2_97c5cee4af134f5c839e23ae5b5d2c54mv2_d_1301_1277_s_2.png</image:loc><image:title>4b2c6-410ad2_97c5cee4af134f5c839e23ae5b5d2c54mv2_d_1301_1277_s_2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/db746-410ad2_3f0270e7170d48e48ac903c36c137777mv2.png</image:loc><image:title>db746-410ad2_3f0270e7170d48e48ac903c36c137777mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/efa19-410ad2_feb8009dcbc147e6b5e1da3bb7aa0e27mv2.png</image:loc><image:title>efa19-410ad2_feb8009dcbc147e6b5e1da3bb7aa0e27mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/5075f-410ad2_e9464ecbb51f44d1a0517d8bfaf98dd5mv2-e1534130897455.png</image:loc><image:title>5075f-410ad2_e9464ecbb51f44d1a0517d8bfaf98dd5mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_e9464ecbb51f44d1a0517d8bfaf98dd5mv2.png</image:loc><image:title>410ad2_e9464ecbb51f44d1a0517d8bfaf98dd5~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_feb8009dcbc147e6b5e1da3bb7aa0e27mv2.png</image:loc><image:title>410ad2_feb8009dcbc147e6b5e1da3bb7aa0e27~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_97c5cee4af134f5c839e23ae5b5d2c54mv2_d_1301_1277_s_2.png</image:loc><image:title>410ad2_97c5cee4af134f5c839e23ae5b5d2c54~mv2_d_1301_1277_s_2.png</image:title></image:image><lastmod>2018-08-13T03:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/risk-intelligence-quotient-rq-and-decision-fatigue/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/5b79c-410ad2_8084d705b8db46d1a9f04f5fcf7dafc2mv2.jpeg</image:loc><image:title>5b79c-410ad2_8084d705b8db46d1a9f04f5fcf7dafc2mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/10ca5-410ad2_12c9c81d8f1947cabcd143356a95fd9bmv2.png</image:loc><image:title>10ca5-410ad2_12c9c81d8f1947cabcd143356a95fd9bmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_8084d705b8db46d1a9f04f5fcf7dafc2mv2.jpeg</image:loc><image:title>410ad2_8084d705b8db46d1a9f04f5fcf7dafc2~mv2.jpeg</image:title></image:image><lastmod>2018-08-13T03:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/when-self-healing-systems-attack-themselves/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/50f32-410ad2_b9b97ec7bffc45049da2c2ff230d99a3mv2.png</image:loc><image:title>50f32-410ad2_b9b97ec7bffc45049da2c2ff230d99a3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/76057-410ad2_c21b304672f24f6eb8577f145a0aa965mv2.jpg</image:loc><image:title>76057-410ad2_c21b304672f24f6eb8577f145a0aa965mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_c21b304672f24f6eb8577f145a0aa965mv2.jpg</image:loc><image:title>410ad2_c21b304672f24f6eb8577f145a0aa965~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_b9b97ec7bffc45049da2c2ff230d99a3mv2.png</image:loc><image:title>410ad2_b9b97ec7bffc45049da2c2ff230d99a3~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_c21b304672f24f6eb8577f145a0aa965mv2-1.jpg</image:loc><image:title>410ad2_c21b304672f24f6eb8577f145a0aa965~mv2.jpg</image:title></image:image><lastmod>2018-08-13T03:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/25/why-it-pays-to-allow-failure-to-occur-in-your-infrastructure-the-aws-s3-failure/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/88ab1-410ad2_4fe76fc85d434d0384cdecd649e9b68cmv2.jpg</image:loc><image:title>88ab1-410ad2_4fe76fc85d434d0384cdecd649e9b68cmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/080dd-410ad2_902bb2b73945474fb099587bc56e77d2mv2.png</image:loc><image:title>080dd-410ad2_902bb2b73945474fb099587bc56e77d2mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_902bb2b73945474fb099587bc56e77d2mv2.png</image:loc><image:title>410ad2_902bb2b73945474fb099587bc56e77d2~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_4fe76fc85d434d0384cdecd649e9b68cmv2.jpg</image:loc><image:title>410ad2_4fe76fc85d434d0384cdecd649e9b68c~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/410ad2_902bb2b73945474fb099587bc56e77d2mv2-1.png</image:loc><image:title>410ad2_902bb2b73945474fb099587bc56e77d2~mv2.png</image:title></image:image><lastmod>2018-08-13T03:22:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/28/vmworld-2017-day-one-live-blog/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/b2f1b-410ad2_1f801bca7d604642b81fc4abff267ce4mv2_d_2048_1536_s_2.jpg</image:loc><image:title>b2f1b-410ad2_1f801bca7d604642b81fc4abff267ce4mv2_d_2048_1536_s_2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/45118-410ad2_8d060ec6fb9646d6a09a0f4b7197024fmv2.jpg</image:loc><image:title>45118-410ad2_8d060ec6fb9646d6a09a0f4b7197024fmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/64b1e-410ad2_d9cdb4d7875b4bdea9965458b41e15fdmv2.jpg</image:loc><image:title>64b1e-410ad2_d9cdb4d7875b4bdea9965458b41e15fdmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/95728-410ad2_dcfe02aa95b440c3af81854a4fccda01mv2.jpg</image:loc><image:title>95728-410ad2_dcfe02aa95b440c3af81854a4fccda01mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/af330-410ad2_5789cec5bc0a4978845786ac0bcb23e2mv2.jpg</image:loc><image:title>af330-410ad2_5789cec5bc0a4978845786ac0bcb23e2mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/c01de-410ad2_abedf036cafc44079bdc06dc1fa11391mv2.jpg</image:loc><image:title>c01de-410ad2_abedf036cafc44079bdc06dc1fa11391mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/2f7da-410ad2_43decb64c75a49e7a76a4bc7b0bc60fbmv2.jpg</image:loc><image:title>2f7da-410ad2_43decb64c75a49e7a76a4bc7b0bc60fbmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/c4467-410ad2_2bdebd795dd448c1803b83f782b292afmv2.jpg</image:loc><image:title>c4467-410ad2_2bdebd795dd448c1803b83f782b292afmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/c9ba5-410ad2_9ca8e8a7afc54a60a50cd891b0069997mv2.jpg</image:loc><image:title>c9ba5-410ad2_9ca8e8a7afc54a60a50cd891b0069997mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/1f1b0-410ad2_8bb57cdf8efd4418871d4c454722c84fmv2_d_1536_2048_s_2.jpg</image:loc><image:title>1f1b0-410ad2_8bb57cdf8efd4418871d4c454722c84fmv2_d_1536_2048_s_2</image:title></image:image><lastmod>2018-08-13T03:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/08/29/vmworld-2017-day-two-live-blog/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/4c629-410ad2_a013c663ec0f4e60bc101b14ddb4b201mv2.jpg</image:loc><image:title>4c629-410ad2_a013c663ec0f4e60bc101b14ddb4b201mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/edcb7-410ad2_b9b73bb1a43d4f949f70c8b8116677eemv2.jpg</image:loc><image:title>edcb7-410ad2_b9b73bb1a43d4f949f70c8b8116677eemv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/82d94-410ad2_c73919a9b35a4f7a9c52a3f5a8b6b291mv2.jpg</image:loc><image:title>82d94-410ad2_c73919a9b35a4f7a9c52a3f5a8b6b291mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/c5edc-410ad2_92bc6e46a923466ea5f05c45561caef6mv2.jpg</image:loc><image:title>c5edc-410ad2_92bc6e46a923466ea5f05c45561caef6mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/8e702-410ad2_58cc9b6def2548e88561a2dba85e3f53mv2.png</image:loc><image:title>8e702-410ad2_58cc9b6def2548e88561a2dba85e3f53mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/b392e-410ad2_5164c8044e57438f9e06eeca6eaccb6fmv2.jpg</image:loc><image:title>b392e-410ad2_5164c8044e57438f9e06eeca6eaccb6fmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/4b6c9-410ad2_c5bfc8b798044cf1a2aeee73f4ff7bc3mv2.jpg</image:loc><image:title>4b6c9-410ad2_c5bfc8b798044cf1a2aeee73f4ff7bc3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/362a2-410ad2_c07e3e6f3adb4390b97ebe5de494c2a9mv2.jpg</image:loc><image:title>362a2-410ad2_c07e3e6f3adb4390b97ebe5de494c2a9mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/b98d1-410ad2_7640ef10e8c74b80afcd50994da4669dmv2.jpg</image:loc><image:title>b98d1-410ad2_7640ef10e8c74b80afcd50994da4669dmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/08/5fc6d-410ad2_f4e59ec968cc459b88aeb7da226b1e98mv2.jpg</image:loc><image:title>5fc6d-410ad2_f4e59ec968cc459b88aeb7da226b1e98mv2</image:title></image:image><lastmod>2018-08-13T03:13:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/09/19/interview-on-the-nutanix-community-podcast/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/09/ncp-logo.png</image:loc><image:title>ncp-logo</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/09/50ec9-410ad2_2053e43fce1e491e9a712a85b0901a79mv2.png</image:loc><image:title>50ec9-410ad2_2053e43fce1e491e9a712a85b0901a79mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/09/410ad2_2053e43fce1e491e9a712a85b0901a79mv2.png</image:loc><image:title>410ad2_2053e43fce1e491e9a712a85b0901a79~mv2.png</image:title></image:image><lastmod>2018-08-13T03:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2017/12/30/cognitive-bias-in-infrastructure-design-the-sunk-cost-fallacy/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/12/69f82-410ad2_849970e03948460da1e599481302f41dmv2.png</image:loc><image:title>69f82-410ad2_849970e03948460da1e599481302f41dmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2017/12/410ad2_849970e03948460da1e599481302f41dmv2.png</image:loc><image:title>410ad2_849970e03948460da1e599481302f41d~mv2.png</image:title></image:image><lastmod>2018-08-13T03:09:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/01/09/advanced-architect-course-with-vmware-center-for-advanced-learning/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/fd750-410ad2_04c78927a8ae4f33b8ad3f7940eb96aemv2_d_3910_2328_s_2.jpg</image:loc><image:title>sdr</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/d6db7-410ad2_f1d82237c6cb47ceb4a597d2c750c3fbmv2.png</image:loc><image:title>d6db7-410ad2_f1d82237c6cb47ceb4a597d2c750c3fbmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/410ad2_f1d82237c6cb47ceb4a597d2c750c3fbmv2.png</image:loc><image:title>410ad2_f1d82237c6cb47ceb4a597d2c750c3fb~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/410ad2_f1d82237c6cb47ceb4a597d2c750c3fbmv2.png</image:loc><image:title>410ad2_f1d82237c6cb47ceb4a597d2c750c3fb~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/410ad2_04c78927a8ae4f33b8ad3f7940eb96aemv2_d_3910_2328_s_2.jpg</image:loc><image:title>410ad2_04c78927a8ae4f33b8ad3f7940eb96ae~mv2_d_3910_2328_s_2.jpg</image:title></image:image><lastmod>2018-08-13T03:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/01/21/it-infrastructure-and-operational-risk-of-global-organizations-in-the-wake-of-a-ballistic-missile-attack/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/c6121-410ad2_f81912f3c468477997c8b73f50697749mv2.jpg</image:loc><image:title>c6121-410ad2_f81912f3c468477997c8b73f50697749mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/b2244-410ad2_79bffc24c0ea4a4790057ea2415cb2afmv2.jpg</image:loc><image:title>b2244-410ad2_79bffc24c0ea4a4790057ea2415cb2afmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/5c9c3-410ad2_49f58f0b03804c77a880cdf661076e8emv2.png</image:loc><image:title>5c9c3-410ad2_49f58f0b03804c77a880cdf661076e8emv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/410ad2_79bffc24c0ea4a4790057ea2415cb2afmv2.jpg</image:loc><image:title>410ad2_79bffc24c0ea4a4790057ea2415cb2af~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/01/410ad2_49f58f0b03804c77a880cdf661076e8emv2.png</image:loc><image:title>410ad2_49f58f0b03804c77a880cdf661076e8e~mv2.png</image:title></image:image><lastmod>2018-08-13T03:08:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/02/13/question-everything/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/45918-410ad2_0768bb50d1ef4a55af87fa110d42209fmv2.png</image:loc><image:title>45918-410ad2_0768bb50d1ef4a55af87fa110d42209fmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_0768bb50d1ef4a55af87fa110d42209fmv2.png</image:loc><image:title>410ad2_0768bb50d1ef4a55af87fa110d42209f~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_0768bb50d1ef4a55af87fa110d42209fmv2.png</image:loc><image:title>410ad2_0768bb50d1ef4a55af87fa110d42209f~mv2.png</image:title></image:image><lastmod>2018-08-13T03:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/02/18/everything-is-alright-nothing-to-see-here/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/2b1d3-410ad2_3428b51c674d427aac3877ee5951606cmv2.png</image:loc><image:title>2b1d3-410ad2_3428b51c674d427aac3877ee5951606cmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/24143-410ad2_cf3f15ab490848ed838be456e10067ecmv2_d_2560_1368_s_2.png</image:loc><image:title>24143-410ad2_cf3f15ab490848ed838be456e10067ecmv2_d_2560_1368_s_2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/226bf-410ad2_9a778ea6d4ba4be1857e86c7404028b3mv2.jpg</image:loc><image:title>226bf-410ad2_9a778ea6d4ba4be1857e86c7404028b3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/6f28e-410ad2_01098528e2f645809ac7bf468fe9ccc0mv2.gif</image:loc><image:title>6f28e-410ad2_01098528e2f645809ac7bf468fe9ccc0mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/1f8b8-410ad2_8d4b030f800b4722956c38ae85faed68mv2.jpg</image:loc><image:title>1f8b8-410ad2_8d4b030f800b4722956c38ae85faed68mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/c00f9-410ad2_9eefbe8eb0e8428dbd700a45f99d22a3mv2.jpg</image:loc><image:title>c00f9-410ad2_9eefbe8eb0e8428dbd700a45f99d22a3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/d5f1b-410ad2_6c22ad7e70df4e6781d4c70d325b92b3mv2.png</image:loc><image:title>d5f1b-410ad2_6c22ad7e70df4e6781d4c70d325b92b3mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_9eefbe8eb0e8428dbd700a45f99d22a3mv2.jpg</image:loc><image:title>410ad2_9eefbe8eb0e8428dbd700a45f99d22a3~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_8d4b030f800b4722956c38ae85faed68mv2.jpg</image:loc><image:title>410ad2_8d4b030f800b4722956c38ae85faed68~mv2.jpg</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_6c22ad7e70df4e6781d4c70d325b92b3mv2.png</image:loc><image:title>410ad2_6c22ad7e70df4e6781d4c70d325b92b3~mv2.png</image:title></image:image><lastmod>2018-08-13T03:04:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/02/19/organizing-your-mind-for-fun-and-profit/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/3403a-410ad2_1b6316c6ae374c36ae4895c46f4e605amv2.png</image:loc><image:title>3403a-410ad2_1b6316c6ae374c36ae4895c46f4e605amv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/8e1e9-410ad2_7d397ce8ff2e4720a136385a19dea814mv2.png</image:loc><image:title>8e1e9-410ad2_7d397ce8ff2e4720a136385a19dea814mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/1ba4f-410ad2_e340c8efa97745a191c62954cf8418eamv2.jpg</image:loc><image:title>1ba4f-410ad2_e340c8efa97745a191c62954cf8418eamv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/413ea-410ad2_146747956bfa427a8521a8243c857a85mv2.jpg</image:loc><image:title>413ea-410ad2_146747956bfa427a8521a8243c857a85mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/edeab-410ad2_63ffca4e38f54f4aaa50d07adbb072a1mv2.jpg</image:loc><image:title>edeab-410ad2_63ffca4e38f54f4aaa50d07adbb072a1mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/aade7-410ad2_9f2082e6ab0349fb814a01fb53693e97mv2.png</image:loc><image:title>aade7-410ad2_9f2082e6ab0349fb814a01fb53693e97mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/98bfd-410ad2_811a18180905496f83293c525c39df9bmv2.gif</image:loc><image:title>98bfd-410ad2_811a18180905496f83293c525c39df9bmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/4a200-410ad2_58dfe3ec8a29437c9d5891d090ec4a21mv2.png</image:loc><image:title>4a200-410ad2_58dfe3ec8a29437c9d5891d090ec4a21mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_58dfe3ec8a29437c9d5891d090ec4a21mv2.png</image:loc><image:title>410ad2_58dfe3ec8a29437c9d5891d090ec4a21~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/02/410ad2_811a18180905496f83293c525c39df9bmv2.gif</image:loc><image:title>410ad2_811a18180905496f83293c525c39df9b~mv2.gif</image:title></image:image><lastmod>2018-08-13T02:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/07/12/rubrik-managed-service-provider-model/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/07/cd592-410ad2_c3551a4ea9074c37894a915c6af4a5e1mv2.png</image:loc><image:title>cd592-410ad2_c3551a4ea9074c37894a915c6af4a5e1mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/07/e8be3-410ad2_270d3e0782154838bdbc48497b73845emv2.png</image:loc><image:title>e8be3-410ad2_270d3e0782154838bdbc48497b73845emv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/07/410ad2_c3551a4ea9074c37894a915c6af4a5e1mv2.png</image:loc><image:title>410ad2_c3551a4ea9074c37894a915c6af4a5e1~mv2.png</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/07/410ad2_270d3e0782154838bdbc48497b73845emv2.png</image:loc><image:title>410ad2_270d3e0782154838bdbc48497b73845e~mv2.png</image:title></image:image><lastmod>2018-08-13T02:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com/2018/06/05/vmware-enterprise-blockchain/</loc><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/77ba2-410ad2_c24502faa7714046a9a2b233bfba4928mv2.png</image:loc><image:title>77ba2-410ad2_c24502faa7714046a9a2b233bfba4928mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/2d0e6-410ad2_ca1f99cba8fb49ddbf9870ab7d4315ecmv2.png</image:loc><image:title>2d0e6-410ad2_ca1f99cba8fb49ddbf9870ab7d4315ecmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/6ec07-410ad2_fd652ce4e3714f6189c4fd6ce372b0e1mv2.png</image:loc><image:title>6ec07-410ad2_fd652ce4e3714f6189c4fd6ce372b0e1mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/c4199-410ad2_0ab1e32d66f0446f99405d4a8eef821cmv2.jpg</image:loc><image:title>c4199-410ad2_0ab1e32d66f0446f99405d4a8eef821cmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/bf9ad-410ad2_da050d42c6eb4286b25f6494deccaf94mv2.png</image:loc><image:title>bf9ad-410ad2_da050d42c6eb4286b25f6494deccaf94mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/8d6b5-410ad2_bb85c4720114407eadf93d27c0c4645fmv2.png</image:loc><image:title>8d6b5-410ad2_bb85c4720114407eadf93d27c0c4645fmv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/33df0-410ad2_308718fd506849cd85cf102f56ce3653mv2.png</image:loc><image:title>33df0-410ad2_308718fd506849cd85cf102f56ce3653mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/0b48f-410ad2_61899f816cb14871b6e3eb87b7ba47a0mv2.png</image:loc><image:title>0b48f-410ad2_61899f816cb14871b6e3eb87b7ba47a0mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/8ec5d-410ad2_57edf7c3a3264d2cb827bb967c365259mv2.png</image:loc><image:title>8ec5d-410ad2_57edf7c3a3264d2cb827bb967c365259mv2</image:title></image:image><image:image><image:loc>https://designingrisk.com/wp-content/uploads/2018/06/8bfb6-410ad2_3f8325eab4ef4607bdceaa3494eac0e5mv2.png</image:loc><image:title>8bfb6-410ad2_3f8325eab4ef4607bdceaa3494eac0e5mv2</image:title></image:image><lastmod>2018-08-13T02:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://designingrisk.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-07-01T20:03:22+00:00</lastmod></url></urlset>
