<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://tkonsecurity.com/2024/06/06/cto-lets-gooooooooooo/</loc><lastmod>2024-06-06T12:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2024/02/27/the-growth-algorithm-go-to-failure/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2024/02/img_tk-smile.jpg</image:loc><image:title>img_tk-smile</image:title></image:image><lastmod>2024-03-03T18:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2024/02/02/tks-infographic-design-method-playing-jeopardy-with-infographics/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2024/02/picture02.png</image:loc><image:title>picture02</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2024/02/picture01.png</image:loc><image:title>picture01</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2024/02/picture00.png</image:loc><image:title>picture00</image:title></image:image><lastmod>2024-02-02T00:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2024/01/17/blog-beyond-a-zero-trust-mindset/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2024/01/weakest-link.jpg</image:loc><image:title>weakest-link</image:title></image:image><lastmod>2024-01-17T22:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2021/01/11/covid-19-as-code/</loc><lastmod>2021-01-19T14:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2018/03/19/interview-on-encrypted-traffic-analytics-melbourne-cisco-live/</loc><lastmod>2018-03-19T00:48:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2014/04/09/heartbleed-back-in-1992/</loc><lastmod>2014-04-09T15:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/10/08/sdn-reality/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/10/sdnfunny.jpg</image:loc><image:title>SDNfunny</image:title></image:image><lastmod>2013-10-08T18:33:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/08/28/17-security-related-phrases-we-are-sick-of-hearing/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/shutthefuckup1.gif</image:loc><image:title>shutthefuckup</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/hatemylife.gif</image:loc><image:title>hatemylife</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/fallonbed.gif</image:loc><image:title>fallonbed</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyes-sideways.gif</image:loc><image:title>eyes-sideways</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll7.gif</image:loc><image:title>eyeroll7</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll06.gif</image:loc><image:title>eyeroll06</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll05.gif</image:loc><image:title>eyeroll05</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll4.gif</image:loc><image:title>eyeroll4</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll3.gif</image:loc><image:title>eyeroll3</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/eyeroll2.gif</image:loc><image:title>eyeroll2</image:title></image:image><lastmod>2013-08-28T16:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/08/26/accounting-for-the-uncountable/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/albert-einstein-gives-a-l-008.jpg</image:loc><image:title>Albert Einstein Gives a Lecture</image:title></image:image><lastmod>2013-08-27T02:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/08/13/standards/</loc><lastmod>2013-08-13T17:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/04/16/and-so-it-begins/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/headphone-head.jpg</image:loc><image:title>headphone-head</image:title></image:image><lastmod>2013-08-13T16:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/05/07/happy-change-your-password-day/</loc><lastmod>2013-08-13T16:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/05/15/the-endangered-undo-option/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/05/undo-button.jpg</image:loc><image:title>undo-button</image:title></image:image><lastmod>2013-08-13T16:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/07/10/time-to-get-security-fit/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/07/citysecuritysummer2013_tripwire.jpg</image:loc><image:title>CitySecuritySummer2013_Tripwire</image:title></image:image><lastmod>2013-08-13T16:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/07/18/byod-bring-your-own-dissonance/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/07/iponeverything.gif</image:loc><image:title>IPonEverything</image:title></image:image><lastmod>2013-08-13T16:27:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/04/24/hey-dell-your-vending-machine-is-broken/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/broken_vending_machine_126.jpg</image:loc><image:title>broken_vending_machine_126</image:title></image:image><lastmod>2013-08-13T16:26:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/07/18/the-death-of-the-physical-space/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/07/info-space.jpg</image:loc><image:title>info-space</image:title></image:image><lastmod>2013-08-13T16:26:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/08/09/the-spy-who-loved-me-be-tracked-and-earn-points/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/08/loyalty-programs-customer-experience.jpg</image:loc><image:title>loyalty-programs-customer-experience</image:title></image:image><lastmod>2013-08-13T16:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/05/24/go-to-file-select-3d-print/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/05/3dprint.jpg</image:loc><image:title>3dprint</image:title></image:image><lastmod>2013-05-24T15:55:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/05/20/spartan-sprint-race-notes/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/05/spartan-sprint-shaka.jpg</image:loc><image:title>spartan-sprint-shaka</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/05/spartan-red.jpg</image:loc><image:title>spartan-red</image:title></image:image><lastmod>2013-05-31T11:11:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/04/23/i-t-phone-home/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/old_mobile.jpg</image:loc><image:title>old_mobile</image:title></image:image><lastmod>2013-04-23T15:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/2013/04/17/crime-report-as-marketing/</loc><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/crime-bar.png</image:loc><image:title>crime-bar</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/crime-map.png</image:loc><image:title>crime-map</image:title></image:image><image:image><image:loc>https://tkonsecurity.com/wp-content/uploads/2013/04/crimebar.png</image:loc><image:title>crimebar</image:title></image:image><lastmod>2013-04-23T01:32:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tkonsecurity.com/about/</loc><lastmod>2013-04-16T20:24:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tkonsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-06-06T12:51:37+00:00</lastmod></url></urlset>
