<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://dotone.baremetalcyber.com/</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/recommended</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/contact-us</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/subscribe</loc>
    <lastmod>2025-11-30T03:45:03Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/threat-informed-defense-using-att-ck-and-models-to-plan-improvements</loc>
    <lastmod>2025-11-28T01:56:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/triage-101-what-happens-when-an-alert-fires</loc>
    <lastmod>2025-11-28T01:55:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/logs-events-and-alerts-turning-raw-data-into-a-story</loc>
    <lastmod>2025-11-28T01:55:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/types-of-security-controls-preventive-detective-corrective-and-more</loc>
    <lastmod>2025-11-28T01:55:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/defense-in-depth-layers-that-work-together</loc>
    <lastmod>2025-11-28T01:55:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/network-segmentation-made-simple</loc>
    <lastmod>2025-11-28T01:55:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/you-can-t-secure-what-you-can-t-see-asset-inventory-basics</loc>
    <lastmod>2025-11-28T01:55:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/patch-and-update-management-foundations</loc>
    <lastmod>2025-11-28T01:55:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/vulnerabilities-cves-and-cvss-scores-explained</loc>
    <lastmod>2025-11-28T01:55:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/threat-modeling-101-thinking-like-an-attacker</loc>
    <lastmod>2025-11-28T01:54:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/cyber-kill-chain-and-attack-lifecycles</loc>
    <lastmod>2025-11-25T07:00:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/navigating-the-miter-attack-matrix</loc>
    <lastmod>2025-11-27T20:00:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/cyber-insights-nist-csf-2-0-in-plain-english</loc>
    <lastmod>2025-11-12T21:54:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-11-12T06:16:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/designing-defending-secure-systems</loc>
    <lastmod>2025-11-12T17:57:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/emerging-threats-defensive-strategies</loc>
    <lastmod>2025-11-12T17:56:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/application-and-api-security</loc>
    <lastmod>2025-11-12T17:56:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/infrastructure-cloud-and-supply-chain-security</loc>
    <lastmod>2025-11-12T17:55:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/secure-systems-network-architecture</loc>
    <lastmod>2025-11-12T17:55:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/identity-authentication-and-access-control</loc>
    <lastmod>2025-11-12T17:53:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/cryptography-in-context</loc>
    <lastmod>2025-11-12T17:52:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/security-foundations-risk-in-the-modern-enterprise</loc>
    <lastmod>2025-11-12T17:51:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/mobile-application-security</loc>
    <lastmod>2025-11-12T18:34:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/the-cybersecurity-maturity-model</loc>
    <lastmod>2025-11-12T18:34:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/security-hardening</loc>
    <lastmod>2025-11-12T18:34:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/data-privacy</loc>
    <lastmod>2025-11-12T18:34:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/cybersecurity-insurance</loc>
    <lastmod>2025-11-12T18:33:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/bug-bounty-programs</loc>
    <lastmod>2025-11-12T18:33:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/application-whitelisting</loc>
    <lastmod>2025-11-12T18:33:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/multi-cloud-security</loc>
    <lastmod>2025-11-12T18:33:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/active-directory-security</loc>
    <lastmod>2025-11-12T18:32:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/basics-of-digital-footprints</loc>
    <lastmod>2025-11-12T18:32:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/open-source-intelligence</loc>
    <lastmod>2025-11-12T18:31:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/building-a-security-champion-program-in-your-organization</loc>
    <lastmod>2025-11-12T18:30:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/phishing-simulations-training-to-recognize-deceptive-attacks</loc>
    <lastmod>2025-11-12T18:30:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/dns-security</loc>
    <lastmod>2025-11-12T18:30:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/blockchain-security</loc>
    <lastmod>2025-11-12T18:29:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/what-are-brute-force-attacks</loc>
    <lastmod>2025-11-12T18:29:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/the-enemy-within-tackling-insider-threats</loc>
    <lastmod>2025-11-12T18:29:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/keeping-data-home-data-loss-prevention</loc>
    <lastmod>2025-11-12T18:29:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/locking-the-digital-pipes-api-security</loc>
    <lastmod>2025-11-12T18:28:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/gatekeepers-of-the-web-web-application-firewalls</loc>
    <lastmod>2025-11-12T18:28:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/cyber-harmony-security-orchestration-automation-and-response</loc>
    <lastmod>2025-11-12T18:28:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/setting-the-trap-honeypots-in-cybersecurity-0cfd98e6-e42e-4850-81ed-606e3d0d950f</loc>
    <lastmod>2025-11-12T18:28:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/setting-the-trap-honeypots-in-cybersecurity</loc>
    <lastmod>2025-11-12T18:26:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/knowing-the-enemy-cyber-threat-intelligence-unveiled</loc>
    <lastmod>2025-11-12T18:25:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/taming-the-mobile-wild-managing-mobile-devices</loc>
    <lastmod>2025-11-12T18:25:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/boxing-up-safety-container-security-basics</loc>
    <lastmod>2025-11-12T18:25:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/locking-down-the-smart-stuff-securing-the-internet-of-things</loc>
    <lastmod>2025-11-12T18:24:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/locking-down-the-airwaves-wireless-security-basics</loc>
    <lastmod>2025-11-12T18:24:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/fortifying-the-core-basics-of-os-security</loc>
    <lastmod>2025-11-12T18:23:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/guarding-the-keys-privileged-access-management-unlocked</loc>
    <lastmod>2025-11-12T18:23:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/swapping-secrets-for-tokens-tokenization-explained</loc>
    <lastmod>2025-11-12T18:22:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/locking-the-keys-encryption-key-management-unveiled</loc>
    <lastmod>2025-11-12T18:20:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/sorting-the-vault-data-classification-unveiled</loc>
    <lastmod>2025-11-12T18:19:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/steering-the-shield-the-role-of-security-governance</loc>
    <lastmod>2025-11-12T18:19:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/hacking-yourself-first-penetration-testing-for-stronger-defenses</loc>
    <lastmod>2025-11-12T18:18:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/mind-games-cyber-threats-social-engineering-tactics</loc>
    <lastmod>2025-11-12T18:18:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/skyrocketing-efficiency-the-fundamentals-of-the-cloud</loc>
    <lastmod>2025-11-12T18:18:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/building-a-strong-defense-understanding-cybersecurity-frameworks</loc>
    <lastmod>2025-11-12T18:17:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/decoding-the-enemy-an-introduction-to-malware-analysis</loc>
    <lastmod>2025-11-12T18:17:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/preparing-for-the-unexpected-disaster-recovery-and-business-continuity</loc>
    <lastmod>2025-11-12T18:16:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/uncovering-digital-clues-an-introduction-to-digital-forensics</loc>
    <lastmod>2025-11-12T18:16:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/brute-force-attacks-how-cybercriminals-crack-passwords</loc>
    <lastmod>2025-11-12T18:15:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/responding-to-cyber-incidents-best-practices-for-incident-response</loc>
    <lastmod>2025-11-12T18:16:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/detecting-and-preventing-threats-a-closer-look-at-intrusion-systems</loc>
    <lastmod>2025-11-12T18:15:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/zero-trust-architecture-reimagining-cybersecurity-strategies</loc>
    <lastmod>2025-11-12T18:14:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/seeing-the-big-picture-the-role-of-logging-and-monitoring</loc>
    <lastmod>2025-11-12T18:15:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/a-dive-into-cryptography</loc>
    <lastmod>2025-11-12T18:13:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/understanding-authentication</loc>
    <lastmod>2025-11-12T18:13:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/understanding-iam-fundamentals</loc>
    <lastmod>2025-11-12T18:13:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/guarding-devices-and-data-the-importance-of-endpoint-security</loc>
    <lastmod>2025-11-12T18:12:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/protecting-your-digital-borders-understanding-network-security</loc>
    <lastmod>2025-11-12T18:11:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://dotone.baremetalcyber.com/episodes/what-is-cybersecurity</loc>
    <lastmod>2025-11-12T16:36:11Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
