<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/authentication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/confidentiality-integrity-availability/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/endpoint-detection-and-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/firewall/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/incident-response-plan/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/ransomware/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-assessment/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secure-coding/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/shared-responsibility-model/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/security-information-and-event-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/symmetric-encryption/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/asymmetric-encryption/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/authorization/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/containment/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cloud-security-posture-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/defense-in-depth/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/residual-risk/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/security-orchestration-automation-and-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/sql-injection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/trojan/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/web-application-firewall/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/extended-detection-and-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/antivirus/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/container-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/eradication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/intrusion-detection-system/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/least-privilege/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/multi-factor-authentication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/public-key-infrastructure/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/segregation-of-duties/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/security-operations-center/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/worm/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/cross-site-scripting/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/application-whitelisting/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-surface/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/audit-log/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/botnet/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/cross-site-request-forgery/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/digital-certificate/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/intrusion-prevention-system/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/kubernetes-rbac/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/log-correlation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/recovery/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/single-sign-on/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-authority/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cloud-workload-protection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/command-and-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/compliance-framework/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/indicators-of-compromise/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/mobile-device-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/passwordless-authentication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/software-composition-analysis/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/threat/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-hunting/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/virtual-private-network/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/anti-malware/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/data-classification/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/detection-rule/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/hardware-token/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/identity-federation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/indicators-of-attack/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/key-rotation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/phishing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/static-application-security-testing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/vulnerability/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/zero-trust-network-access/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/dynamic-application-security-testing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/device-hardening/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/hashing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/incident-triage/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/network-segmentation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/role-based-access-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/risk/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-register/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/root-cause-analysis/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/spear-phishing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/threat-actor/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/workload-identity/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/attribute-based-access-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/business-email-compromise/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/compensating-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/digital-signature/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/exploit/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/forensic-artifact/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/host-based-firewall/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/insider-threat/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/microsegmentation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secrets-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/secrets-manager/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/tabletop-exercise/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/alert-fatigue/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/credential-stuffing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/denial-of-service/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/demilitarized-zone/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/input-validation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/mitigation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/privileged-access-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/patch-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/post-incident-review/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-baseline/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/security-group/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/tls/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/bastion-host/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/brute-force-attack/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/evidence-preservation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/exception-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/false-positive/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/output-encoding/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/perfect-forward-secrecy/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/saml/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/secure-boot/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/supply-chain-attack/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/virtual-private-cloud/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/chain-of-custody/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/deep-packet-inspection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/device-compliance/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/false-negative/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/key-escrow/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/oauth/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/password-spraying/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/runtime-application-self-protection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-misconfiguration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/vendor-assessment/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/api-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-vector/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/change-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/endpoint-isolation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/forensics/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/openid-connect/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/session-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/vulnerability-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/blast-radius/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/hardware-security-module/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/kerberos/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/playbook/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/rate-limiting/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-policy/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/tamper-protection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/vulnerability-scanner/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/acceptable-use-policy/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-revocation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/configuration-drift/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/common-weakness-enumeration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/disk-encryption/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/ldap/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/lessons-learned/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/network-access-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/secure-by-default/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-intelligence/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/biometrics/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/common-vulnerabilities-and-exposures/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/egress-filtering/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/key-management-service/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/online-certificate-status-protocol/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/remote-wipe/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-treatment/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/runbook/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/secure-configuration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/server-side-request-forgery/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/zero-day-vulnerability/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/attack-path/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/broken-access-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/control-objective/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/common-vulnerability-scoring-system/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/east-west-traffic/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/immutable-infrastructure/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/lateral-movement/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/memory-forensics/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/policy-based-access-control/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/salting/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/sandboxing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/access-review/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cloud-access-security-broker/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/cloud-forensics/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/crown-jewels/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/detection-engineering/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/dns-filtering/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/email-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/file-integrity-monitoring/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/mutual-tls/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/persistence/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/policy-exception/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/software-bill-of-materials/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/scim/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/vm-escape/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/asset-inventory/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/cloud-detection-and-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/credential-theft/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/domain-name-system-security-extensions/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/envelope-encryption/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-governance-and-administration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/least-functionality/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/least-privilege-access/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/mobile-application-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/managed-detection-and-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/secrets-scanning/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/ssh/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-surface-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-transparency/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/full-packet-capture/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-provider/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/malvertising/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/service-account/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/trusted-execution-environment/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/third-party-risk/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/threat-modeling/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/zero-trust/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/break-glass-account/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/browser-isolation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/certificate-pinning/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/command-injection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/external-attack-surface-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/network-telemetry/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-awareness-training/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/security-by-design/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/watering-hole-attack/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/allowlist/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/command-line-auditing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/conditional-access/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/content-security-policy/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/data-exfiltration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/dwell-time/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-lifecycle/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/just-enough-administration/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/privilege-escalation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/secure-transport/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/user-and-entity-behavior-analytics/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/vendor-risk-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/anomaly-detection/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/denylist/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/insecure-direct-object-reference/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/just-in-time-access/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/ransomware-as-a-service/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/red-team/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/risk-appetite/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/blue-team/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/control-mapping/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-governance/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/man-in-the-middle-attack/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/sandbox-evasion/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/session-hijacking/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/account-provisioning/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/email-authentication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/fileless-malware/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/log-retention/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/purple-team/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/deception-technology/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/shadow-it/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/access-token/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-graph/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/data-loss-prevention/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/kill-chain/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/refresh-token/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/security-debt/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/attack-campaign/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/token-revocation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/honeypot/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/phishing-resistant-authentication/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/identity-proofing/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-emulation/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/account-lockout/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/security-chaos-engineering/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/threat-landscape/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/defense-evasion/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/exposure-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/about/</loc></url><url><loc>https://cybersecuritytermslexicon.com/application-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/application-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/authors/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/</loc></url><url><loc>https://cybersecuritytermslexicon.com/cloud-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/cloud-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/contact/</loc></url><url><loc>https://cybersecuritytermslexicon.com/</loc></url><url><loc>https://cybersecuritytermslexicon.com/disclaimer/</loc></url><url><loc>https://cybersecuritytermslexicon.com/authors/fuadefendi/</loc></url><url><loc>https://cybersecuritytermslexicon.com/author/</loc></url><url><loc>https://cybersecuritytermslexicon.com/encryption-and-key-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/encryption-and-key-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/endpoint-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/endpoint-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/governance-risk-and-compliance/</loc></url><url><loc>https://cybersecuritytermslexicon.com/governance-risk-and-compliance/</loc></url><url><loc>https://cybersecuritytermslexicon.com/identity-and-access-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/identity-and-access-management/</loc></url><url><loc>https://cybersecuritytermslexicon.com/incident-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/incident-response/</loc></url><url><loc>https://cybersecuritytermslexicon.com/malware-and-threats/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/malware-and-threats/</loc></url><url><loc>https://cybersecuritytermslexicon.com/network-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/network-security/</loc></url><url><loc>https://cybersecuritytermslexicon.com/privacy/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-fundamentals/</loc></url><url><loc>https://cybersecuritytermslexicon.com/security-operations/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/security-fundamentals/</loc></url><url><loc>https://cybersecuritytermslexicon.com/categories/security-operations/</loc></url><url><loc>https://cybersecuritytermslexicon.com/faq/</loc></url><url><loc>https://cybersecuritytermslexicon.com/tos/</loc></url><url><loc>https://cybersecuritytermslexicon.com/topics/</loc></url></urlset>