<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
	>
<url><loc>https://cisspmadeeasy.com/2026/05/13/code-signing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:32:50+00:00</news:publication_date><news:title>Code Signing: Establishing Trust in Internet-Distributed Software</news:title><news:keywords>Defence, Code Signing, PKI</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/sql-injection-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:30:27+00:00</news:publication_date><news:title>SQL Injection: The Attack That Can Empty Your Entire Database</news:title><news:keywords>Attack, Web Security, SQL Injection, Database Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/dmz-protocol-attacks-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:26:06+00:00</news:publication_date><news:title>DMZ Protocol Attacks: Threats to Your Network&#8217;s Buffer Zone</news:title><news:keywords>Attack, Protocol, Network Security, DMZ</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/npm-supply-chain-attack-tanstack-mistral-2026/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T08:00:00+00:00</news:publication_date><news:title>When the Supplier Becomes the Threat: The npm Supply Chain Attack That Shook the Software World</news:title><news:keywords>CISSP, CCSP, malware, npm, Supply Chain Attack, AAISM, Zero Trust, Mistral AI, Developer Security</news:keywords></news:news></url></urlset>
