<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://beardefend.com/tags/basics/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/this-is-the-new-post/091233/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/threat-modeling/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/web/</loc><lastmod>2026-02-20T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/system-injection/091233/</loc><lastmod>2026-02-16T09:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/maksud-site-is-new/000000/</loc><lastmod>2026-02-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/building-a-safe-malware-analysis-sandbox-beginner-friendly/000000/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/defense/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/malware-analysis/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/opsec/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/sandbox/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/vm/</loc><lastmod>2026-02-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/intro-to-web-security/000000/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/response/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/soc/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/soc-triage-toolkit/000000/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/toolkit/</loc><lastmod>2026-02-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/phishing/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/roundup/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/threats/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/weekly-threat-roundup-2026-02-11/000000/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/auth/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/checklist/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/hardening/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/mfa/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/passkeys/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/passwords-vs-passkeys-what-to-use-in-2026/000000/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/web-app-hardening-pack/000000/</loc><lastmod>2026-02-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/api/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/architecture/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/awareness/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/jwt/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/oauth/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/phishing-response-kit/000000/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/secure-api-authentication-patterns/000000/</loc><lastmod>2026-02-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/advisory/</loc><lastmod>2026-02-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/advisory-dependency-confusion-still-shows-up-in-ci/000000/</loc><lastmod>2026-02-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/ci-cd/</loc><lastmod>2026-02-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/supply-chain/</loc><lastmod>2026-02-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/detections/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/engineering/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/https-tls-basics-without-the-math/000000/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/siem/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/siem-field-guide/000000/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/tls/</loc><lastmod>2026-02-06T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/cve/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/how-we-triage-cves-without-panic-patching/000000/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/process/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/vulnerability-management/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/csp/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/headers/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/logging/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/security-headers-checklist-for-production/000000/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/sysmon/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/windows/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/windows-logging-starter/000000/</loc><lastmod>2026-02-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/identity/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/incident-note-sso-misconfiguration-patterns/000000/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/saml/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/sso/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/databases/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/products/2026/incident-notes-template/000000/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/incident-response/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/notes/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/owasp/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/sql-injection-prevention-the-non-negotiables/000000/</loc><lastmod>2026-02-02T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/playbook/</loc><lastmod>2026-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/ransomware/</loc><lastmod>2026-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/ransomware-response-the-first-24-hours/000000/</loc><lastmod>2026-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/accounts/</loc><lastmod>2026-01-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/phishing-defense-playbook-for-individuals/000000/</loc><lastmod>2026-01-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/browser-security-changes-to-watch-this-quarter/000000/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/browsers/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/privacy/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/device-hardening-baseline-laptop--phone/000000/</loc><lastmod>2026-01-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/cloud/</loc><lastmod>2026-01-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/cloud-exposures-the-5-most-common-causes/000000/</loc><lastmod>2026-01-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/iam/</loc><lastmod>2026-01-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/posture/</loc><lastmod>2026-01-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/logging-that-actually-helps-during-incidents/000000/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/mfa-fatigue-how-push-spam-attacks-work/000000/</loc><lastmod>2026-01-21T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/container-security-quickstart/000000/</loc><lastmod>2026-01-18T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/containers/</loc><lastmod>2026-01-18T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/devsecops/</loc><lastmod>2026-01-18T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/supply-chain-attacks-a-quick-primer/000000/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/network/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/zero-trust-explained-what-it-is-and-isnt/000000/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/zero-trust/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/alert-fatigue-how-to-tune-for-signal/000000/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/detection/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/github/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tutorials/2026/securing-github-actions-in-30-minutes/000000/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/credential-stuffing-defense-checklist/000000/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/rate-limiting/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/governance/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/metrics/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/tags/program/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/news/2026/security-metrics-that-actually-matter/000000/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://beardefend.com/updates/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>