<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 9:26 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://blog.blackswansecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Black Swan Security</title>
		<link><![CDATA[https://blog.blackswansecurity.com]]></link>
		<description><![CDATA[Black Swan Security]]></description>
		<lastBuildDate><![CDATA[Sun, 06 Nov 2022 16:54:23 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://blog.blackswansecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/about/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Sun, 06 Nov 2022 16:54:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/security-principles-maxims/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/security-principles-maxims/]]></link>
			<title>Security Principles &#038; Maxims</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/security-debt/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/security-debt/]]></link>
			<title>Security Debt</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/security-elevator-advice/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/security-elevator-advice/]]></link>
			<title>Top 10 Points &#8211; Security Elevator Advice</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/questions-about-security-the-board-care-about/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/questions-about-security-the-board-care-about/]]></link>
			<title>6 Questions about security the board care about</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/user-sourced-security-monitoring/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/user-sourced-security-monitoring/]]></link>
			<title>User-Sourced Security Monitoring</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/04/infosec-london-bsideslondon-dc4420-a-busy-few-days/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/04/infosec-london-bsideslondon-dc4420-a-busy-few-days/]]></link>
			<title>Infosec London, BsidesLondon &#038; DC4420 &#8211; A busy few days</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/06/cyber-cyber-cyber/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/06/cyber-cyber-cyber/]]></link>
			<title>Cyber Cyber Cyber</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/01/security-defect-triage-in-delivery-projects/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/01/security-defect-triage-in-delivery-projects/]]></link>
			<title>Security defect triage in delivery projects</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/09/44con-and-uncon/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/09/44con-and-uncon/]]></link>
			<title>44con and Uncon</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/06/cyberwar-what-is-it-good-for-absoutely-nothing/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/06/cyberwar-what-is-it-good-for-absoutely-nothing/]]></link>
			<title>Cyberwar what is it good for? Absoutely nothing?</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/06/zones-of-trust/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/06/zones-of-trust/]]></link>
			<title>Zones of Trust</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/05/how-to-develop-a-security-test-strategy-part-three/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/05/how-to-develop-a-security-test-strategy-part-three/]]></link>
			<title>How to develop a security test strategy, part three</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/05/how-to-develop-a-security-test-strategy-two/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/05/how-to-develop-a-security-test-strategy-two/]]></link>
			<title>How to develop a security test strategy, part two</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/05/security-test-strategy-one/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/05/security-test-strategy-one/]]></link>
			<title>How to develop a security test strategy, part one</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2011/05/what-i-need-from-pen-test-reports/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2011/05/what-i-need-from-pen-test-reports/]]></link>
			<title>What I need from pen test reports.</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/02/security_and_systems_engineering/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/02/security_and_systems_engineering/]]></link>
			<title>Security and Systems Engineering</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/03/documenting-an-as-is-security-architecture-part-one/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/03/documenting-an-as-is-security-architecture-part-one/]]></link>
			<title>Documenting an As-Is Security Architecture, part one</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/03/documenting-an-as-is-security-architecture-part-two/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/03/documenting-an-as-is-security-architecture-part-two/]]></link>
			<title>Documenting an As-Is Security Architecture, part two</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/03/orgcon-2012/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/03/orgcon-2012/]]></link>
			<title>ORGCon 2012</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/05/making-sense-of-pentesting-part-one/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/05/making-sense-of-pentesting-part-one/]]></link>
			<title>Making sense of pen testing, part one</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/05/making-sense-of-pen-testing-part-two/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/05/making-sense-of-pen-testing-part-two/]]></link>
			<title>Making sense of pen testing, part two</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2012/07/alignment-vs-compliance-vs-certification/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2012/07/alignment-vs-compliance-vs-certification/]]></link>
			<title>Alignment vs Compliance vs Certification</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:50:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/04/cybers-dirty-secret/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/04/cybers-dirty-secret/]]></link>
			<title>Cyber&#8217;s Dirty Secret?</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2014/04/pianos/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2014/04/pianos/]]></link>
			<title>Protecting Information About Networks, The Organisation and Its Systems</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2014/03/big-data-security-analytics-paper/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2014/03/big-data-security-analytics-paper/]]></link>
			<title>Big Data Security Analytics Paper</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/12/cross-domain-gateway-functions/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/12/cross-domain-gateway-functions/]]></link>
			<title>Cross-Domain Gateway Functions</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/11/cyber-exercising/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/11/cyber-exercising/]]></link>
			<title>Cyber Exercising</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/10/blueprint-for-security-in-2013/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/10/blueprint-for-security-in-2013/]]></link>
			<title>Blueprint for Security in 2013</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/07/supply-chain-cyber-security/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/07/supply-chain-cyber-security/]]></link>
			<title>Business Partner and Supply Chain Cyber Security</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2013/11/follow-the-money/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2013/11/follow-the-money/]]></link>
			<title>Follow the Money</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/05/competing-innovations-in-cyber/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/05/competing-innovations-in-cyber/]]></link>
			<title>Competing Innovations in Cyber</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/10/resilience-is-the-new-cyber-security/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/10/resilience-is-the-new-cyber-security/]]></link>
			<title>Resilience is the new cyber security</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/10/cyber-resilience-managing-cyber-shocks/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/10/cyber-resilience-managing-cyber-shocks/]]></link>
			<title>Cyber Resilience: Managing Cyber Shocks</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/07/managing-insider-risk/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/07/managing-insider-risk/]]></link>
			<title>Managing Insider Risk</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/07/keynote-cyber-resilience/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/07/keynote-cyber-resilience/]]></link>
			<title>ICI Global Cybersecurity Forum 2015 Keynote: Cyber Resilience</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/06/20-questions-on-cyber-supply-chain-risk-management/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/06/20-questions-on-cyber-supply-chain-risk-management/]]></link>
			<title>20 questions on cyber-supply chain risk management</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/05/pitfalls_cyber_data/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/05/pitfalls_cyber_data/]]></link>
			<title>Pitfalls of Cyber Data</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/04/we-need-to-talk-about-it/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/04/we-need-to-talk-about-it/]]></link>
			<title>We need to talk about IT</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/03/misinterpreted-policy/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/03/misinterpreted-policy/]]></link>
			<title>Misinterpreted policy?</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/01/security-analytics-beyond-cyber/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/01/security-analytics-beyond-cyber/]]></link>
			<title>Security Analytics Beyond Cyber</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2014/12/security-analysis-for-humans/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2014/12/security-analysis-for-humans/]]></link>
			<title>Security Analysis for Humans</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/02/part-three-what-is-cyber-resilience/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/02/part-three-what-is-cyber-resilience/]]></link>
			<title>Cyber Resilience: Part Three What is Cyber Resilience?</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/02/cyber-resilience-part-two-resistance/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/02/cyber-resilience-part-two-resistance/]]></link>
			<title>Cyber Resilience: Part Two Resistance</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/02/cyber-resilience-part-one-introduction/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/02/cyber-resilience-part-one-introduction/]]></link>
			<title>Cyber Resilience: Part One Introduction</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/01/soc-value-chain-delivery-models/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/01/soc-value-chain-delivery-models/]]></link>
			<title>SOC Value Chain &#038; Delivery Models</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/01/secops_and_ooda_loop/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/01/secops_and_ooda_loop/]]></link>
			<title>Security Operations and the OODA Loop</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2016/01/a-rising-tide-of-cyber-regulation/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2016/01/a-rising-tide-of-cyber-regulation/]]></link>
			<title>A Rising Tide of Cyber Regulation?</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/10/board-of-cyber/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/10/board-of-cyber/]]></link>
			<title>Board of Cyber</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.blackswansecurity.com/2015/11/measuring-black-boxes-part-one/]]></guid>
			<link><![CDATA[https://blog.blackswansecurity.com/2015/11/measuring-black-boxes-part-one/]]></link>
			<title>Measuring Black Boxes, part one</title>
			<pubDate><![CDATA[Fri, 01 Apr 2022 18:49:05 +0000]]></pubDate>
		</item>
				</channel>
</rss>
