<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 15, 2026 at 1:04 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybersec.cafe/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>CyberSec.Cafe</title>
		<link><![CDATA[https://cybersec.cafe]]></link>
		<description><![CDATA[CyberSec.Cafe]]></description>
		<lastBuildDate><![CDATA[Wed, 22 May 2024 12:09:22 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybersec.cafe/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybersec.cafe/how-to-keep-you-safe-online/]]></guid>
			<link><![CDATA[https://cybersec.cafe/how-to-keep-you-safe-online/]]></link>
			<title>How to Keep You Safe Online</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:09:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/exciting-collaborations-on-the-horizon-gear-up-for-cyber-insights/]]></guid>
			<link><![CDATA[https://cybersec.cafe/exciting-collaborations-on-the-horizon-gear-up-for-cyber-insights/]]></link>
			<title>Exciting Collaborations on the Horizon: Gear Up for Cyber Insights!</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:09:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/23andme-and-us/]]></guid>
			<link><![CDATA[https://cybersec.cafe/23andme-and-us/]]></link>
			<title>23andMe, and Us?</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:09:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-future-of-cve-is-at-risk/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-future-of-cve-is-at-risk/]]></link>
			<title>The Future of CVE Is at Risk</title>
			<pubDate><![CDATA[Wed, 16 Apr 2025 10:10:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-digital-shadow/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-digital-shadow/]]></link>
			<title>The Digital Shadow</title>
			<pubDate><![CDATA[Wed, 02 Oct 2024 19:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/an-open-letter-to-enisa/]]></guid>
			<link><![CDATA[https://cybersec.cafe/an-open-letter-to-enisa/]]></link>
			<title>An Open Letter to ENISA</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 09:22:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/holding-software-vendors-accountable-for-security-breaches/]]></guid>
			<link><![CDATA[https://cybersec.cafe/holding-software-vendors-accountable-for-security-breaches/]]></link>
			<title>Holding Software Vendors Accountable for Security Breaches</title>
			<pubDate><![CDATA[Fri, 19 Jul 2024 07:20:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-threat-intelligence-sharing-project/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-threat-intelligence-sharing-project/]]></link>
			<title>The Threat Intelligence Sharing Project</title>
			<pubDate><![CDATA[Fri, 11 Apr 2025 20:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/when-ai-eats-its-users-ais-attention-economy-trap/]]></guid>
			<link><![CDATA[https://cybersec.cafe/when-ai-eats-its-users-ais-attention-economy-trap/]]></link>
			<title>When AI Eats Its Users: AI&#8217;s Attention Economy Trap</title>
			<pubDate><![CDATA[Fri, 09 Jan 2026 14:04:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/europes-epic-digital-surrender-carbs-triumph-where-clouds-fail/]]></guid>
			<link><![CDATA[https://cybersec.cafe/europes-epic-digital-surrender-carbs-triumph-where-clouds-fail/]]></link>
			<title>Europe&#8217;s Epic Digital Surrender: Carbs Tr(i)ump(h) Where Clouds Fail!</title>
			<pubDate><![CDATA[Fri, 02 Jan 2026 12:58:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/unraveling-the-italian-data-protection-authority-on-ai-one-year-later/]]></guid>
			<link><![CDATA[https://cybersec.cafe/unraveling-the-italian-data-protection-authority-on-ai-one-year-later/]]></link>
			<title>Unraveling the Italian Data Protection Authority on AI One Year Later</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/an-imaginary-discussion-between-the-italian-dpa-and-openais-cto/]]></guid>
			<link><![CDATA[https://cybersec.cafe/an-imaginary-discussion-between-the-italian-dpa-and-openais-cto/]]></link>
			<title>An Imaginary Discussion Between the Italian DPA and OpenAI&#8217;s CTO</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:08:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/elevating-business-resilience-with-identity-threat-detection-and-response-itdr/]]></guid>
			<link><![CDATA[https://cybersec.cafe/elevating-business-resilience-with-identity-threat-detection-and-response-itdr/]]></link>
			<title>Elevating Business Resilience with Identity Threat Detection and Response (ITDR)</title>
			<pubDate><![CDATA[Wed, 22 May 2024 12:08:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/relying-on-security-by-luck/]]></guid>
			<link><![CDATA[https://cybersec.cafe/relying-on-security-by-luck/]]></link>
			<title>Relying on Security-by-Luck</title>
			<pubDate><![CDATA[Wed, 24 May 2023 11:40:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/my-fun-dive-into-owasp-llm-top-10-vulnerabilities/]]></guid>
			<link><![CDATA[https://cybersec.cafe/my-fun-dive-into-owasp-llm-top-10-vulnerabilities/]]></link>
			<title>My Fun Dive into OWASP LLM Top 10 Vulnerabilities!</title>
			<pubDate><![CDATA[Tue, 22 Aug 2023 18:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/owasp-vs-cybersec-cafes-llm-top-security-risks/]]></guid>
			<link><![CDATA[https://cybersec.cafe/owasp-vs-cybersec-cafes-llm-top-security-risks/]]></link>
			<title>OWASP vs. Cybersec.Café&#8217;s LLM Top Security Risks</title>
			<pubDate><![CDATA[Wed, 31 May 2023 16:20:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/deciphering-the-xdr-puzzle/]]></guid>
			<link><![CDATA[https://cybersec.cafe/deciphering-the-xdr-puzzle/]]></link>
			<title>Deciphering the XDR Puzzle</title>
			<pubDate><![CDATA[Tue, 25 Jul 2023 18:40:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-need-for-a-passwordless-future/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-need-for-a-passwordless-future/]]></link>
			<title>The Need for a Passwordless Future</title>
			<pubDate><![CDATA[Tue, 23 May 2023 06:29:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/my-top-popular-linkedin-posts-for-april-2023-🚀/]]></guid>
			<link><![CDATA[https://cybersec.cafe/my-top-popular-linkedin-posts-for-april-2023-🚀/]]></link>
			<title>My Top Popular LinkedIn Posts for April 2023 🚀</title>
			<pubDate><![CDATA[Tue, 23 May 2023 06:29:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-rising-stakes-for-cybersecurity-accountability/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-rising-stakes-for-cybersecurity-accountability/]]></link>
			<title>The Rising Stakes for Cybersecurity Accountability</title>
			<pubDate><![CDATA[Thu, 29 Jun 2023 07:06:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-secrets-to-master-key-management-in-cloud-encryption/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-secrets-to-master-key-management-in-cloud-encryption/]]></link>
			<title>The secrets to Master Key Management in Cloud Encryption</title>
			<pubDate><![CDATA[Thu, 20 Jul 2023 12:09:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/]]></guid>
			<link><![CDATA[https://cybersec.cafe/]]></link>
			<title>CyberSec Cafe | Cybersecurity News, Insights &amp; Tips</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 09:37:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/unveiling-the-owasp-top-10-for-large-language-models/]]></guid>
			<link><![CDATA[https://cybersec.cafe/unveiling-the-owasp-top-10-for-large-language-models/]]></link>
			<title>Unveiling the OWASP Top 10 for Large Language Models</title>
			<pubDate><![CDATA[Mon, 31 Jul 2023 13:57:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-human-element-in-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-human-element-in-cybersecurity/]]></link>
			<title>The Human Element in Cybersecurity</title>
			<pubDate><![CDATA[Mon, 24 Jul 2023 07:26:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/is-artificial-intelligence-now-closer-to-human-intelligence/]]></guid>
			<link><![CDATA[https://cybersec.cafe/is-artificial-intelligence-now-closer-to-human-intelligence/]]></link>
			<title>IS Artificial Intelligence now closer to Human Intelligence?</title>
			<pubDate><![CDATA[Fri, 29 Mar 2024 13:17:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/privacy-policy/]]></guid>
			<link><![CDATA[https://cybersec.cafe/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Wed, 29 Mar 2023 10:44:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/the-journey-begins-why-i-started-my-cybersecurity-blog/]]></guid>
			<link><![CDATA[https://cybersec.cafe/the-journey-begins-why-i-started-my-cybersecurity-blog/]]></link>
			<title>The Journey Begins  </title>
			<pubDate><![CDATA[Wed, 17 May 2023 13:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/unraveling-the-chat-gpt-block-in-italy-geopolitics-ai-regulation-inconsistencies-and-constitutionality/]]></guid>
			<link><![CDATA[https://cybersec.cafe/unraveling-the-chat-gpt-block-in-italy-geopolitics-ai-regulation-inconsistencies-and-constitutionality/]]></link>
			<title>Unraveling the Chat GPT Block in Italy</title>
			<pubDate><![CDATA[Wed, 17 May 2023 13:17:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/is-the-cia-triad-enough-for-todays-cybersecurity-challenges/]]></guid>
			<link><![CDATA[https://cybersec.cafe/is-the-cia-triad-enough-for-todays-cybersecurity-challenges/]]></link>
			<title>Is the CIA Triad Enough for Today&#8217;s Cybersecurity Challenges?</title>
			<pubDate><![CDATA[Thu, 02 May 2024 18:17:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/contact/]]></guid>
			<link><![CDATA[https://cybersec.cafe/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Fri, 24 Mar 2023 09:31:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersec.cafe/blog/]]></guid>
			<link><![CDATA[https://cybersec.cafe/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Fri, 24 Mar 2023 09:28:32 +0000]]></pubDate>
		</item>
				</channel>
</rss>
