<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.rockcybermusings.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://www.rockcybermusings.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260327-20260402</loc><lastmod>2026-04-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-monitoring-standards-gap-nist-ai-800-4</loc><lastmod>2026-03-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260320-20260326</loc><lastmod>2026-03-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260313-20260319</loc><lastmod>2026-03-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/i-agent-authentication-authorization-gap</loc><lastmod>2026-03-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260306-202600312</loc><lastmod>2026-03-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-vendor-lock-in-pentagon-anthropic-ciso-lesson</loc><lastmod>2026-03-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260227-202600305</loc><lastmod>2026-03-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/agentic-ai-authorization-z-shaped-security</loc><lastmod>2026-03-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260220-20260226</loc><lastmod>2026-02-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/agentic-ai-governance-singapore-framework-gaps</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260213-20260219</loc><lastmod>2026-02-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/llm-data-leakage-training-vs-inference-risk</loc><lastmod>2026-02-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260206-20260212</loc><lastmod>2026-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/behold-zerg-parallel-claude-code-orchestration</loc><lastmod>2026-02-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260130-20260205</loc><lastmod>2026-02-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-ai-standards-framework-ignores-attackers</loc><lastmod>2026-02-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260123-20260129</loc><lastmod>2026-01-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/claude-constitution-security-risks-ciso-guide</loc><lastmod>2026-01-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260116-20260122</loc><lastmod>2026-01-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-ai-agent-rfi-2025-0035-human-oversight-wrong-fix</loc><lastmod>2026-01-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260109-20260115</loc><lastmod>2026-01-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-attacker-advantage-is-a-myth</loc><lastmod>2026-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20260102-20260108</loc><lastmod>2026-01-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-ir-8587-token-security-guidance</loc><lastmod>2026-01-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251219-20260101</loc><lastmod>2026-01-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-new-cyber-ai-profile-a-solid-foundation</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-ir-8286r1-cyber-risk-erm</loc><lastmod>2025-12-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251212-20251218</loc><lastmod>2025-12-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/white-house-issues-executive-order</loc><lastmod>2025-12-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251205-20251211</loc><lastmod>2025-12-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/owasp-top-10-agentic-applications-security-guide</loc><lastmod>2025-12-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/react2shell-cve-2025-55182-lessons-hunting</loc><lastmod>2025-12-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251121-20251204</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/claude-secure-coding-rules-open-source-ai-security</loc><lastmod>2025-12-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/gtg-1002-first-ai-orchestrated-cyber-espionage-analysis</loc><lastmod>2025-11-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251114-20251120</loc><lastmod>2025-11-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/the-context-window-trap-why-1m-tokens</loc><lastmod>2025-11-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-867</loc><lastmod>2025-11-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/prompt-engineering-is-over-context-engineering-is-the-new-skill</loc><lastmod>2025-11-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251031-20251106</loc><lastmod>2025-11-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/aagate-governing-the-ungovernable-operationalizing-nist-ai-rmf-agentic-ai</loc><lastmod>2025-11-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/tokentally-open-source-llm-cost-calculator-ai-startups</loc><lastmod>2025-11-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251024-20251030</loc><lastmod>2025-10-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/stop-agent-eval-theater-aisi-transcript-analysis</loc><lastmod>2025-10-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251011-20251023</loc><lastmod>2025-10-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251010-20251016</loc><lastmod>2025-10-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-supply-chain-security-that-stands</loc><lastmod>2025-10-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/mcp-security-locking-down-agents</loc><lastmod>2025-10-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20251003-20251009</loc><lastmod>2025-10-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-agent-risk-for-boards-a-90-day</loc><lastmod>2025-10-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250926-20251002</loc><lastmod>2025-10-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-budget-is-broken-a-90day-realignment</loc><lastmod>2025-09-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-580</loc><lastmod>2025-09-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/what-you-need-to-know-about-the-colorado</loc><lastmod>2025-09-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/shadow-ai-attack-paths-oauth-prompt-injection-30-60-90</loc><lastmod>2025-09-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250912-20250918</loc><lastmod>2025-09-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/iso-42001-vs-care-fast-tracking-ai</loc><lastmod>2025-09-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20050905-20200911</loc><lastmod>2025-09-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/vibe-codings-hidden-bill-security</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250829-20250904</loc><lastmod>2025-09-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/nist-csf-20-mcp-server-shipping-an</loc><lastmod>2025-09-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250822-20250828</loc><lastmod>2025-08-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/integrated-ai-strategy-and-governance</loc><lastmod>2025-08-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250815-20250811</loc><lastmod>2025-08-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/filtered-training-data-open-weight-ai-safety</loc><lastmod>2025-08-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250808-20250814</loc><lastmod>2025-08-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-chip-security-trust-without-kill-switches</loc><lastmod>2025-08-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-6ef</loc><lastmod>2025-08-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/what-im-looking-forward-to-this-week</loc><lastmod>2025-08-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250725-20250731</loc><lastmod>2025-08-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/securing-agentic-applications-the</loc><lastmod>2025-07-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-security-baseline-etsi-ts-104-223</loc><lastmod>2025-07-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-issue3</loc><lastmod>2025-07-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/americas-ai-action-plan</loc><lastmod>2025-07-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/traiga-compliance-countdown-texas</loc><lastmod>2025-07-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security-20250710-20250717</loc><lastmod>2025-07-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/eu-ai-act-compliance-enterprise-sprint</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/weekly-musings-top-10-ai-security</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/stop-chasing-ghost-jobs</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/ai-strategy-doomed-to-fail-why-80</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/navigating-the-triad-how-rise-and-care-frameworks-transform-ai-strategy-and-governance-32a6de8adca3</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/the-interdependent-triad-of-ai-cybersecurity-and-business-enablement-e54d9f58406f</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/unlocking-ai-potential-how-effective-leadership-drives-strategic-success-384aca4fe8e9</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/aligning-ai-strategy-with-business-goals-bridging-the-gap-between-innovation-and-value-b2a5e3eca6eb</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/reports-on-risk-culture-and-performance-0fb36594d182</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/information-communication-and-reporting-a092207648d0</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/leverages-information-and-technology-15214e342110</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/reviewing-risk-and-performance-126fab6814ee</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/assessing-substantial-change-7a11015589f0</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/watch-the-game-film-review-and-revision-rockcyber-adc48c2b9876</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/developing-a-portfolio-view-a822fc4e4195</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/implementing-risk-responses-e5be89792d07</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/prioritizing-risk-b9964a43ecd8</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/assessing-the-severity-of-risk-280706e84e00</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/identifying-risk-rockcyber-cef439430cf6</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/its-finally-time-to-perform-f3e787c418b7</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/be-smart-and-make-your-cybersecurity-risk-management-program-actionable-3c222168daab</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/communicating-risk-information-c725125f4bb7</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/strategy-frameworks-and-more-frameworks-rockcyber-bd62ddf6c20a</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/how-hungry-are-you-for-risk-5cc2e3ea0b20</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/the-only-constant-is-change-can-you-keep-up-5c0203853b26</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/the-cybersecurity-talent-shortage-is-bs-259465e09f6b</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/culture-and-commitment-b84748fdae66</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/cybersecurity-by-committee-bbe89289f83e</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/the-board-cyber-risk-oversight-problem-851f7f9888dc</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/dont-be-that-ciso-c9408c12962b</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/lets-talk-about-risk-17c5742a13d6</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.rockcybermusings.com/p/introducing-rise-and-care-a-new-era-in-ai-strategy-and-governance-rockcyber-87093e56fc83</loc><lastmod>2025-07-14</lastmod><changefreq>monthly</changefreq></url></urlset>