<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//134.122.39.49/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>http://134.122.39.49/resources/glossary/</loc>
		<lastmod>2024-05-02T16:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mssp-meaning/</loc>
		<lastmod>2024-03-25T11:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/personally-identifiable-information-pii/</loc>
		<lastmod>2024-03-25T11:34:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digital-id/</loc>
		<lastmod>2024-03-25T11:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/did-decentralized-identity/</loc>
		<lastmod>2024-03-25T11:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/drm-definition/</loc>
		<lastmod>2024-03-25T16:12:03+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-drm-definition-digital-rights-management-drm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/network-edge-definition/</loc>
		<lastmod>2024-03-25T17:24:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/google-authenticator/</loc>
		<lastmod>2024-03-25T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/google-authenticator-definition/</loc>
		<lastmod>2024-03-25T17:28:54+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/10/kzero-google-authenticator-definition-google-authenticator.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/identity-verification-definition/</loc>
		<lastmod>2024-03-25T17:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/one-time-password-definition/</loc>
		<lastmod>2024-03-25T17:31:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mobile-authentication-definition/</loc>
		<lastmod>2024-03-25T17:31:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mfa-push-notification/</loc>
		<lastmod>2024-03-25T17:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/man-in-the-middle-mitm-attack/</loc>
		<lastmod>2024-03-25T17:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/passwordless-authentication/</loc>
		<lastmod>2024-03-26T09:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/social-engineering/</loc>
		<lastmod>2024-03-26T09:36:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-alliance/</loc>
		<lastmod>2024-03-26T09:37:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/jwt-authentication-definition/</loc>
		<lastmod>2024-03-26T09:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/idp-definition/</loc>
		<lastmod>2024-03-26T09:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/identity-proofing/</loc>
		<lastmod>2024-03-26T09:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/identity-governance/</loc>
		<lastmod>2024-03-26T09:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/identity-based-encryption/</loc>
		<lastmod>2024-03-26T09:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/identity-authentication-definition/</loc>
		<lastmod>2024-03-26T09:39:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/iam-definition/</loc>
		<lastmod>2024-03-26T09:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/google-authenticator-push-notification-definition/</loc>
		<lastmod>2024-03-26T09:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fingerprint-biometrics-definition/</loc>
		<lastmod>2024-03-26T09:40:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido2-definition/</loc>
		<lastmod>2024-03-26T09:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-fido/</loc>
		<lastmod>2024-03-26T09:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/federated-authentication-definition/</loc>
		<lastmod>2024-03-26T09:41:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/facial-recognition-definition/</loc>
		<lastmod>2024-03-26T09:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/credential-stuffing-definition/</loc>
		<lastmod>2024-03-26T09:41:49+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-credential-stuffing-definition-credential-stuffing.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/continuous-authentication-definition/</loc>
		<lastmod>2024-03-26T09:42:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/blockchain-authentication-definition/</loc>
		<lastmod>2024-03-26T09:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/biometric-authentication-definition/</loc>
		<lastmod>2024-03-26T09:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/behavioral-biometrics-definition/</loc>
		<lastmod>2024-03-26T09:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/authentication-protocols-definition/</loc>
		<lastmod>2024-03-26T09:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/multi-factor-authentication-definition/</loc>
		<lastmod>2024-03-26T09:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/adaptive-authentication-definition-2/</loc>
		<lastmod>2024-03-26T09:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/active-directory-federation-services-definition/</loc>
		<lastmod>2024-03-26T09:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/active-directory-certificate-services-definition/</loc>
		<lastmod>2024-03-26T09:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/account-sharing-definition/</loc>
		<lastmod>2024-03-26T09:44:42+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-account-sharing-definition-account-sharing.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/two-factor-authentication/</loc>
		<lastmod>2024-03-26T09:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/one-factor-authentication-definition/</loc>
		<lastmod>2024-03-26T09:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-snort/</loc>
		<lastmod>2024-03-26T09:51:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/security-as-a-service/</loc>
		<lastmod>2024-03-26T09:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/zero-day-vulnerability/</loc>
		<lastmod>2024-03-26T09:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/zero-day-exploit/</loc>
		<lastmod>2024-03-26T09:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/xdr-definition/</loc>
		<lastmod>2024-03-26T09:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/worm-virus-definition/</loc>
		<lastmod>2024-03-26T09:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/wireless-networks/</loc>
		<lastmod>2024-03-26T09:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/wi-fi-snooping/</loc>
		<lastmod>2024-03-26T09:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/white-hat-hacking/</loc>
		<lastmod>2024-03-26T09:53:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-tgt/</loc>
		<lastmod>2024-03-26T09:54:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-ssh/</loc>
		<lastmod>2024-03-26T09:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-sandboxes/</loc>
		<lastmod>2024-03-26T09:55:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-ldap/</loc>
		<lastmod>2024-03-26T09:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-ctap/</loc>
		<lastmod>2024-03-26T09:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-caching/</loc>
		<lastmod>2024-03-26T09:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-bricking/</loc>
		<lastmod>2024-03-26T09:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-a-key-logger/</loc>
		<lastmod>2024-03-26T09:56:45+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/10/kzero-what-is-a-key-logger-keylogger.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-an-exploit/</loc>
		<lastmod>2024-03-26T09:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/watering-hole-attack/</loc>
		<lastmod>2024-03-26T09:57:29+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-watering-hole-attack-watering-hole-attack-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/wardriving-definition/</loc>
		<lastmod>2024-03-26T09:57:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/wan-aggregation/</loc>
		<lastmod>2024-03-26T09:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/waf-vs-firewall/</loc>
		<lastmod>2024-03-26T09:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/waf-definition/</loc>
		<lastmod>2024-03-26T09:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/vpn-vs-proxy/</loc>
		<lastmod>2024-03-26T09:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/vpn-blocker-definition/</loc>
		<lastmod>2024-03-26T09:59:30+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-vpn-blocker-definition-vpn-blocker.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/vpn-routers/</loc>
		<lastmod>2024-03-26T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/virus-vs-worm/</loc>
		<lastmod>2024-03-26T09:59:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/url-filtering/</loc>
		<lastmod>2024-03-26T10:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/unified-threat-management-utm/</loc>
		<lastmod>2024-03-26T10:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ueba-user-and-entity-behavior-analytics-kzero-staff/</loc>
		<lastmod>2024-03-26T10:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/udp-user-datagram-protocol/</loc>
		<lastmod>2024-03-26T10:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/u2f-universal-2nd-factor-definition/</loc>
		<lastmod>2024-03-26T10:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/trojan-virus-definition/</loc>
		<lastmod>2024-03-26T10:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/trickbot/</loc>
		<lastmod>2024-03-26T10:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/transparent-proxy/</loc>
		<lastmod>2024-03-26T10:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/traceroute-definition/</loc>
		<lastmod>2024-03-26T10:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/totp-definition/</loc>
		<lastmod>2024-03-26T10:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/tokenized-authentication/</loc>
		<lastmod>2024-03-26T10:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/tokenization-definition/</loc>
		<lastmod>2024-03-26T10:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/tiny-banker-trojan/</loc>
		<lastmod>2024-03-26T10:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ticket-granting-ticket-tgt-definition/</loc>
		<lastmod>2024-03-26T10:05:47+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-ticket-granting-ticket-tgt-definition-tgt.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/threat-modeling/</loc>
		<lastmod>2024-03-26T10:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/threat-intelligence/</loc>
		<lastmod>2024-10-19T11:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/threat-hunting/</loc>
		<lastmod>2024-03-26T10:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/threat-actor/</loc>
		<lastmod>2024-03-26T10:06:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/thin-client-definition/</loc>
		<lastmod>2024-03-26T10:07:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/protected-health-information-phi/</loc>
		<lastmod>2024-03-26T10:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/log-management-definition/</loc>
		<lastmod>2024-03-26T10:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digital-forensics-definition/</loc>
		<lastmod>2024-03-26T10:10:27+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/08/kzero-digital-forensics-definition-digital-forensics.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ms-dos-definition/</loc>
		<lastmod>2024-03-26T10:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/malvertising-definition/</loc>
		<lastmod>2024-03-26T10:11:05+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-malvertising-definition-malvertising.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ldap-definition/</loc>
		<lastmod>2024-03-26T10:11:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/lateral-movement-meaning/</loc>
		<lastmod>2024-03-26T10:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/latency-definition/</loc>
		<lastmod>2024-03-26T10:11:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/log-formats-definition/</loc>
		<lastmod>2024-03-26T10:12:08+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-log-formats-definition-log-formats.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/open-banking/</loc>
		<lastmod>2024-03-26T10:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ethereum/</loc>
		<lastmod>2024-03-26T10:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/altcoins/</loc>
		<lastmod>2024-07-31T10:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/bitcoin/</loc>
		<lastmod>2024-03-26T10:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/web3/</loc>
		<lastmod>2024-03-26T10:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/key-management/</loc>
		<lastmod>2024-03-26T10:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/node/</loc>
		<lastmod>2024-03-26T10:15:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/crypto/</loc>
		<lastmod>2024-03-26T10:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/blockchain/</loc>
		<lastmod>2024-03-26T10:16:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/deep-web-vs-dark-web-definition/</loc>
		<lastmod>2024-03-26T10:16:49+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-deep-web-vs-dark-web-definition-deep-web-vs-dark-web.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/dark-web-definition/</loc>
		<lastmod>2024-03-26T10:17:25+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-dark-web-definition-dark-web.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/aaa-cyber-security-definition/</loc>
		<lastmod>2024-03-26T10:20:18+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-aaa-cyber-security-definition-kzerotrust-photography-of-digital-padlock-on-a-motherboard-hype-d554dd80-29d6-42b4-8547-990ab3464df0-scaled-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/access-control-list-definition/</loc>
		<lastmod>2024-03-26T10:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/advanced-encryption-standard-aes/</loc>
		<lastmod>2024-03-26T10:20:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/advanced-persistent-threat-apt-definition/</loc>
		<lastmod>2024-03-26T10:20:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/adware-definition/</loc>
		<lastmod>2024-03-26T10:20:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/aitm-definition/</loc>
		<lastmod>2024-03-26T10:20:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/api-definition/</loc>
		<lastmod>2024-03-26T10:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/arp-cache-poisoning-attack-definition/</loc>
		<lastmod>2024-03-26T10:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/asymmetric-encryption-definition/</loc>
		<lastmod>2024-03-26T10:21:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/attack-surface-analysis-definition/</loc>
		<lastmod>2024-03-26T10:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/attack-vectors-definition/</loc>
		<lastmod>2024-03-26T10:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/authentication/</loc>
		<lastmod>2024-03-26T10:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/automated-compliance-definition/</loc>
		<lastmod>2024-03-26T10:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/beaconing-definition/</loc>
		<lastmod>2024-03-26T10:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/border-gateway-protocol-bgp-definition/</loc>
		<lastmod>2024-03-26T10:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/bot-definition/</loc>
		<lastmod>2024-03-26T10:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/botnet-definition/</loc>
		<lastmod>2024-03-26T10:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/brute-force-attack-definition/</loc>
		<lastmod>2024-03-26T10:33:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/byod-definition/</loc>
		<lastmod>2024-03-26T10:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ca-certs-definition/</loc>
		<lastmod>2024-03-26T10:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/canary-cyber-security-definition/</loc>
		<lastmod>2024-03-26T10:34:09+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-canary-cyber-security-definition-canary-in-cyber-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/catfishing-definition/</loc>
		<lastmod>2024-03-26T10:34:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/central-logging-definition/</loc>
		<lastmod>2024-03-26T10:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/certificate-authority-definition/</loc>
		<lastmod>2024-03-26T10:34:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/challenge-handshake-authentication-protocol/</loc>
		<lastmod>2024-03-26T10:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/chap-authentication-definition/</loc>
		<lastmod>2024-03-26T10:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cia-triad-definition/</loc>
		<lastmod>2024-03-26T10:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cipher-definition/</loc>
		<lastmod>2024-03-26T10:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cipher-suite-definition/</loc>
		<lastmod>2024-03-26T10:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ciphertext-definition/</loc>
		<lastmod>2024-03-26T10:35:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cis/</loc>
		<lastmod>2024-03-26T10:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/click-fraud-definition/</loc>
		<lastmod>2024-03-26T10:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cloud-data-security-definition/</loc>
		<lastmod>2024-03-26T10:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cloud-security-risks-definition/</loc>
		<lastmod>2024-03-26T10:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/computer-viruses-definition/</loc>
		<lastmod>2024-03-26T10:35:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/corporate-account-takeover-definition/</loc>
		<lastmod>2024-03-26T10:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cross-site-scripting-definition/</loc>
		<lastmod>2024-03-26T10:37:02+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-cross-site-scripting-definition-cross-site-scripting-xss.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/crud-definition/</loc>
		<lastmod>2024-03-26T10:37:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cryptographic-hash-definition/</loc>
		<lastmod>2024-03-26T10:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cryptojacking-definition/</loc>
		<lastmod>2024-03-26T10:37:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cyber-insurance/</loc>
		<lastmod>2024-03-26T10:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cyber-kill-chain-definition/</loc>
		<lastmod>2024-03-26T10:37:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cybersecurity/</loc>
		<lastmod>2024-03-26T10:37:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cybersecurity-analytics-definition/</loc>
		<lastmod>2024-03-26T10:37:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cybersecurity-honeypot-definition/</loc>
		<lastmod>2024-03-26T10:37:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/cyberwarfare-definition/</loc>
		<lastmod>2024-03-26T10:37:46+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/data-breach-definition/</loc>
		<lastmod>2024-03-26T10:38:00+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-data-breach-definition-data-breach.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/data-exfiltration-definition/</loc>
		<lastmod>2024-03-26T10:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/data-integrity-definition/</loc>
		<lastmod>2024-03-26T10:38:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/data-obfuscation/</loc>
		<lastmod>2024-03-26T10:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ddos-definition/</loc>
		<lastmod>2024-03-26T10:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/deep-packet-inspection-definition/</loc>
		<lastmod>2024-03-26T10:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/demilitarized-zone-dmz-network-definition/</loc>
		<lastmod>2024-03-26T10:38:33+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-demilitarized-zone-dmz-network-definition-demilitarized-zone-dmz.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/denial-of-service-dos-definition/</loc>
		<lastmod>2024-03-26T10:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/devops-security-definition/</loc>
		<lastmod>2024-03-26T10:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/diffie-hellman-algorithm-definition/</loc>
		<lastmod>2024-03-26T10:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/dictionary-attacks-definition/</loc>
		<lastmod>2024-03-26T10:39:07+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/08/kzero-dictionary-attacks-definition-dictionary-attack-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digest-access-authentication/</loc>
		<lastmod>2024-03-26T10:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digital-signature/</loc>
		<lastmod>2024-03-26T10:39:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digital-signature-algorithm-dsa/</loc>
		<lastmod>2024-03-26T10:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/digital-signature-standard-dss/</loc>
		<lastmod>2024-03-26T10:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/distributed-key/</loc>
		<lastmod>2024-03-26T10:40:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/dmarc-definition/</loc>
		<lastmod>2024-03-26T10:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/dns-leak-protection-definition/</loc>
		<lastmod>2024-03-26T10:40:15+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/08/kzero-dns-leak-protection-definition-domain-name-system-dns-meaning.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/doxxed-definition/</loc>
		<lastmod>2024-03-26T10:40:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/elliptic-curve-digital-signature-algorithm-ecdsa-definition/</loc>
		<lastmod>2024-03-26T10:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/email-hijacking-definition/</loc>
		<lastmod>2024-03-26T10:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/encryption-definition/</loc>
		<lastmod>2024-03-26T10:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/endpoint-detection-and-response-edr-definition/</loc>
		<lastmod>2024-03-26T10:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/endpoint-management-definition/</loc>
		<lastmod>2024-03-26T10:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/endpoint-security-definition/</loc>
		<lastmod>2024-03-26T10:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/equifax-security-breach/</loc>
		<lastmod>2024-03-26T10:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ethernet-switch-definition/</loc>
		<lastmod>2024-03-26T10:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/extensible-authentication-protocol-eap-method-definition/</loc>
		<lastmod>2024-03-26T10:41:06+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-extensible-authentication-protocol-eap-method-definition-extensible-authentication-protocol-eap-method.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/eye-authentication/</loc>
		<lastmod>2024-03-26T10:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/face-authentication/</loc>
		<lastmod>2024-03-26T10:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fake-hacking-definition/</loc>
		<lastmod>2024-03-26T10:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fault-tolerance-definition/</loc>
		<lastmod>2024-03-26T10:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-biometrics/</loc>
		<lastmod>2024-03-26T10:41:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-client-software-sdk/</loc>
		<lastmod>2024-03-26T10:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-cloud-authentication/</loc>
		<lastmod>2024-03-26T10:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-iot-security/</loc>
		<lastmod>2024-03-26T10:41:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-server/</loc>
		<lastmod>2024-03-26T10:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-u2f-authentication/</loc>
		<lastmod>2024-03-26T10:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fido-uaf/</loc>
		<lastmod>2024-03-26T10:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/fileless-malware-definition/</loc>
		<lastmod>2024-03-26T10:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/firewall-definition/</loc>
		<lastmod>2024-03-26T10:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/firewall-rule-definition/</loc>
		<lastmod>2024-03-26T10:42:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/firmware-definition/</loc>
		<lastmod>2024-03-26T10:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/forensic-analysis-definition/</loc>
		<lastmod>2024-03-26T10:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/golden-ticket-attack-definition/</loc>
		<lastmod>2024-03-26T10:42:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hacking-definition/</loc>
		<lastmod>2024-03-26T10:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hacktivism-definition/</loc>
		<lastmod>2024-03-26T10:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hash-functions-definition/</loc>
		<lastmod>2024-03-26T10:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/heap-spraying-definition/</loc>
		<lastmod>2024-03-26T10:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hotp-definition/</loc>
		<lastmod>2024-03-26T10:43:09+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/how-does-a-vpn-work/</loc>
		<lastmod>2024-03-26T10:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hybrid-cloud-definition/</loc>
		<lastmod>2024-03-26T10:43:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/hyperscale-definition/</loc>
		<lastmod>2024-03-26T10:43:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/icmp-definition/</loc>
		<lastmod>2024-03-26T10:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/id-ransomware-definition/</loc>
		<lastmod>2024-03-26T10:43:33+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-id-ransomware-definition-id-ransomware.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/id-ransomware-definition-howard-poston/</loc>
		<lastmod>2024-07-27T21:46:49+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/07/kzero-id-ransomware-definition-howard-poston-id-ransomware.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ike-definition/</loc>
		<lastmod>2024-03-26T10:43:55+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-ike-definition-internet-key-exchange-ike.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/incident-response-definition/</loc>
		<lastmod>2024-03-26T10:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ingress-vs-egress-definition/</loc>
		<lastmod>2024-03-26T10:44:15+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-ingress-vs-egress-definition-ingress-vs-egress.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/insider-threat-definition/</loc>
		<lastmod>2024-03-26T10:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/intrusion-detection-system-definition/</loc>
		<lastmod>2024-03-26T10:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/iot-edge-definition/</loc>
		<lastmod>2024-03-26T10:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/key-agreement-vs-key-exchange-definition-2/</loc>
		<lastmod>2024-03-26T10:44:33+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-key-agreement-vs-key-exchange-definition-key-agreement-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/key-distribution-center-definition/</loc>
		<lastmod>2024-03-26T10:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/keylogging/</loc>
		<lastmod>2024-03-26T10:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/machine-learning-cyber-security-definition/</loc>
		<lastmod>2024-03-26T10:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/malware-definition/</loc>
		<lastmod>2024-03-26T10:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mdm-protocol-definition/</loc>
		<lastmod>2024-03-26T10:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mdr-definition/</loc>
		<lastmod>2024-03-26T10:45:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/meterpreter-definition/</loc>
		<lastmod>2024-03-26T10:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mimikatz/</loc>
		<lastmod>2024-03-26T10:45:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mitc-definition/</loc>
		<lastmod>2024-03-26T10:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/mitre-att-ck-framework-definition/</loc>
		<lastmod>2024-03-26T10:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/network-security-definition/</loc>
		<lastmod>2024-03-26T10:45:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ntlm-authentication/</loc>
		<lastmod>2024-03-26T10:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ntlm-authentication-definition/</loc>
		<lastmod>2024-03-26T10:45:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ntlm-definition/</loc>
		<lastmod>2024-03-26T10:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/oauth-2-0-definition/</loc>
		<lastmod>2024-03-26T10:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/oauth-definition/</loc>
		<lastmod>2024-03-26T10:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ocsp-definition/</loc>
		<lastmod>2024-03-26T10:46:15+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/10/kzero-ocsp-definition-online-certificate-status-protocol-ocsp.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/on-path-attack-definition/</loc>
		<lastmod>2024-03-26T10:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/openid-connect-flow-definition/</loc>
		<lastmod>2024-03-26T10:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/opsec-definition/</loc>
		<lastmod>2024-03-26T10:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/otp-definition/</loc>
		<lastmod>2024-03-26T10:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/out-of-band-authentication-definition/</loc>
		<lastmod>2024-03-26T10:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pam-tools-definition/</loc>
		<lastmod>2024-03-26T10:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/parse-logs-definition/</loc>
		<lastmod>2024-03-26T10:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/password-reuse/</loc>
		<lastmod>2024-03-26T10:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/passkeys/</loc>
		<lastmod>2024-03-26T10:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/password-complexity/</loc>
		<lastmod>2024-03-26T10:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/password-hashing/</loc>
		<lastmod>2024-03-26T10:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/password-spraying-definition/</loc>
		<lastmod>2024-03-26T10:47:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/penetration-testing-definition/</loc>
		<lastmod>2024-03-26T10:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pgp-definition/</loc>
		<lastmod>2024-03-26T10:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/phishing-definition/</loc>
		<lastmod>2024-03-26T10:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pki-architecture-definition/</loc>
		<lastmod>2024-03-26T10:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pki-authentication-definition/</loc>
		<lastmod>2024-03-26T10:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pki-certificates-definition/</loc>
		<lastmod>2024-03-26T10:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/port-scanning-definition/</loc>
		<lastmod>2024-03-26T10:47:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/pretexting-definition/</loc>
		<lastmod>2024-03-26T10:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/privileged-access-management-definition/</loc>
		<lastmod>2024-03-26T10:48:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/proxy-server-definition/</loc>
		<lastmod>2024-03-26T10:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/psd1-definition/</loc>
		<lastmod>2024-03-26T10:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/psd2-definition/</loc>
		<lastmod>2024-03-26T10:48:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/public-key-encryption-definition/</loc>
		<lastmod>2024-03-26T10:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/push-authentication/</loc>
		<lastmod>2024-03-26T10:48:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/qos-definition/</loc>
		<lastmod>2024-03-26T10:48:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/qr-code-authentication/</loc>
		<lastmod>2024-03-26T10:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/radius-protocol-definition/</loc>
		<lastmod>2024-03-26T10:48:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/quantum-encryption/</loc>
		<lastmod>2024-03-26T10:48:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/quantum-cryptography/</loc>
		<lastmod>2024-03-26T10:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/quantum-computing/</loc>
		<lastmod>2024-03-26T10:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/rainbow-table/</loc>
		<lastmod>2024-03-26T10:48:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/random-number-generator/</loc>
		<lastmod>2024-03-26T10:49:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ransomware/</loc>
		<lastmod>2024-03-26T10:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/red-team/</loc>
		<lastmod>2024-03-26T10:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/remote-access-trojan-definition/</loc>
		<lastmod>2024-03-26T10:49:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/rest-api-definition/</loc>
		<lastmod>2024-03-26T10:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/rootkit-definition/</loc>
		<lastmod>2024-03-26T10:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/risk-based-authentication/</loc>
		<lastmod>2024-03-26T10:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/reverse-engineering/</loc>
		<lastmod>2024-03-26T10:49:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/rest-protocols-definition/</loc>
		<lastmod>2024-03-26T10:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/salted-hash-definition/</loc>
		<lastmod>2024-03-26T10:49:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/saml-definition/</loc>
		<lastmod>2024-03-26T10:49:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/saml-handshake-definition/</loc>
		<lastmod>2024-03-26T10:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/saml-mfa/</loc>
		<lastmod>2024-03-26T10:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/saml-vs-oauth/</loc>
		<lastmod>2024-03-26T10:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/sase-definition/</loc>
		<lastmod>2024-03-26T10:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/scareware-definition/</loc>
		<lastmod>2024-03-26T10:50:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/scim-definition/</loc>
		<lastmod>2024-03-26T10:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/scram-definition/</loc>
		<lastmod>2024-03-26T10:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/security-keys-definition/</loc>
		<lastmod>2024-03-26T10:50:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/security-mesh/</loc>
		<lastmod>2024-03-26T10:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/security-tokens-definition/</loc>
		<lastmod>2024-03-26T10:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/session-hijacking-definition/</loc>
		<lastmod>2024-03-26T10:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/shellcode/</loc>
		<lastmod>2024-03-26T10:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/shoulder-surfing-definition/</loc>
		<lastmod>2024-03-26T10:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/sidejacking-definition/</loc>
		<lastmod>2024-03-26T10:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/siem-definition/</loc>
		<lastmod>2024-03-26T10:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/single-sign-on-definition/</loc>
		<lastmod>2024-03-26T10:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/single-factor-authentication/</loc>
		<lastmod>2024-03-26T10:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/site-to-site-vpn/</loc>
		<lastmod>2024-03-26T10:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/smart-card-authentication/</loc>
		<lastmod>2024-03-26T10:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/soap-protocol-definition/</loc>
		<lastmod>2024-03-26T10:51:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/soap-secure-definition/</loc>
		<lastmod>2024-03-26T10:51:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/software-patch-definition/</loc>
		<lastmod>2024-03-26T10:51:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spam-filter/</loc>
		<lastmod>2024-03-26T10:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spambot/</loc>
		<lastmod>2024-03-26T10:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spear-phishing/</loc>
		<lastmod>2024-03-26T10:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spoofing-definition/</loc>
		<lastmod>2024-03-26T10:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spoofing-ip-address/</loc>
		<lastmod>2024-03-26T10:52:14+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spraying-attack/</loc>
		<lastmod>2024-03-26T10:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spyeye-definition/</loc>
		<lastmod>2024-03-26T10:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/spyware/</loc>
		<lastmod>2024-03-26T10:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/sql-injection/</loc>
		<lastmod>2024-03-26T10:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/sqrl-definition/</loc>
		<lastmod>2024-03-26T10:52:42+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/10/kzero-sqrl-definition-untitled-3-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ssh-definition/</loc>
		<lastmod>2024-03-26T10:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ssl-definition/</loc>
		<lastmod>2024-03-26T10:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/ssl-stripping-attack/</loc>
		<lastmod>2024-03-26T10:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/sso-definition/</loc>
		<lastmod>2024-03-26T10:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/stateful-firewall-definition/</loc>
		<lastmod>2024-03-26T10:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/step-up-authentication/</loc>
		<lastmod>2024-03-26T10:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/stuxnet/</loc>
		<lastmod>2024-03-26T10:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/symmetric-encryption/</loc>
		<lastmod>2024-03-26T10:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/symmetric-encryption-2/</loc>
		<lastmod>2024-03-26T10:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/symmetric-key/</loc>
		<lastmod>2024-03-26T10:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/symmetric-key-cryptography/</loc>
		<lastmod>2024-03-26T10:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/symmetric-vs-asymmetric-encryption/</loc>
		<lastmod>2024-03-26T10:53:40+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/10/kzero-symmetric-vs-asymmetric-encryption-asymmetric-vs-symmetric-encryption.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/system-logging/</loc>
		<lastmod>2024-03-26T10:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/tailgating-attack/</loc>
		<lastmod>2024-03-26T10:53:49+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-tailgating-attack-tailgating-attack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/transmission-control-protocol-tcp-definition/</loc>
		<lastmod>2024-03-26T10:54:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/trojan-horse/</loc>
		<lastmod>2024-03-26T10:54:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/trustless/</loc>
		<lastmod>2024-03-26T10:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/virus/</loc>
		<lastmod>2024-03-26T10:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/wannacry/</loc>
		<lastmod>2024-03-26T10:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/what-is-soar/</loc>
		<lastmod>2024-03-26T10:54:38+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/zero-knowledge-proof/</loc>
		<lastmod>2024-03-26T10:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/zero-trust-definition/</loc>
		<lastmod>2024-03-26T10:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/magic-links-definition/</loc>
		<lastmod>2024-03-26T10:59:54+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2024/03/kzero-magic-links-definition-magic-links.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/fr/resources/glossary/definition-de-la-cybersecurite-aaa/</loc>
		<lastmod>2024-04-08T17:50:06+00:00</lastmod>
		<image:image>
			<image:loc>http://134.122.39.49/wp-content/uploads/2023/07/kzero-aaa-cyber-security-definition-kzerotrust-photography-of-digital-padlock-on-a-motherboard-hype-d554dd80-29d6-42b4-8547-990ab3464df0-scaled-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://134.122.39.49/resources/glossary/domain-name-service-dns-definition/</loc>
		<lastmod>2024-05-02T16:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://134.122.39.49/fr/resources/glossary/</loc>
		<lastmod>2024-05-02T16:39:21+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->