<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 6:26 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.securityskeptic.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Security Skeptic</title>
		<link><![CDATA[https://www.securityskeptic.com]]></link>
		<description><![CDATA[The Security Skeptic]]></description>
		<lastBuildDate><![CDATA[Tue, 04 Nov 2025 01:59:53 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.securityskeptic.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.securityskeptic.com/manage-your-dns-portfolio/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/manage-your-dns-portfolio/]]></link>
			<title>Manage your DNS Portfolio</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 01:59:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 19:26:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/firewall-best-practices-egress-traffic-filtering/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/firewall-best-practices-egress-traffic-filtering/]]></link>
			<title>Firewall Best Practices &#8211; Egress Traffic Filtering</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 00:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/blog/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Thu, 22 Jan 2026 00:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/ethical-hacking-could-be-so-much-more-than-an-oxymoron/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/ethical-hacking-could-be-so-much-more-than-an-oxymoron/]]></link>
			<title>Ethical Hacking could be so much 
more than an oxymoron</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 20:47:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/take-stock-of-endpoint-and-admission-control-now/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/take-stock-of-endpoint-and-admission-control-now/]]></link>
			<title>Take Stock of Endpoint and Admission Control Now</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 19:57:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/endpoint-security-and-admission-control-necessary-but-not-sufficient/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/endpoint-security-and-admission-control-necessary-but-not-sufficient/]]></link>
			<title>Endpoint security and admission control: 
necessary but not sufficient</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 15:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/powerline-ethernet-when-wifi-wont-and-cat-5-cant/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/powerline-ethernet-when-wifi-wont-and-cat-5-cant/]]></link>
			<title>Powerline Ethernet: When WiFi won&#8217;t and CAT-5 Can&#8217;t</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 15:28:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/legislation-wont-stop-the-spyware-juggernaut/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/legislation-wont-stop-the-spyware-juggernaut/]]></link>
			<title>Legislation Won&#8217;t Stop the Spyware Juggernaut</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 15:19:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/care-and-handling-of-credit-and-personal-information/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/care-and-handling-of-credit-and-personal-information/]]></link>
			<title>Care and Handling of Credit and Personal Information</title>
			<pubDate><![CDATA[Sun, 30 Nov 2025 15:16:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/whats-the-difference-between-spyware-and-viruses/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/whats-the-difference-between-spyware-and-viruses/]]></link>
			<title>What&#8217;s The Difference Between Spyware And Viruses?</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 19:22:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/is-security-freeware-more-or-less-than-you-pay-for/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/is-security-freeware-more-or-less-than-you-pay-for/]]></link>
			<title>Is security freeware more or less than you pay for?</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 19:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/redirection-and-synthesized-dns-responses-do-more-harm-than-good/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/redirection-and-synthesized-dns-responses-do-more-harm-than-good/]]></link>
			<title>Redirection and Synthesized DNS responses 
do more harm than good</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:57:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/web-application-code-is-part-of-your-security-perimeter/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/web-application-code-is-part-of-your-security-perimeter/]]></link>
			<title>Web Application Code is Part 
of Your Security Perimeter</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:49:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/how-to-protect-yourself-against-domain-name-hijackers/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/how-to-protect-yourself-against-domain-name-hijackers/]]></link>
			<title>How To Protect Yourself Against 
Domain Name Hijackers</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:47:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/the-re-emergence-of-ssl-vpns/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/the-re-emergence-of-ssl-vpns/]]></link>
			<title>The Re-emergence of SSL VPNs</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:31:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/antispyware-and-av-software-ought-to-be-the-sameware/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/antispyware-and-av-software-ought-to-be-the-sameware/]]></link>
			<title>Antispyware and AV software 
ought to be the sameware</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:29:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/spyware-is-a-nightmare/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/spyware-is-a-nightmare/]]></link>
			<title>Spyware is a Nightmare</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 23:27:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/understanding-voip-security/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/understanding-voip-security/]]></link>
			<title>Understanding VOIP Security</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 22:58:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/ids-and-ddos-protection-better-days-ahead/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/ids-and-ddos-protection-better-days-ahead/]]></link>
			<title>IDS and DDOS Protection &#8211; Better Days Ahead</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 22:53:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/defensive-social-networking/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/defensive-social-networking/]]></link>
			<title>Defensive Social Networking</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 20:53:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/phlavors-of-phishing/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/phlavors-of-phishing/]]></link>
			<title>Phlavors of Phishing</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 20:36:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/blog-2010-2014/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/blog-2010-2014/]]></link>
			<title>Blog 2010 &#8211; 2014</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 20:08:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/blog-2015-2019/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/blog-2015-2019/]]></link>
			<title>Blog (2015-2019)</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 20:07:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/the-silence-of-the-atm-lans/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/the-silence-of-the-atm-lans/]]></link>
			<title>The Silence of the ATM LANs</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 22:23:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/managing-the-technology-hype-cycle/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/managing-the-technology-hype-cycle/]]></link>
			<title>Managing the Technology Hype Cycle</title>
			<pubDate><![CDATA[Sat, 22 Nov 2025 18:07:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/isit-a-template-to-document-your-dns-investigations/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/isit-a-template-to-document-your-dns-investigations/]]></link>
			<title>ISIT: A Template to Document Your DNS Investigations</title>
			<pubDate><![CDATA[Wed, 12 Nov 2025 15:53:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/10-tips-for-better-administrative-client-hygiene/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/10-tips-for-better-administrative-client-hygiene/]]></link>
			<title>10 Tips for Better Administrative Client Hygiene</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 22:46:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/metadata-or-content-nsa-is-not-the-only-data-collector-you-should-fear/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/metadata-or-content-nsa-is-not-the-only-data-collector-you-should-fear/]]></link>
			<title>Metadata or Content: NSA is not the only data collector you should fear</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 22:29:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/blog-2005-2009/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/blog-2005-2009/]]></link>
			<title>Blog (2005-2009)</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 16:41:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/how-many-legs-does-your-security-stool-have/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/how-many-legs-does-your-security-stool-have/]]></link>
			<title>How Many Legs Does Your Security Stool Have?</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 16:32:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/preparing-for-the-inevitable-ddos-attack/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/preparing-for-the-inevitable-ddos-attack/]]></link>
			<title>Preparing for the (Inevitable?) DDoS Attack</title>
			<pubDate><![CDATA[Fri, 07 Nov 2025 14:04:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/security-versus-privacy-there-is-no-balance-and-thats-intentional/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/security-versus-privacy-there-is-no-balance-and-thats-intentional/]]></link>
			<title>Security versus privacy: there is no balance, 
and that&#8217;s intentional</title>
			<pubDate><![CDATA[Fri, 07 Nov 2025 14:01:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/emergence-of-ddos-as-a-service-ddosaas/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/emergence-of-ddos-as-a-service-ddosaas/]]></link>
			<title>Emergence of DDoS as a Service (DDoSAAS)</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 04:36:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/the-people-side-of-prevention/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/the-people-side-of-prevention/]]></link>
			<title>The People Side of Prevention</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 04:34:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/considerations-when-comparing-firewalls/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/considerations-when-comparing-firewalls/]]></link>
			<title>Considerations when comparing firewalls</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 02:00:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/apwg-global-survey-explores-phishing-trends-and-name-use-in-1h-2013/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/apwg-global-survey-explores-phishing-trends-and-name-use-in-1h-2013/]]></link>
			<title>APWG Global Survey Explores Phishing Trends and Name Use in 1H 2013</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 01:41:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/turn-your-android-device-into-a-swiss-army-knife-for-security/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/turn-your-android-device-into-a-swiss-army-knife-for-security/]]></link>
			<title>Turn Your Android Device into a 
Swiss Army Knife for Security</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 00:58:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/is-it-time-to-eliminate-firewalls/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/is-it-time-to-eliminate-firewalls/]]></link>
			<title>Is It Time to Eliminate Firewalls?</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 00:16:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/malware-war-without-end-the-uncomfortable-unacknowledged-truth/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/malware-war-without-end-the-uncomfortable-unacknowledged-truth/]]></link>
			<title>Malware, War Without End: 
The Uncomfortable, Unacknowledged Truth</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 20:04:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/are-you-monitoring-your-dns/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/are-you-monitoring-your-dns/]]></link>
			<title>Are you Monitoring Your DNS?</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 16:34:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/dns-cache-poisoning/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/dns-cache-poisoning/]]></link>
			<title>DNS Cache Poisoning</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 16:44:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/harden-your-resolvers-protect-your-recursive-dns-for-you-and-for-everyone-else/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/harden-your-resolvers-protect-your-recursive-dns-for-you-and-for-everyone-else/]]></link>
			<title>Harden your resolvers: protect your recursive DNS 
for you and for everyone else</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 16:30:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/how-to-find-your-mac-address-from-android-to-windows/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/how-to-find-your-mac-address-from-android-to-windows/]]></link>
			<title>How to Find Your MAC address: From Android to Windows</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 23:19:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/phishing-a-low-paid-low-skills-enterprise/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/phishing-a-low-paid-low-skills-enterprise/]]></link>
			<title>Phishing: a low-paid, low-skills enterprise?</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 16:48:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/recognizing-and-responding-to-a-phishing-attack/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/recognizing-and-responding-to-a-phishing-attack/]]></link>
			<title>Recognizing and Responding to a Phishing Attack</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 22:47:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/the-cyber-doomsday-machine/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/the-cyber-doomsday-machine/]]></link>
			<title>The Cyber Doomsday Machine</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 17:43:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/is-cybercrime-a-threat-to-our-economies/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/is-cybercrime-a-threat-to-our-economies/]]></link>
			<title>Is cybercrime a threat to our economies?</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 21:52:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/recognizing-and-avoiding-situational-harm-from-social-voyeurism/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/recognizing-and-avoiding-situational-harm-from-social-voyeurism/]]></link>
			<title>Recognizing and Avoiding Situational 
Harm from Social Voyeurism</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 21:48:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.securityskeptic.com/e-crime-facts-figures-frustrations-and-fixes/]]></guid>
			<link><![CDATA[https://www.securityskeptic.com/e-crime-facts-figures-frustrations-and-fixes/]]></link>
			<title>e-crime facts, figures, frustrations, and fixes</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 17:08:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
