<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/css" href="https://static.getpodpage.com/public/css/xml_stylesheet.47dff0f81931.css"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
<url><loc>https://www.vulnwise.com/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/vulnerabilities-ai-and-the-human-factor-with-dr-nikki-robinson/</loc><lastmod>2025-05-19</lastmod></url><url><loc>https://www.vulnwise.com/vulnwise-s1e6-into-the-minds-of-cisos-analysts-and-vm-practitioners-with-jon-oltsik/</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.vulnwise.com/vulnwise-s1e5-vulnerability-and-exposure-management-with-johnny-shaieb/</loc><lastmod>2025-04-04</lastmod></url><url><loc>https://www.vulnwise.com/patching-and-bug-bounty-programs-with-rishika-hooda/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/the-intersection-of-threat-and-vulnerability-intelligence-with-eli-woodward/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/vulnwise-compensating-controls-in-vulnerability-management-with-caleb-hoch/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/mastering-ctem-from-vulnerability-management-to-exposure-management-with-chris-peltz/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/technology/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/categories/ctem/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/vulnerability-management/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/bug-bounty/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/penetration-testing/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/cyber-risk-quantification/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/people/steve-carter/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/people/scott-kuffer/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/follow/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/episodes/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/reviews/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/contact/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/about/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/videos/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e7-vulnerabilities-ai-and-the-human-factor-with-dr-nikki-robinson/</loc><lastmod>2025-05-13</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e6-into-the-minds-of-cisos-analysts-and-vm-practitioners-with-jon-oltsik/</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-vulnerability-management-goes-beyond-technology/</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-arpanets-buffer-overflow/</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-cisos-understand-the-battlefield/</loc><lastmod>2025-04-15</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-how-does-it-compare-to-vulnerability-management/</loc><lastmod>2025-04-14</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e5-vulnerability-and-exposure-management-with-johnny-shaieb/</loc><lastmod>2025-04-14</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-how-to-define-your-first-scope/</loc><lastmod>2025-04-14</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-evolution-of-vulnerability-management-in-cybersecurity/</loc><lastmod>2025-04-14</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnerability-prioritization-hybrid-approach-to-beat-qualitative-or-quantitative-alone/</loc><lastmod>2025-04-14</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-advice-on-vulnerability-management-from-the-head-of-android-vm/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-patching-challenges-for-the-android-ecosystem/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-androids-bug-bounty-rewards-recognition-program/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-tips-from-androids-head-of-vm-you-cant-use-a-one-size-fits-all-approach/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-androids-vulnerability-prioritization/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e4-patching-and-bug-bounty-programs-with-rishika-hooda/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/cybersecurity-how-do-attackers-really-gain-initial-access-podcast-cloudsecuritypodcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/what-is-threat-intelligence-and-why-no-one-can-agree-on-it-podcast-cloudsecuritypodcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/the-1-mindset-for-cybersecurity-pros-stay-humble-stay-learning-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/threat-intelligence-vs-vulnerability-intelligence-whats-the-difference-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/the-hidden-bias-in-cyber-insurance-why-were-not-learning-from-breaches/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e3-the-intersection-of-threat-and-vulnerability-intelligence-with-eli-woodward/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/are-compensating-controls-enough-for-security-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/compensating-controls-when-to-use-them-in-vm-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/compensating-controls-do-you-actually-need-that-patch-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/the-cost-of-security-finding-the-right-balance-podcast-exposuremanagement/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/phishing-tests-are-they-actually-making-your-team-more-secure-vulnwise-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e2-unlocking-the-power-of-compensating-controls-with-caleb-hoch/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-going-beyond-network-security-scanning-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-what-is-a-scope-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-mission-critical-priorities/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-how-to-communicate-business-value-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/ctem-beyond-magic-quadrants-prioritizing-security-podcast/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/videos/vulnwise-s1e1-mastering-ctem-from-vulnerability-management-to-exposure-management/</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.vulnwise.com/rate/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/categories/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/podroll/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/newsletter/</loc><lastmod>2025-04-01</lastmod></url><url><loc>https://www.vulnwise.com/voicemail/popup/</loc><lastmod>2025-04-01</lastmod></url>
</urlset>
