<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//digility.net/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://digility.net/insights/</loc>
		<lastmod>2025-10-06T13:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-2-assets-risks/</loc>
		<lastmod>2024-03-25T10:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Assets.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Security-Principles.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-4-devices/</loc>
		<lastmod>2024-03-25T10:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Devices.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/PersonMachineTrust-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/ComplexMachine.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/Classifications-of-Device-Trust.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/BYOD.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/iStock-1272564863.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/ai-risk/</loc>
		<lastmod>2024-04-12T10:59:08+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/04/AI-and-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/getting-control-of-the-permissions-you-are-you-granting-some-third-party-apps-when-you-sign-in-with-microsoft-or-google/</loc>
		<lastmod>2024-06-20T09:09:50+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/iStock-1478452095.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/OAuth-Permissions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/big-tech-weakens-email-security/</loc>
		<lastmod>2024-07-11T08:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/05/AdobeStock_729302913.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/browser-extension-trust-and-risk/</loc>
		<lastmod>2024-07-11T13:42:42+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/07/AdobeStock_599424868.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/07/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/07/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/CartoonStock_600480_CC22230.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/07/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/security_as_an_optional_extra/</loc>
		<lastmod>2024-07-17T08:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/03/BoeingVsSaaS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/secure_by_design/</loc>
		<lastmod>2024-11-15T11:22:33+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/03/SecureByDesign.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/how-to-protect-the-digital-achilles-heel-of-military-capability/</loc>
		<lastmod>2024-11-26T10:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/08/AdobeStock_811243504.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/does-ai-appreciate-its-own-ignorance/</loc>
		<lastmod>2024-12-18T10:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/12/AI-comparison-with-Human.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/uk_guidance_on_saas_residency/</loc>
		<lastmod>2025-02-08T15:06:34+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/02/20250207-HMG-Guidance-on-SaaS-Regioning-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-5-environments/</loc>
		<lastmod>2025-04-01T09:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/7c2dd85e-b1e8-483d-bc10-5252498db24e.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/03/SharedResponsibilityModel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-3-people/</loc>
		<lastmod>2025-04-01T12:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/iStock-1173458627.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Factors-Affecting-People-Trust-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Case-for-Security-Vetting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/CartoonStock_600480_CC22230-884x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/02/Classifications-of-People-Trust-1-1024x825.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/what-drives-your-organisations-cyber-security/</loc>
		<lastmod>2025-04-15T14:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/04/CyberStrategyApproaches-v1_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/5-questions-for-smes/</loc>
		<lastmod>2025-04-23T11:45:58+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/04/Small-Business-on-Digital-Landscape-one-under-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/04/Asset-List-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/03/SharedResponsibilityModel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/safe_and_successful_ai_adoption/</loc>
		<lastmod>2025-05-27T08:49:15+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/05/AI_Opportunity_Refiner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/building_successful_socs/</loc>
		<lastmod>2025-08-18T10:27:16+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/08/AdobeStock_1442470501.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/08/SecurityOperationsExcellence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/08/SecurityOperationsExcellence-Sourcing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-6-other-systems/</loc>
		<lastmod>2025-08-26T14:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/07/AdobeStock_1130638929.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/05/SsoPermissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/05/ExtensionPermissions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/when-should-a-startup-start-doing-security/</loc>
		<lastmod>2025-09-24T11:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2025/09/Business-Collage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://digility.net/cs4nsp-episode-1-introduction/</loc>
		<lastmod>2025-10-06T13:03:46+00:00</lastmod>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/Simplify.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://digility.net/wp-content/uploads/2024/01/CSFNSP-Model-v2_4-ClearBack-2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->