<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  
  
    
    <url>
      <loc>https://iamit.org/blog/</loc>
      <lastmod>2026-02-09T14:50:43+00:00</lastmod>
      <changefreq>monthly</changefreq>
      <priority>0.8</priority>
    </url>
    
  
    
      
  
    
      
  

  
    <url>
      <loc>https://iamit.org/blog/backpacking-in-europe-two-weeks-of-flights-2021/</loc>
      <lastmod>2021-12-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/elastic-permissions/</loc>
      <lastmod>2020-06-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/incentives-and-metrics/</loc>
      <lastmod>2020-03-14T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-product-versus-skill-pendulum-in-security-and-the-need-for-better-solutions/</loc>
      <lastmod>2020-02-11T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/trust-building-for-security/</loc>
      <lastmod>2019-03-14T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/why-you-should-go-beyond-the-typical-penetration-test/</loc>
      <lastmod>2019-02-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/two-frameworks-for-securing-a-decentralized-enterprise/</loc>
      <lastmod>2019-01-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/random-cso-musing/</loc>
      <lastmod>2018-11-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/how-to-vendor-sales-in-the-security-industry/</loc>
      <lastmod>2018-10-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/basic-is-great/</loc>
      <lastmod>2018-09-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-ian-amit-spectrum-of-pentesting-efficacy/</loc>
      <lastmod>2018-06-29T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/dumpster-fires-and-security-incidents/</loc>
      <lastmod>2017-09-11T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/when-great-ideas-go-to-the-wrong-places/</loc>
      <lastmod>2017-06-10T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/ptes-remaining-impartial-and-insisting-on-high-standards/</loc>
      <lastmod>2016-09-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/infosec-conferencestalks-redux/</loc>
      <lastmod>2016-06-16T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/thoughts-about-the-apple-vs-fbi-iphone-firmware-case/</loc>
      <lastmod>2016-02-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/an-obituary-to-pentesting/</loc>
      <lastmod>2015-11-24T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/amazonian-trojans-and-marketing-fear-mongering/</loc>
      <lastmod>2015-11-13T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/debunking-the-8200-81-and-other-ex-israeli-army-intelligence-myth/</loc>
      <lastmod>2015-10-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/keys-what-are-these-for/</loc>
      <lastmod>2015-10-11T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/smrmageddon/</loc>
      <lastmod>2015-09-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hacking-community-friends-and-professionalism/</loc>
      <lastmod>2015-09-10T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/yes-you-knew-exactly-what-you-were-walking-into/</loc>
      <lastmod>2015-06-21T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/osint-links/</loc>
      <lastmod>2015-05-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/post-rsa-musings/</loc>
      <lastmod>2015-04-27T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/may-the-force-may-in-full-force/</loc>
      <lastmod>2015-04-13T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/ists12-keynote-and-red-team/</loc>
      <lastmod>2015-03-09T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/honest-review-csicyber/</loc>
      <lastmod>2015-03-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/sensationalism-doing-more-damage-than-good/</loc>
      <lastmod>2015-01-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/killing-innovation-in-the-name-of-the-law/</loc>
      <lastmod>2015-01-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/1170/</loc>
      <lastmod>2015-01-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/when-a-door-is-not-a-door/</loc>
      <lastmod>2014-12-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/to_the_full_extent_of_their_capabilities/</loc>
      <lastmod>2014-10-29T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/security-and-maturity-beating-the-averages/</loc>
      <lastmod>2014-06-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/getting-things-right-goes-a-long-way-when-you-are-bleeding/</loc>
      <lastmod>2014-04-14T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/relying-on-av-really/</loc>
      <lastmod>2014-04-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hacking-business-and-politics/</loc>
      <lastmod>2014-03-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/women-in-infosec-that-thing-again/</loc>
      <lastmod>2014-02-27T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/breaking-news-spy-agencies-are-spying/</loc>
      <lastmod>2013-12-30T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/on-badbios-and-bad-behavior/</loc>
      <lastmod>2013-11-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/trip-down-memory-lane/</loc>
      <lastmod>2013-10-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/seeing-red-in-your-future-recap-from-derbycon-3-0/</loc>
      <lastmod>2013-09-30T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/mail-encryption-for-android/</loc>
      <lastmod>2013-07-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hiding-behing-the-keyboard/</loc>
      <lastmod>2013-06-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/red-team-training-comes-to-vegas/</loc>
      <lastmod>2013-05-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/do-as-i-say-not-as-i-do-rsa-bit9-adobe-and-others/</loc>
      <lastmod>2013-02-09T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/phishingthreatening-done-wrong/</loc>
      <lastmod>2012-11-30T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/ambulance-chasing-or-dna-research/</loc>
      <lastmod>2012-10-24T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/apple-meet-gpg-gpg-meet-apple/</loc>
      <lastmod>2012-08-24T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/vegas-2012-by-the-numbers/</loc>
      <lastmod>2012-08-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/security-awareness-and-security-context-aitel-and-krypt3ia-are-both-wrong/</loc>
      <lastmod>2012-07-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/this-one-time-at-defcon-a-blast-from-the-past/</loc>
      <lastmod>2012-07-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/sexydefense-comes-to-vegas/</loc>
      <lastmod>2012-06-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/so-you-thought-you-were-protected-how-hackers-can-break-into-your-business/</loc>
      <lastmod>2012-05-21T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/sexy-defense/</loc>
      <lastmod>2012-04-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/march-april-events/</loc>
      <lastmod>2012-03-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cyber-cyber-cyber-what-are-we-talking-about-anyway/</loc>
      <lastmod>2012-02-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/guest-post-why-you-need-patch-management/</loc>
      <lastmod>2012-01-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hackers-credit-cards-and-the-media/</loc>
      <lastmod>2012-01-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/advanced-data-exfiltration/</loc>
      <lastmod>2012-01-09T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/il-cert-finally-picking-up-speed/</loc>
      <lastmod>2012-01-03T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/offtopic-airplay-on-the-home-network/</loc>
      <lastmod>2011-12-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/intelligence-on-ashiyane-and-iranian-cyber-army/</loc>
      <lastmod>2011-12-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/so-what-about-that-securityzone/</loc>
      <lastmod>2011-12-12T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/introducing-sexydefence/</loc>
      <lastmod>2011-12-11T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/securityzone-to-finish-this-year-with-a-bang/</loc>
      <lastmod>2011-11-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/information-security-homeland-security-and-finding-someone-to-pin-it-on/</loc>
      <lastmod>2011-10-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/guesstimates-in-an-engineering-field/</loc>
      <lastmod>2011-09-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/career-in-information-security/</loc>
      <lastmod>2011-08-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/radio-interview-with-galatz-hebrew/</loc>
      <lastmod>2011-08-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/7-steps-to-consider-when-running-a-vulnerability-assessment/</loc>
      <lastmod>2011-08-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/upcoming-conferences-schedule-august-november-2011/</loc>
      <lastmod>2011-07-10T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/what-the-is-wrong-with-mobile-security/</loc>
      <lastmod>2011-07-09T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/how-great-perimeter-defenses-are-hurting-you/</loc>
      <lastmod>2011-05-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/local-paypal-phishing-and-why-we-need-a-cert/</loc>
      <lastmod>2011-05-03T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-curious-case-of-dropbox-security/</loc>
      <lastmod>2011-04-13T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/scada-control-systems-and-security-not-necessarily-enemies/</loc>
      <lastmod>2011-04-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/defense-through-offense-and-how-apt-fits-there/</loc>
      <lastmod>2011-04-03T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/defining-penetration-testing/</loc>
      <lastmod>2011-03-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/about-cyberwar-deterrence-and-espionage/</loc>
      <lastmod>2011-02-14T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/information-security-intelligence-report-for-2010-and-predictions-for-2011/</loc>
      <lastmod>2011-01-24T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-art-of-not-thinking-about-elephants/</loc>
      <lastmod>2011-01-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/building-a-brand-loyalty-how-not-to/</loc>
      <lastmod>2010-12-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/picking-up-the-glove-dc9723-2/</loc>
      <lastmod>2010-11-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-power-of-collaboration-bluehat-post/</loc>
      <lastmod>2010-11-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/stuxnet-analysis-report/</loc>
      <lastmod>2010-10-29T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-botnet-wars-industry-qa/</loc>
      <lastmod>2010-10-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/learning-from-stux-and-connecting-more-dots-in-infosec/</loc>
      <lastmod>2010-10-11T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/pentesters-and-businessman-are-doing-it-wrong/</loc>
      <lastmod>2010-09-27T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-realistic-cost-of-a-web-application-pen-test/</loc>
      <lastmod>2010-09-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/security-innovation-is-an-art-now/</loc>
      <lastmod>2010-08-31T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/updated-speaking-schedule/</loc>
      <lastmod>2010-08-12T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/remembering-the-shoe/</loc>
      <lastmod>2010-08-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/tying-up-loose-ends-before-vegas-scammer-closure/</loc>
      <lastmod>2010-07-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-turkish-hack-and-another-case-for-il-cert/</loc>
      <lastmod>2010-07-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/how-not-to-scam-security-people/</loc>
      <lastmod>2010-07-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cloud-security-alliance-conference-israel-cfp/</loc>
      <lastmod>2010-06-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/first-and-il-cert/</loc>
      <lastmod>2010-06-21T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/identity-crisis/</loc>
      <lastmod>2010-06-07T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-community-to-the-rescue-again/</loc>
      <lastmod>2010-06-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/upcoming-conference-schedule/</loc>
      <lastmod>2010-05-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/being-in-the-middle/</loc>
      <lastmod>2010-05-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cybercrimewar-connecting-the-dots-blackhat-eu-2010/</loc>
      <lastmod>2010-04-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cyberfudfare-repost-from-fudsec-com/</loc>
      <lastmod>2010-03-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/new-post-on-fudsec-com-cyberfudfare/</loc>
      <lastmod>2010-03-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/its-all-about-the-money/</loc>
      <lastmod>2010-03-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/exoticliability-podcast-interview/</loc>
      <lastmod>2010-03-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/offtopic-a-story-about-customer-service-or-lack-of-such/</loc>
      <lastmod>2010-02-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-chinagoogle-thing-accountants-and-other-miscreants/</loc>
      <lastmod>2010-02-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cybercrime-cyberwarfare-and-2010/</loc>
      <lastmod>2010-01-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/mapping-and-security-research/</loc>
      <lastmod>2009-12-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/aha-a-blast-from-the-past/</loc>
      <lastmod>2009-12-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/excaliburcon-summary-and-general-china-notes/</loc>
      <lastmod>2009-11-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/defcon-17-talk-video-available/</loc>
      <lastmod>2009-11-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/clouds-and-the-winds-that-blows-them-away/</loc>
      <lastmod>2009-10-30T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/malicious-ads-circa-2007/</loc>
      <lastmod>2009-09-29T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/down-the-rabbit-hole-all-the-way-to-miami/</loc>
      <lastmod>2009-09-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/two-steps-forward-one-step-back-controling-botnets/</loc>
      <lastmod>2009-09-13T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/drawing-the-line-securing-an-organization-while-thinking-of-users/</loc>
      <lastmod>2009-09-07T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/cyberwarfare-and-cybercrime-more-links-turn-out-in-study/</loc>
      <lastmod>2009-08-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/botnet-communications-moving-to-web2-0/</loc>
      <lastmod>2009-08-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/practical-vs-regulatory-the-votes-are-in/</loc>
      <lastmod>2009-07-27T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hebrew-information-risk-management-israeli-insurance-industry/</loc>
      <lastmod>2009-07-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/twitter-spam-spitter-tpam/</loc>
      <lastmod>2009-07-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/getting-a-business-degree-as-part-of-security-research/</loc>
      <lastmod>2009-06-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/are-you-linkedinfacebookedtwitteredbeboedviadeoedetc/</loc>
      <lastmod>2009-04-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/credit-cards-on-a-clearance-sale-and-your-internet-security/</loc>
      <lastmod>2009-04-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/fighting-ecrime-we-are-not-there-yet/</loc>
      <lastmod>2009-04-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/are-you-conficker-proof-do-you-really-need-to-be/</loc>
      <lastmod>2009-04-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/conficker-madness-good-or-bad/</loc>
      <lastmod>2009-03-30T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/social-aspects-of-web-security-the-march-edition/</loc>
      <lastmod>2009-03-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-great-av-vs-av-debacle-starts-again/</loc>
      <lastmod>2009-03-03T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/its-a-browser-its-an-operating-system-its-broser/</loc>
      <lastmod>2009-03-01T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/more-on-the-browser-os-from-microsoft-research/</loc>
      <lastmod>2009-02-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/if-gears-was-a-problem-then-how-about-running-gmail-offline-on-air/</loc>
      <lastmod>2009-02-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-oracle-strikes-again-browser-os-threats-start-to-appear/</loc>
      <lastmod>2009-02-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/social-networking-threats-the-hacker-story/</loc>
      <lastmod>2009-02-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/blocking-facebook-not-popular-and-not-effective/</loc>
      <lastmod>2009-02-09T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/fighting-an-infection-vector-with-new-standards-clickjacking/</loc>
      <lastmod>2009-02-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/bluehat-post-on-the-state-of-web-security/</loc>
      <lastmod>2009-02-05T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/more-predictions-see-the-light-of-day/</loc>
      <lastmod>2009-02-02T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/gear-up-predictions-for-2009-has-begun-to-materialize/</loc>
      <lastmod>2009-01-28T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/whats-been-on-peoples-minds-lately/</loc>
      <lastmod>2009-01-27T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/supreme-court-freedom-of-speech-and-internet-filtering/</loc>
      <lastmod>2009-01-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/conficker-continues-its-rounds-hits-9-million-mark/</loc>
      <lastmod>2009-01-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/social-networking-strikes-again/</loc>
      <lastmod>2009-01-08T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/who-owns-your-online-identity-facebook-squatters-on-the-rise/</loc>
      <lastmod>2008-12-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/christmas-shopping-online-make-sure-you-get-what-you-pay-for/</loc>
      <lastmod>2008-12-04T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/airc-threat-report-and-the-link-to-mccolo/</loc>
      <lastmod>2008-11-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hosting-provider-crackdown/</loc>
      <lastmod>2008-11-12T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/obama-leads-in-us-presidential-election-poll-the-ecrime-way/</loc>
      <lastmod>2008-10-28T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/taking-the-red-pill-down-the-rabbit-hole/</loc>
      <lastmod>2008-10-12T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/neosploit-the-rumors-of-my-demise-have-been-greatly-exaggerated/</loc>
      <lastmod>2008-09-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/blocking-legitimate-sites-in-real-time/</loc>
      <lastmod>2008-09-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/snooping-into-palin-emails-watch-out-for-the-criminals-snooping-on-you/</loc>
      <lastmod>2008-09-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/less-phish-more-meat-malweb-proving-to-be-more-efficient-than-phishing-scams/</loc>
      <lastmod>2008-09-18T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/chrome-ie8-ff3-is-there-anything-new/</loc>
      <lastmod>2008-09-14T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/crimeware-server-catering-to-%e2%80%9cgrab-and-run%e2%80%9d-criminals/</loc>
      <lastmod>2008-05-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/on-the-dismerits-of-privacy/</loc>
      <lastmod>2008-03-26T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/taking-down-a-malicious-site-the-good-the-bad-and-the-ugly/</loc>
      <lastmod>2008-03-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/optimizing-cross-site-scripting-and-general-security-practices/</loc>
      <lastmod>2008-03-16T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/crimeware-server-and-the-international-man-of-mystery/</loc>
      <lastmod>2008-02-28T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-impact-of-just-5-random-letters/</loc>
      <lastmod>2008-01-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/and-the-winner-for-top-virus-of-2007-is/</loc>
      <lastmod>2008-01-06T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/new-orkut-worm-takes-us-back-in-the-wayback-machine/</loc>
      <lastmod>2007-12-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/iframe-is-a-security-risk/</loc>
      <lastmod>2007-10-25T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/playing-with-obfuscators-teaching-an-old-dog-new-tricks/</loc>
      <lastmod>2007-10-07T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/widgetsadvertisements/</loc>
      <lastmod>2007-09-23T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/hitting-the-nail-on-the-head/</loc>
      <lastmod>2007-09-20T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/the-perils-of-running-a-security-blog/</loc>
      <lastmod>2007-08-21T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/vista-sidebar-vulnerability/</loc>
      <lastmod>2007-08-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/post-blackhat-pre-defcon/</loc>
      <lastmod>2007-08-03T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/malicious-space-on-myspace/</loc>
      <lastmod>2007-06-21T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/have-something-to-hide-make-a-lot-of-noise-about-it/</loc>
      <lastmod>2007-06-19T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/malicious-code-exploit-vectors-or-top-programmer-job/</loc>
      <lastmod>2007-05-31T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/googles-ghost-in-a-browser-websense-and-more/</loc>
      <lastmod>2007-05-17T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/tying-it-all-up-explosive-exploits/</loc>
      <lastmod>2007-03-22T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  
    <url>
      <loc>https://iamit.org/blog/analyzing-an-ajax-attack-vector-in-the-wild/</loc>
      <lastmod>2007-03-15T00:00:00+00:00</lastmod>
      <changefreq>weekly</changefreq>
      <priority>1.0</priority>
    </url>
  

</urlset>