<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cloud-security.blog/2026/02/11/cloud-security-blog-week-07/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2026/02/2f49ed6f-af8f-4a1b-87f9-84112437d029.jpg</image:loc><image:title>2f49ed6f-af8f-4a1b-87f9-84112437d029</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2026/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-11T10:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2025/12/11/cloud-security-blog-week-50/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2025/12/2fa96e4c-ff6d-4bbd-a915-23582971260e.jpg</image:loc><image:title>2fa96e4c-ff6d-4bbd-a915-23582971260e</image:title></image:image><lastmod>2025-12-11T17:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2025/08/14/cloud-security-weekly-blog-week-33/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-14T11:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2025/06/17/echoleak-m365-copilot-vulnerability/</loc><lastmod>2025-06-17T10:19:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/10/02/cloud-security-weekly-blog-week-39-40/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/css40.png</image:loc><image:title>CSS40</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/css49.png</image:loc><image:title>CSS49</image:title></image:image><lastmod>2024-10-02T09:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/about-me/</loc><lastmod>2024-09-27T14:44:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cloud-security.blog/2024/09/17/cloud-security-weekly-blog-week-38/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivam9injgylte1mi1wxzeucg5n.jpg</image:loc><image:title>Strawberry png sticker, fruit illustration</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-14.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-17T14:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/09/13/cloud-security-weekly-blog-week-37/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image-11.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-16T10:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2023/08/09/what-is-in-nist-2-draft/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/screenshot-2023-08-09-230115.png</image:loc><image:title>screenshot-2023-08-09-230115</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/screenshot-2023-08-09-230050.png</image:loc><image:title>screenshot-2023-08-09-230050</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic8.png</image:loc><image:title>pic8</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic7.png</image:loc><image:title>pic7</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic6.png</image:loc><image:title>pic6</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic5.png</image:loc><image:title>pic5</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic4.png</image:loc><image:title>pic4</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic3-4236105309-e1691617686755.png</image:loc><image:title>pic3</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic2.png</image:loc><image:title>pic2</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/08/pic1.png</image:loc><image:title>pic1</image:title></image:image><lastmod>2024-09-13T08:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/02/29/cloud-security-weekly-news-week-09/</loc><lastmod>2024-09-13T08:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/09/04/cloud-security-weekly-news-week-36-2/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/pexels-photo-2882638.jpeg</image:loc><image:title>close up shot of keyboard buttons</image:title><image:caption>Photo by Miguel u00c1. Padriu00f1u00e1n on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-keyboard-buttons-2882638/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/privacy-1.png</image:loc><image:title>privacy</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/privacy.png</image:loc><image:title>privacy</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-13T08:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/03/27/cloud-security-weekly-blog-week-12/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-03-27T09:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/03/17/cloud-security-weekly-news-week-11/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/03/screenshot-2024-03-17-120502.png</image:loc><image:title>screenshot-2024-03-17-120502</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2024/03/65ed8361b15323c91978af8f_screenshot-2024-03-10-at-11.54.24.png</image:loc><image:title>65ed8361b15323c91978af8f_Screenshot 2024-03-10 at 11.54.24</image:title></image:image><lastmod>2024-03-17T12:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2024/02/16/cloud-security-weekly-news-week-07/</loc><lastmod>2024-02-16T13:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2023/06/24/securing-artificial-intelligence/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/06/pexels-photo-8438922.jpeg</image:loc><image:title>a bearded man playing chess</image:title><image:caption>Photo by Pavel Danilyuk on &lt;a href="https://www.pexels.com/photo/a-bearded-man-playing-chess-8438922/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-06-24T09:36:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/11/14/microsoft-identity-platform-part-3/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2022-11-14T08:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/11/06/microsoft-identity-platform-part-2/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2022-11-06T17:03:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/11/02/microsoft-identity-platform-part-1/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-02T09:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/10/26/implementing-waf-in-azure/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/10/what-is-azure-web-application-firewall-on-azure-application-gateway_-azure-web.png</image:loc><image:title>What is Azure Web Application Firewall on Azure Application Gateway_ - Azure Web</image:title></image:image><lastmod>2022-10-27T17:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/09/14/automation-in-aws-part-2/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/system_manager.png</image:loc><image:title>system_manager</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-09-14T08:07:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/09/14/cloud-security-weekly-news-week-37/</loc><lastmod>2022-09-14T06:54:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/09/07/automation-in-aws/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/2022-09-07-00_12_57-what-is-pandoras-box-and-why-was-it-significant_-_-sporcle-blog.png</image:loc><image:title>2022-09-07 00_12_57-What Is Pandora’s Box and Why Was It Significant_ _ Sporcle Blog</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/stock-vector-pandora-s-box-31951201.jpg</image:loc><image:title>stock-vector-pandora-s-box-31951201</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-09-07T07:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/09/07/cloud-security-weekly-news-week-36/</loc><lastmod>2022-09-07T07:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/31/api-security/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2022-08-31T08:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/31/cloud-security-weekly-news-week-35/</loc><lastmod>2022-08-31T08:34:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/24/cloud-security-weekly-news-week-34/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/kubernetes.png</image:loc><image:title>Kubernetes</image:title></image:image><lastmod>2022-08-24T10:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/24/automating-deployment-of-security-agents-logic-app/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/2022-08-20-19_51_43-what-is-azure-logic-apps.png</image:loc><image:title>2022-08-20 19_51_43-What Is Azure Logic Apps</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-08-24T08:05:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/17/cloud-security-weekly-news-week-33/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/pexels-photo-3760809.jpeg</image:loc><image:title>amazed formal male looking at laptop screen</image:title><image:caption>Photo by Andrea Piacquadio on &lt;a href="https://www.pexels.com/photo/amazed-formal-male-looking-at-laptop-screen-3760809/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-08-17T07:54:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/08/17/cloud-native-security-part-2/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/2022-08-17-09_04_01-overview-of-cloud-native-security-_-kubernetes.png</image:loc><image:title>2022-08-17 09_04_01-Overview of Cloud Native Security _ Kubernetes</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-08-17T07:52:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/05/30/cloud-native-security/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/distribute-2.jpg</image:loc><image:title>distribute-2</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/develop-1.jpg</image:loc><image:title>develop-1</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/cloud-native-security.jpg</image:loc><image:title>Cloud Native Security</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/distribute-1.jpg</image:loc><image:title>distribute-1</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/distribute.jpg</image:loc><image:title>distribute</image:title></image:image><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2022/05/develop.jpg</image:loc><image:title>develop</image:title></image:image><lastmod>2022-05-31T13:05:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/04/22/securing-eks/</loc><lastmod>2022-04-21T22:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2022/04/12/aws-sra/</loc><lastmod>2022-04-12T08:35:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2021/12/12/kubernetes-security/</loc><image:image><image:loc>https://cloud-security.blog/wp-content/uploads/2021/12/snip20211212_4.png</image:loc><image:title>Snip20211212_4</image:title></image:image><lastmod>2021-12-12T13:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog/2021/12/10/vulnerability-management-in-cloud/</loc><lastmod>2021-12-10T10:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cloud-security.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-11T10:40:32+00:00</lastmod></url></urlset>
