<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//tharnzie.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://tharnzie.com/</loc>
		<lastmod>2026-05-08T12:03:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://tharnzie.com/best-methods-for-decrypting-ssl-tls-traffic-for-security-inspections/</loc>
		<lastmod>2026-03-04T18:33:05+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105044-8d4c77d7-best-methods-for-decrypting-ssl-tls-traffic-for-security-inspections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-secure-s3-buckets-against-public-exposure-leaks/</loc>
		<lastmod>2026-03-07T17:23:03+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105071-7f05f0d2-how-to-secure-s3-buckets-against-public-exposure-leaks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/step-by-step-guide-to-investigating-lateral-movement-using-wireshark/</loc>
		<lastmod>2026-03-12T21:05:59+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105038-fd818517-step-by-step-guide-to-investigating-lateral-movement-using-wireshark.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-fix-false-positive-alert-fatigue-in-soc-operations/</loc>
		<lastmod>2026-03-16T23:51:37+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105050-3be981a8-how-to-fix-false-positive-alert-fatigue-in-soc-operations.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/step-by-step-guide-to-memory-forensics-for-detecting-fileless-malware/</loc>
		<lastmod>2026-03-17T05:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105053-4f2ba403-step-by-step-guide-to-memory-forensics-for-detecting-fileless-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/best-tools-for-real-time-monitoring-of-multi-cloud-infrastructure-security/</loc>
		<lastmod>2026-03-25T15:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105065-03f0f8d0-best-tools-for-real-time-monitoring-of-multi-cloud-infrastructure-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/resolving-bottlenecks-in-large-scale-packet-capture-and-storage/</loc>
		<lastmod>2026-03-28T17:48:13+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105110-4a53344c-resolving-bottlenecks-in-large-scale-packet-capture-and-storage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-identify-dns-tunneling-attempts-in-enterprise-networks/</loc>
		<lastmod>2026-04-04T07:28:34+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105113-623e9e54-how-to-identify-dns-tunneling-attempts-in-enterprise-networks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-implement-just-in-time-jit-access-for-cloud-administrative-tasks/</loc>
		<lastmod>2026-04-08T13:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105062-792593fe-how-to-implement-just-in-time-jit-access-for-cloud-administrative-tasks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/best-practices-for-hardening-windows-endpoints-against-credential-dumping/</loc>
		<lastmod>2026-04-12T10:44:57+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105119-ab0fa8a6-best-practices-for-hardening-windows-endpoints-against-credential-dumping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-configure-custom-edr-rules-to-block-zero-day-ransomware/</loc>
		<lastmod>2026-04-14T05:22:22+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105116-1efba58f-how-to-configure-custom-edr-rules-to-block-zero-day-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/resolving-misconfiguration-errors-in-serverless-function-security-policies/</loc>
		<lastmod>2026-04-26T19:17:24+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105068-af588e52-resolving-misconfiguration-errors-in-serverless-function-security-policies.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/comparing-signature-based-vs-behavioral-detection-in-modern-antivirus/</loc>
		<lastmod>2026-05-04T00:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105056-4da163fe-comparing-signature-based-vs-behavioral-detection-in-modern-antivirus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/step-by-step-guide-to-auditing-identity-and-access-management-iam-roles/</loc>
		<lastmod>2026-05-05T21:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105059-62dc2fb7-step-by-step-guide-to-auditing-identity-and-access-management-iam-roles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tharnzie.com/how-to-detect-beaconing-patterns-in-encrypted-https-traffic/</loc>
		<lastmod>2026-05-08T12:03:49+00:00</lastmod>
		<image:image>
			<image:loc>https://tharnzie.com/wp-content/uploads/2026/05/105107-1c064f7b-how-to-detect-beaconing-patterns-in-encrypted-https-traffic.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->