<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://thecybersouth.com/whatsnew</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/api-security-a-practioners-approach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1771486163648-QMIZV9CGUO9M8JIJ7XSM/unsplash-image-ehyV_XOZ4iA.jpg</image:loc>
      <image:title>What's New - API Security: A Practioner’s Approach</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/security-tools-every-modern-security-analyst-should-understand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1765952798476-O0LB9ATYL0FMF9MHTP7H/unsplash-image-JKUTrJ4vK00.jpg</image:loc>
      <image:title>What's New - Security Tools Every Modern Security Analyst Should Understand</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/understanding-vulnerability-scan-types-agent-agentless-authenticated-and-unauthenticated-explained</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1765909306609-LGGOMSE1SNFAU2DLD6FL/unsplash-image-f5pTwLHCsAg.jpg</image:loc>
      <image:title>What's New - Understanding Vulnerability Scan Types: Agent, Agentless, Authenticated, and Unauthenticated Explained</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/what-are-cybersecurity-control-functions-and-types-a-simple-explanation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1765861755994-BA5EKFSNNPS14ALQFO55/unsplash-image-uv5_bsypFUM.jpg</image:loc>
      <image:title>What's New - What Are Cyber security Control Functions and Types? A Simple Explanation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/the-anatomy-of-a-cyber-attack-the-cyber-kill-chain-and-diamond-model-for-intrusion-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1765577967734-2IK6V00SPM8AVWGBVYDG/unsplash-image-o_tcYADlSt8.jpg</image:loc>
      <image:title>What's New - The Anatomy of a Cyber Attack: The Cyber Kill Chain and Diamond Model for Intrusion Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/10-keys-for-devolping-a-secure-application-w97dp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762317039845-4OYHCY4XBBCGY4BR9KEQ/unsplash-image-e_mbJ0T0mes.jpg</image:loc>
      <image:title>What's New - The Security Development Lifecycle: Where Secure Software Begins</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/dont-just-ship-it-secure-it-why-code-reviews-and-security-testing-matter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762316551824-MYW221XKLS3SOW4K2J65/unsplash-image-EJMTKCZ00I0.jpg</image:loc>
      <image:title>What's New - Don’t Just Ship It — Secure It: a Guide to Code Reviews and Security Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/navigating-vulnerability-standards-cve-cvss-nvd-and-iso-security-frameworks-explained</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762316799923-WJNUCSCVZ9LQBMDHIL6R/unsplash-image-9SoCnyQmkzI.jpg</image:loc>
      <image:title>What's New - Navigating Vulnerability Standards: CVE, CVSS, NVD, and ISO Security Frameworks Explained</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/pasta-stride-dread-oh-my-an-introduction-to-threat-modeling-frameworks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762315356172-DTKFX8TGFXG21SYJ4P7A/unsplash-image--nBClEqKKVM.jpg</image:loc>
      <image:title>What's New - PASTA, STRIDE, DREAD, Oh My! An introduction to Threat modeling frameworks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/evaluating-software-security-through-the-bsimm-and-owasp-maturity-models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762315749215-BAYL47YYUS1HDJ8NTLCX/unsplash-image-biBRoGc7ir0.jpg</image:loc>
      <image:title>What's New - Evaluating Software Security Through the BSIMM and OWASP SAMM Maturity Models</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/10-keys-for-devolping-a-secure-application</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1762277595252-P3O5WWU33ADLDM6IXJ0O/unsplash-image-Xe21OFRpqvk.jpg</image:loc>
      <image:title>What's New - 10 Keys For Devolping a Secure Application</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/threat-of-the-week-global-ransomware-escalation-inside-the-asahi-group-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1759944510183-4NXMI8OSQMX0YDD5R0O5/unsplash-image-zGuBURGGmdY.jpg</image:loc>
      <image:title>What's New - Threat of the Week: Global Ransomware Escalation - Inside the Asahi Group Breach</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/how-the-us-government-shutdown-impacts-security-posture-and-cybersecurity-professionals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1759338351580-4HUQWDU8UXAZCRVCL2PV/unsplash-image-p7av1ZhKGBQ.jpg</image:loc>
      <image:title>What's New - HOW THE U.S. GOVERNMENT SHUTDOWN IMPACTS NATIONAL-SECURITY POSTURE and CYBER SECURITY PROFESSIONALS</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/threat-of-the-week-phishing-as-a-service-phaas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1758921706362-NAZ9EP6DIIG1PNRNUVKM/unsplash-image-JJPqavJBy_k.jpg</image:loc>
      <image:title>What's New - Threat of the Week: Phishing as a Service (PhaaS)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/whatsnew/announcing-cybersouth-a-fresh-voice-in-cybersecurity-czwez-twipl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/1758864623626-OUWAE1DIOV7SLR9PBPK3/unsplash-image-oZPwn40zCK4.jpg</image:loc>
      <image:title>What's New - ANNOUNCING: CYBERSOUTH, A FRESH VOICE IN CYBER SECURITY</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://thecybersouth.com/who-we-are</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/fbc681bf-9981-4dd0-9825-6e08c58b97f5/IMG_9200.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://thecybersouth.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://thecybersouth.com/products</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/d6d2fec8-201a-49d3-8c29-7f2d133295fd/Screenshot+2026-03-03+033133.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d59f8eaf7350791449461a/02bc04f2-bed3-4133-b09d-74d2611b0fc3/Screenshot+2026-03-03+032258.png</image:loc>
    </image:image>
  </url>
</urlset>

