<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cr-johnm.mtsdevs.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cr-johnm.mtsdevs.com/cortex-xdr-detection-and-response-lightboard-video/</loc><lastmod>2024-12-22T12:04:04+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/extending-zero-trust-to-the-endpoint/</loc><lastmod>2024-12-23T03:44:48+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/unit-42-threat-informed-incident-response-methodology-2/</loc><lastmod>2024-12-23T03:47:34+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/extended-detection-and-response-the-swiss-army-knife-of-soc/</loc><lastmod>2024-12-23T03:49:42+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/a-framework-for-proactively-building-trust-with-the-board/</loc><lastmod>2024-12-23T03:57:28+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/prisma-cloud-identity-based-segmentation/</loc><lastmod>2024-12-23T04:08:30+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/zero-trust-advisory-service/</loc><lastmod>2024-12-23T04:09:49+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/zero-trust-enterprise-for-healthcare-organizations/</loc><lastmod>2024-12-23T04:15:12+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/bringing-zero-trust-to-cloud-native-applications/</loc><lastmod>2024-12-23T04:15:51+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/accelerating-your-zero-trust-journey-in-education/</loc><lastmod>2024-12-23T04:17:15+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cloud-native-application-protection-for-doe-and-nasa/</loc><lastmod>2024-12-23T04:20:09+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/extending-zero-trust-to-the-endpoint-2/</loc><lastmod>2024-12-23T04:22:15+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-a-manufacturer-modernized-their-global-connectivity/</loc><lastmod>2024-12-23T04:25:24+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/yesterdays-mobile-security-was-designed-for-a-different-purpose/</loc><lastmod>2024-12-23T04:27:08+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/the-right-approach-to-zero-trust-for-unmanaged-iot-devices/</loc><lastmod>2024-12-23T04:27:53+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/comparing-zero-trust-approaches-to-security-for-iot-devices/</loc><lastmod>2024-12-23T04:29:16+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/what-is-a-zero-trust-architecture/</loc><lastmod>2024-12-23T04:29:47+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/zero-trust-network-access-with-zero-exceptions/</loc><lastmod>2024-12-23T04:31:11+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-far-along-are-you-on-your-zerotrust-journey-and-what-are-the-biggest-barriers-in-your-way/</loc><lastmod>2024-12-23T04:32:12+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/what-tools-services-or-platforms-are-you-using-to-fortify-endpoint-security-and-is-your-strategy-governed-by-the-zerotrust-framework-share-your-thoughts-%f0%9f%91%87/</loc><lastmod>2024-12-23T04:33:08+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/accelerating-the-zero-trust-journey-in-federal-government-2/</loc><lastmod>2024-12-23T05:04:47+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/accelerating-your-zero-trust-journey-in-state-and-local-government/</loc><lastmod>2024-12-23T05:05:36+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-zero-trust-and-sase-can-work-together/</loc><lastmod>2024-12-23T04:38:49+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/security-service-edge-and-application-security/</loc><lastmod>2024-12-23T04:41:59+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/security-service-edge-sse-what-is-sse/</loc><lastmod>2024-12-23T04:47:22+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/implementing-zero-trust-architecture-in-the-national-laboratories-and-doe-site/</loc><lastmod>2024-12-23T04:48:06+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cloud-identity-engine/</loc><lastmod>2024-12-23T05:08:46+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/five-key-challenges-in-private-cloud-security/</loc><lastmod>2024-12-23T05:09:42+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/implementing-zero-trust-using-the-five-step-methodology/</loc><lastmod>2024-12-23T05:10:30+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/wherever-work-happens-cyber-threats-are-watching/</loc><lastmod>2024-12-23T05:11:17+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/the-evolution-of-ztna-to-fully-support-zero-trust-strategies/</loc><lastmod>2024-12-23T05:13:20+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/the-evolution-of-ztna-to-fully-support-zero-trust-strategies-2/</loc><lastmod>2024-12-23T05:14:06+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/enhancing-security-posture-with-zero-trust-network-access-at-kowloon-development-company/</loc><lastmod>2024-12-23T05:15:11+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/higgins-coatings-uses-zero-trust-principles-to-strengthen-secure-access-for-its-mobile-workforce-and-expand-bandwidth/</loc><lastmod>2024-12-23T05:16:04+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/what-is-zero-trust-network-access-ztna/</loc><lastmod>2024-12-23T05:16:45+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/ztna-2-0-the-new-standard-for-securing-access/</loc><lastmod>2024-12-23T05:17:56+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/what-is-zero-trust-for-the-cloud/</loc><lastmod>2024-12-23T05:19:16+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/top-3-cloud-security-considerations/</loc><lastmod>2024-12-23T05:20:26+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/legacy-networks-what-was-there-before-zero-trust/</loc><lastmod>2024-12-23T05:21:36+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/why-the-world-needs-ztna-2-0/</loc><lastmod>2024-12-23T05:22:15+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/unit-42-log4shell-compromise-assessment/</loc><lastmod>2024-12-23T05:24:04+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/hunting-for-log4j-cve-2021-44228-log4shell-exploit-activity/</loc><lastmod>2024-12-23T05:25:10+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/understanding-and-responding-to-the-apache-log4j-vulnerability/</loc><lastmod>2024-12-23T05:25:41+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/log4shell-compromise-assessment/</loc><lastmod>2024-12-23T05:27:08+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/top-questions-your-c-suite-and-board-will-ask-about-log4j/</loc><lastmod>2024-12-23T05:27:54+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cortex-xdr-safeguards-your-entire-organization/</loc><lastmod>2024-12-23T05:28:52+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/weve-got-next/</loc><lastmod>2024-12-23T05:29:45+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/the-ransomware-survival-guide/</loc><lastmod>2024-12-23T05:30:27+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/the-ransomware-survival-guide-2/</loc><lastmod>2024-12-23T05:31:12+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/ransomware-threat-report-2022/</loc><lastmod>2024-12-23T05:33:19+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/managing-apache-log4j-on-your-attack-surface-with-cortex-xpanse/</loc><lastmod>2024-12-23T05:34:32+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-to-install-cortex-xdr-on-linux-exosecure/</loc><lastmod>2024-12-24T09:32:46+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cortex-xdr-for-linux-requirements-exosecure/</loc><lastmod>2024-12-23T10:17:03+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-to-install-cortex-xdr-on-windows-exosecure/</loc><lastmod>2024-12-24T09:35:28+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cortex-xdr-for-windows-requirements-exosecure/</loc><lastmod>2024-12-23T10:22:53+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/cortex-xdr-for-macos-requirements-exosecure/</loc><lastmod>2024-12-23T11:15:04+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/how-to-install-cortex-xdr-on-macos-exosecure/</loc><lastmod>2024-12-24T09:42:55+00:00</lastmod></url><url><loc>https://cr-johnm.mtsdevs.com/learn-how-exosecure-can-help-your-organization-manage-your-threat-landscape-using-cortex-xdr/</loc><lastmod>2024-12-23T10:44:35+00:00</lastmod></url></urlset>
