<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>/tags/aws/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/categories/aws/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/categories/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/cloud/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/categories/cloud/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/categories/cyber/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/deception/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/decoys/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/blog/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/blog/aws-threat-hunting-australia-2023/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/training/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/categories/training/</loc><lastmod>2023-10-05T00:00:00+00:00</lastmod></url><url><loc>/tags/cyber/</loc><lastmod>2023-10-01T00:00:00+00:00</lastmod></url><url><loc>/categories/deception/</loc><lastmod>2023-10-01T00:00:00+00:00</lastmod></url><url><loc>/blog/decoys-vs-honeypots-canaries/</loc><lastmod>2023-10-01T00:00:00+00:00</lastmod></url><url><loc>/homepage/</loc></url><url><loc>/about/</loc></url><url><loc>/authors/</loc></url><url><loc>/authors/ben-potter/</loc></url><url><loc>/contact/</loc></url><url><loc>/services/</loc></url><url><loc>/sense/</loc></url><url><loc>/sections/</loc></url></urlset>