﻿<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://craftedcybersolutions.com/</loc>
    <lastmod>2026-04-12</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/ai-chat-shield.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/consent.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/disclosure-policy.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/labs.html</loc>
    <lastmod>2026-04-12</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/penetration-testing.html</loc>
    <lastmod>2026-04-12</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/phishing-analyzer.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/privacy.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/pro-success.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/products.html</loc>
    <lastmod>2026-04-12</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/security-scorecard.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/security-tool.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/terms.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/tools.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/agentic-ai-identity-management.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/agent-trust-stack.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-agent-mcp-attack-surface.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-chat-privacy.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-governance-2026.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-security-checklist.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-security-gap-2026.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ai-social-engineering.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/api-security-ai-agents.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/browser-extension-risks.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/building-security-culture.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/chrome-extension-security.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/cloud-misconfiguration-audit.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/compliance-framework-mappings.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/container-security-docker.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/credential-theft-identity-attacks.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/cyber-insurance-guide.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/cybersecurity-board-reporting.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/cybersecurity-year-review-2025.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/data-classification-guide.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/deepfake-detection-business.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/dns-security-overlooked.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/eas-onchain-trust.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/hidden-cost-free-software.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/holiday-phishing-kit-anatomy.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/incident-response-plan-small-business.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/index.html</loc>
    <lastmod>2026-04-12</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/iot-security-small-office.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/malicious-extensions-technical-breakdown.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/mcp-trust-scoring.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/mfa-bypass-attacks.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/network-segmentation-guide.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/nist-ai-agent-identity.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/oauth-misconfigurations.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/passkeys-replacing-passwords.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/penetration-testing-guide.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/prompt-injection-attacks.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/ransomware-defense-playbook.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/sbom-software-bill-of-materials.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/secure-coding-practices.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/security-assessment-guide.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/security-scorecard-explained.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/shadow-ai-risk.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/small-business-cyber-targets.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/state-of-mcp-security-2026.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/supply-chain-attacks.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/tabletop-exercise-guide.html</loc>
    <lastmod>2026-04-11</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/threat-modeling-guide.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/touchstone-cve-research.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/vendor-risk-assessment-guide.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/x402-agent-micropayments.html</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/blog/zero-trust-explained.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://craftedcybersolutions.com/demos/index.html</loc>
    <lastmod>2026-03-31</lastmod>
    <priority>0.5</priority>
  </url>
</urlset>

