<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 3:24 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://australiancybersecuritymagazine.com.au/default-sitemap.xsl?sitemap=post"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xhtml="http://www.w3.org/1999/xhtml"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/oaic-data-breach-report-shows-key-privacy-risks/]]></loc>
		<lastmod><![CDATA[2022-11-10T01:58:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/OAIC-Data-Breach-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/azul-launches-new-security-product/]]></loc>
		<lastmod><![CDATA[2022-11-10T01:23:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Azul-Vulnerability-Detection.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/more-data-released-as-medibank-private-hackers-demand-us9-7-million/]]></loc>
		<lastmod><![CDATA[2022-11-09T21:50:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/shutterstock_1582278955.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyberark-sydney-impact-2022/]]></loc>
		<lastmod><![CDATA[2022-11-09T02:20:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/set-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Screenshot-2022-11-01-114541.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-savvy-saviynt/]]></loc>
		<lastmod><![CDATA[2022-11-09T01:32:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Security-Savvy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-best-protect-yourself-against-scams/]]></loc>
		<lastmod><![CDATA[2022-11-09T01:32:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Scams-Awareness-Week-2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/six-million-australian-adults-hacked-in-the-last-year/]]></loc>
		<lastmod><![CDATA[2022-11-07T23:25:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Australian-Adults.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/medibank-will-not-pay-ransom/]]></loc>
		<lastmod><![CDATA[2022-11-07T22:08:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/ransom-payment.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/pure-storages-new-anz-area-vice-president/]]></loc>
		<lastmod><![CDATA[2022-11-07T18:59:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Amy-Rushall.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-a-living-security-approach-is-needed-for-smart-cities-to-thrive/]]></loc>
		<lastmod><![CDATA[2022-11-07T02:25:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Living-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/when-a-cyber-incident-shines-the-media-spotlight-on-your-business/]]></loc>
		<lastmod><![CDATA[2022-11-07T02:23:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-risk-meetup-returns-to-sydney/]]></loc>
		<lastmod><![CDATA[2022-11-07T00:33:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-6-28-43-pm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-7-09-04-pm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-6-54-58-pm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-6-34-22-pm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-6-16-38-pm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Photo-27-10-2022-6-12-55-pm.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/automated-threats-caused-62-of-retail-security-incidents/]]></loc>
		<lastmod><![CDATA[2022-11-04T03:48:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Retail-Security.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/thumbnail.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/launch-of-the-annual-threat-report/]]></loc>
		<lastmod><![CDATA[2022-11-04T01:17:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Australian-Security-Intelligence-Organisation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/call-for-more-women-in-ict-leadership/]]></loc>
		<lastmod><![CDATA[2022-11-03T23:35:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/ICT-Leadership.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/acs-surprised-at-it-visa-processing-changes/]]></loc>
		<lastmod><![CDATA[2022-11-03T01:21:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/IT-Visa-Processing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cydarm-appoints-new-technical-account-manager/]]></loc>
		<lastmod><![CDATA[2022-11-02T01:48:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Phil-Cole.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/archtis-awarded-work-order/]]></loc>
		<lastmod><![CDATA[2022-11-02T01:40:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/secure-data-architecture.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cydarm-partners-with-retrospect-labs/]]></loc>
		<lastmod><![CDATA[2022-11-01T03:01:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/11/Australian-Women-in-Security-Network.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-professionals-burning-out/]]></loc>
		<lastmod><![CDATA[2022-10-31T04:00:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cybersecurity-Awareness.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/body-corporate-business-the-latest-victim-as-cyber-attacks-continue/]]></loc>
		<lastmod><![CDATA[2022-10-30T21:27:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/shutterstock_1980549218.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/identity-endpoint-protection-with-microsoft-zero-trust/]]></loc>
		<lastmod><![CDATA[2022-10-28T02:31:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Microsoft-Zero-Trust.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-340-cybersecurity-for-business-cyber-risk-is-not-just-an-it-issue/]]></loc>
		<lastmod><![CDATA[2022-10-28T01:30:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Episode340.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-businesses-need-a-data-privacy-reset/]]></loc>
		<lastmod><![CDATA[2022-10-27T00:28:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Data-Privacy-Reset.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-government-to-increase-data-breach-penalties/]]></loc>
		<lastmod><![CDATA[2022-10-23T21:21:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/shutterstock_1253682439.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/businesses-willing-to-pay-double-the-ransom-in-2022/]]></loc>
		<lastmod><![CDATA[2022-10-21T06:56:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/annual-ransomware-survey.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/were-still-terrible-at-password-management/]]></loc>
		<lastmod><![CDATA[2022-10-21T06:56:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Password-Management.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cloudera-makes-a-mark-with-former-crayon-ceo-appointment/]]></loc>
		<lastmod><![CDATA[2022-10-19T23:56:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Australias-Cyber-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/women-in-australias-cyber-security-industry-growing/]]></loc>
		<lastmod><![CDATA[2022-10-19T23:54:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/aus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/medibank-ransomware-attack/]]></loc>
		<lastmod><![CDATA[2022-10-19T22:09:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Screenshot-2022-10-20-072400.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/austcybers-australian-cyber-weeks-national-tour/]]></loc>
		<lastmod><![CDATA[2022-10-19T06:15:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Australian-Cyber-Week.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/september-2022s-most-wanted-malware/]]></loc>
		<lastmod><![CDATA[2022-10-19T05:21:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Malware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/industry-first-zero-configuration-data-protection/]]></loc>
		<lastmod><![CDATA[2022-10-19T05:21:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Data-Protection.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Slide1b.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/devsecops-smoothing-the-journey/]]></loc>
		<lastmod><![CDATA[2022-10-19T04:24:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/dev.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Screenshot-2022-10-18-135603.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cisco-and-university-of-canberras-national-cybersecurity-partnership/]]></loc>
		<lastmod><![CDATA[2022-10-19T00:54:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/National-Cybersecurity-Partnership.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-leaders-confident-with-cyber-disclosure-ability/]]></loc>
		<lastmod><![CDATA[2022-10-19T00:07:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cyber-Disclosure-Ability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/woolworths-owned-mydeal-breached/]]></loc>
		<lastmod><![CDATA[2022-10-17T04:45:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Customer-Relationship-Management.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/protecting-smes-against-cyber-threat/]]></loc>
		<lastmod><![CDATA[2022-10-17T04:45:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Australian-Cyber-Security-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-launches-cyberfit-nation-education-program/]]></loc>
		<lastmod><![CDATA[2022-10-14T04:03:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/CyberFit-Nation-Education-Program.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/attackers-use-automation-reveals-cloud-threat-report/]]></loc>
		<lastmod><![CDATA[2022-10-14T04:03:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cloud-Threat-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/one-in-four-customers-sever-ties-with-breached-companies/]]></loc>
		<lastmod><![CDATA[2022-10-12T03:58:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/cyber-criminals.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/oaic-opens-investigation-into-optus-over-data-breach/]]></loc>
		<lastmod><![CDATA[2022-10-12T01:30:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Data-Breach.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/beyond-the-perimeter-enhancing-access-control/]]></loc>
		<lastmod><![CDATA[2022-10-11T04:46:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/sekuro-webinar-Oct-2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-ot-cyber-training-platform-to-secure-critical-infrastructure/]]></loc>
		<lastmod><![CDATA[2022-10-11T03:03:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Secure-Critical-Infrastructure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/state-of-email-security-2022-report/]]></loc>
		<lastmod><![CDATA[2022-10-11T03:03:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/State-of-Email-Security-2022-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-launches-essential-eight-managed-controls-solution/]]></loc>
		<lastmod><![CDATA[2022-10-11T01:06:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Essential-8-Managed-Controls-Solution.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/computer-vision-is-becoming-an-accelerator-for-education/]]></loc>
		<lastmod><![CDATA[2022-10-16T22:38:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/DT-Education-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/online-gaming-made-safer-with-identity-verification-technology/]]></loc>
		<lastmod><![CDATA[2022-10-11T17:00:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/shutterstock_2120610284.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-industry-consultation-is-vital-in-cyber-security/]]></loc>
		<lastmod><![CDATA[2022-10-10T04:10:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cyber-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/maurice-blackburn-commences-compensation-action-for-millions-of-optus-customers/]]></loc>
		<lastmod><![CDATA[2022-10-09T23:50:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Maurice-Blackburn.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/csiro-to-help-businesses-mitigate-increased-cyber-security-risk/]]></loc>
		<lastmod><![CDATA[2022-10-09T23:36:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cyber-Security-Risk.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aiia-urges-government-to-release-privacy-act-draft-exposure-legislation/]]></loc>
		<lastmod><![CDATA[2022-10-07T02:57:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Australian-Information-Industry-Association.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/queensland-companies-guided-weapons-program/]]></loc>
		<lastmod><![CDATA[2022-10-07T01:13:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Black-Sky-Aerospace.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-professionals-quitting-in-droves/]]></loc>
		<lastmod><![CDATA[2022-10-10T23:00:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cyber-Security-Professionals.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/piloting-teams-while-under-pressure/]]></loc>
		<lastmod><![CDATA[2022-10-06T04:46:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/2022-ISC²-Security-Congress.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/60-of-australians-believe-links-in-business-emails-are-safe/]]></loc>
		<lastmod><![CDATA[2022-10-06T02:01:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cyber-Resilience-in-Australia-2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-board-members-lagging-in-cybersecurity-maturity/]]></loc>
		<lastmod><![CDATA[2022-10-06T00:45:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Cybersecurity-Maturity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-latest-guidelines-spell-danger-for-australias-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-10-05T03:46:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Australias-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/blackbyte-adds-bring-your-own-driver-technique/]]></loc>
		<lastmod><![CDATA[2022-10-05T02:24:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Bring-Your-Own-Driver.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Screenshot-2022-10-05-090951.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-businesses-face-55-cybersecurity-incidents-daily/]]></loc>
		<lastmod><![CDATA[2022-10-05T02:10:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Trellix.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/michael-kirby-appointed-patron-of-cyber-mental-health-initiative/]]></loc>
		<lastmod><![CDATA[2022-10-05T02:03:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Michael-Kirby.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/telstra-data-breach-sees-records-of-30000-employees-posted-online/]]></loc>
		<lastmod><![CDATA[2022-10-04T22:11:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/shutterstock_1304781442.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/hacktive-to-join-deloitte/]]></loc>
		<lastmod><![CDATA[2022-10-04T02:21:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Chris-Gatford.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/update-on-optus-cyberattack/]]></loc>
		<lastmod><![CDATA[2022-10-04T02:21:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/Optus-Cyberattack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/optus-commissions-independent-external-review-of-cyberattack/]]></loc>
		<lastmod><![CDATA[2022-10-03T02:22:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/10/shutterstock_1604981482.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/75-of-australian-companies-suffered-cloud-security-incident/]]></loc>
		<lastmod><![CDATA[2022-09-30T00:27:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Cloud-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/22-262mr-asic-sues-nuix-and-its-board/]]></loc>
		<lastmod><![CDATA[2022-09-30T00:07:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Nuix-Limited.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/time-for-australian-technology-law-overhaul/]]></loc>
		<lastmod><![CDATA[2022-09-29T23:46:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/cybersecurity-laws.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rubrik-appoints-antoine-le-tard-as-apac-vice-president/]]></loc>
		<lastmod><![CDATA[2022-09-28T23:55:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Le-Tard.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/two-arrests-over-business-email-compromise-scam/]]></loc>
		<lastmod><![CDATA[2022-09-28T01:35:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Email-Compromise-Scam.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-complexity-in-the-digital-transformation-journey/]]></loc>
		<lastmod><![CDATA[2022-09-28T00:19:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Cybersecurity.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Screenshot-2022-09-20-155716.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/untrained-employees-pose-major-risk-to-organisations/]]></loc>
		<lastmod><![CDATA[2022-09-27T05:23:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Untrained-Employees.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-face-at-the-helm-of-the-australian-cyber-collaboration-centre/]]></loc>
		<lastmod><![CDATA[2022-09-26T07:06:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Australian-Cyber-Collaboration-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/optus-customer-data-posted-on-dark-web-as-hacker-demands-1-million/]]></loc>
		<lastmod><![CDATA[2022-09-26T02:55:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/shutterstock_1304777977.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/6clickss-10-million-capital-raise/]]></loc>
		<lastmod><![CDATA[2022-09-26T21:00:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/6clicks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/optus-cyberattack-risks-sensitive-customer-data/]]></loc>
		<lastmod><![CDATA[2022-09-22T21:33:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/shutterstock_1304777977.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fujitsu-acquires-inphysec/]]></loc>
		<lastmod><![CDATA[2022-09-21T03:52:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/InPhySec.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/addressing-security-challenges-of-hybrid-work/]]></loc>
		<lastmod><![CDATA[2022-09-21T03:15:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/2022-Thales-Access-Management-Index.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/over-half-of-australian-firms-supply-chains-compromised-by-ransomware/]]></loc>
		<lastmod><![CDATA[2022-09-20T02:39:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Ransomware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/revealed-gaps-and-benefits-for-future-digital-transformations/]]></loc>
		<lastmod><![CDATA[2022-09-19T03:53:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Digital-Transformations.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-337-cyber-attacks-resulting-from-the-russian-ukraine-conflict-critical-infrastructure-impact-and-response-in-asia/]]></loc>
		<lastmod><![CDATA[2022-09-19T00:38:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Episode337.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/five-eyes-joint-advisory-warns-of-continuing-iranian-cyber-threats/]]></loc>
		<lastmod><![CDATA[2022-09-15T22:42:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/shutterstock_721814395-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/staging-cybersecurity-risks-for-enterprise-risk-management/]]></loc>
		<lastmod><![CDATA[2022-09-14T23:14:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Cybersecurity-Risks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-sapien-leader-pushes-for-more-women-in-cyber/]]></loc>
		<lastmod><![CDATA[2022-09-14T00:08:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Women-in-Cyber.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aus-india-exchange-program-to-take-female-tech-talent-global/]]></loc>
		<lastmod><![CDATA[2022-09-09T02:22:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Female-Tech-Talent-Global.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/china-accuses-nsa-of-northwestern-polytechnical-university-cyber-attack/]]></loc>
		<lastmod><![CDATA[2022-09-08T23:25:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/shutterstock_1400015993.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyberattack-on-japanese-government-websites/]]></loc>
		<lastmod><![CDATA[2022-09-08T01:44:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Cyberattack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fibersense-and-sx-announce-expansion/]]></loc>
		<lastmod><![CDATA[2022-09-08T01:44:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/FiberSenses-DigitalAsset-Marine.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/supply-chain-risk-management-needs-physical-layer-visibility/]]></loc>
		<lastmod><![CDATA[2022-09-08T00:55:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Supply-Chain-Risk-Management.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-the-retail-industry-can-improve-the-customer-experience-increase-safety-and-maximize-margins-through-computer-vision-and-artificial-intelligence/]]></loc>
		<lastmod><![CDATA[2022-09-19T16:00:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/iStock-1277730712-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/The-intelligent-store.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/industry-leaders-influence-falls-short/]]></loc>
		<lastmod><![CDATA[2022-09-06T04:23:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Qlik.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mulesoft-completes-australian-security-assessment/]]></loc>
		<lastmod><![CDATA[2022-09-06T02:23:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Australian-Security-Assessment.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-335-web-3-and-scams-a-hack-in-the-box-takeaway/]]></loc>
		<lastmod><![CDATA[2022-09-06T00:26:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Episode335.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-women-keen-for-digital-skills-training/]]></loc>
		<lastmod><![CDATA[2022-09-05T01:55:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Digital-Skills-Training.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/land-down-under-attracts-magnet-forensics/]]></loc>
		<lastmod><![CDATA[2022-09-02T00:51:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Magnet-Forensics.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2023-adf-cyber-gap-program-applications-now-open/]]></loc>
		<lastmod><![CDATA[2022-09-01T01:18:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/09/Cyber-Gap-Program.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defence-boosts-cybersecurity-capabilities/]]></loc>
		<lastmod><![CDATA[2022-08-31T01:03:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cybersecurity-Capabilities.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cybersecurity-Capabilities-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-underpinning-india-australia-ties/]]></loc>
		<lastmod><![CDATA[2022-08-31T00:06:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/microsoft-releases-its-second-edition-of-cyber-signals/]]></loc>
		<lastmod><![CDATA[2022-08-30T02:34:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cyber-Signals.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-posts-166m-turnover/]]></loc>
		<lastmod><![CDATA[2022-08-30T02:16:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Tesserent.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/devicie-raises-aud14m/]]></loc>
		<lastmod><![CDATA[2022-08-30T01:55:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Devicie.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/turning-catastrophic-ransomware-events-into-minor-inconveniences-with-zero-trust-data-security/]]></loc>
		<lastmod><![CDATA[2022-08-30T17:00:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/ACSM-Wednesday.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/iot-vulnerability-disclosures-rises-57/]]></loc>
		<lastmod><![CDATA[2022-08-26T01:07:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/IoT-Vulnerability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/jabras-engage-headset-range-certified-by-asd/]]></loc>
		<lastmod><![CDATA[2022-08-25T00:09:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Engage-65-and-the-Engage-75-DECT-wireless.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussie-businesses-increase-budget-spending-for-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-08-23T02:50:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Future-of-Cybersecurity-in-Asia-Pacific-and-Japan.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/backing-australias-critical-technologies/]]></loc>
		<lastmod><![CDATA[2022-08-23T00:35:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australias-Critical-Technologies.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australias-Critical-Technologies1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ixup-global-headquarter-launch/]]></loc>
		<lastmod><![CDATA[2022-08-22T03:48:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/IXUP-Limited2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/IXUP-Limited3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/IXUP-Limited1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/are-you-ready-how-to-prepare-for-a-security-incident/]]></loc>
		<lastmod><![CDATA[2022-08-22T00:55:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Security-Incident.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/requests-public-comments-on-fips-180-4-secure-hash-standard-shs/]]></loc>
		<lastmod><![CDATA[2022-08-21T23:41:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Secure-Hash-Standard.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-government-eyes-cyber-security-strategy-overhaul/]]></loc>
		<lastmod><![CDATA[2022-08-21T22:12:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/shutterstock_582800125.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-prevent-cybersecurity-burnout/]]></loc>
		<lastmod><![CDATA[2022-08-19T02:48:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cybersecurity-Burnout.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-industry-mental-health-survey/]]></loc>
		<lastmod><![CDATA[2022-08-19T01:26:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cyber-Security-Industry.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/study-into-gender-dimensions-in-australian-security-sector/]]></loc>
		<lastmod><![CDATA[2022-08-19T00:49:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australian-Security-Sector.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/veritas-to-accelerate-channel-in-australia-with-dicker-data/]]></loc>
		<lastmod><![CDATA[2022-08-18T03:39:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Dicker-Data.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mantel-group-acquires-aginic/]]></loc>
		<lastmod><![CDATA[2022-08-18T03:39:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/acquisition-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/resource-kit-to-help-against-human-layer-attacks/]]></loc>
		<lastmod><![CDATA[2022-08-17T01:17:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Human-Layer.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-cybersecurity-firm-in-a-secure-state-with-us-dod/]]></loc>
		<lastmod><![CDATA[2022-08-16T01:54:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australian-Cybersecurity-Firm.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/forescouts-nexgen-expansion/]]></loc>
		<lastmod><![CDATA[2022-08-16T00:39:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/hannel-expansion-plans.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/accelerating-cyber-security-solutions-in-nsw/]]></loc>
		<lastmod><![CDATA[2022-08-15T01:47:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cyber-Security-Solutions-in-NSW.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defence-unveils-supercomputing-capability/]]></loc>
		<lastmod><![CDATA[2022-08-15T01:47:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Defence-Unveils-Supercomputing-Capability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2022-women-in-cybersecurity-scholarship-winner/]]></loc>
		<lastmod><![CDATA[2022-08-15T01:31:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cybersecurity-Scholarship-Winner.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/july-2022s-most-wanted-malware/]]></loc>
		<lastmod><![CDATA[2022-08-12T01:44:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/2022s-Most-Wanted-Malware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paraflare-inflates-leadership-team-with-new-appointments/]]></loc>
		<lastmod><![CDATA[2022-08-10T02:44:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Mandy-Ross.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/marcus-img.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/bolstering-cyber-security-in-k-12-schools/]]></loc>
		<lastmod><![CDATA[2022-08-10T02:44:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/CyberEdge.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/600k-on-offer-to-support-australian-internet-education/]]></loc>
		<lastmod><![CDATA[2022-08-10T02:20:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australian-Internet-Education.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-military-defence-must-include-cyber-defence/]]></loc>
		<lastmod><![CDATA[2022-08-10T01:44:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Australias-Military-Defence.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/an-informed-alternative-to-conventional-warfare/]]></loc>
		<lastmod><![CDATA[2022-08-09T00:54:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Information-Warfare.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kordamentha-appoints-new-cybersecurity-executive-director/]]></loc>
		<lastmod><![CDATA[2022-08-08T03:44:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Tony-Vizza.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/establishment-of-knowbe4-ventures/]]></loc>
		<lastmod><![CDATA[2022-08-08T01:40:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/KnowBe4-Ventures.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-malware-strains-of-2021/]]></loc>
		<lastmod><![CDATA[2022-08-05T01:25:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Malware-Strains-of-2021.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/act-logistics-wins-dod-contract/]]></loc>
		<lastmod><![CDATA[2022-08-04T00:57:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Department-of-Defence.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-ranks8th-in-big-tech-study/]]></loc>
		<lastmod><![CDATA[2022-08-03T03:38:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/government-surveillance.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/government-surveillance-1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/man-fronts-court-over-illegal-spyware-he-created-when-a-teenager/]]></loc>
		<lastmod><![CDATA[2022-08-02T22:03:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/shutterstock_2144540913.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/97-top-10-universities-complacent-with-cyber-attackers/]]></loc>
		<lastmod><![CDATA[2022-08-02T02:36:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/08/Cyber-Attackers.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/what-should-the-cyber-security-committees-report-to-the-boards-of-directors/]]></loc>
		<lastmod><![CDATA[2022-07-29T03:56:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Cyber-Security-Committees-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-data-recovery-due-diligence-helps-improve-cyber-resilience-and-ransomware-response/]]></loc>
		<lastmod><![CDATA[2022-07-28T03:26:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Malicious-actors-intent.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-academy-launched-to-help-solve-cyber-skills-crisis/]]></loc>
		<lastmod><![CDATA[2022-07-27T22:43:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Cyber-Skills-Crisis.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mastercard-secures-tdif-accreditation/]]></loc>
		<lastmod><![CDATA[2022-07-27T01:12:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Trusted-Digital-Identity-Framework.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/digital-skills-key-to-securing-melbournes-cyber-security-future/]]></loc>
		<lastmod><![CDATA[2022-07-26T02:04:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Cyber-Security-Future.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/three-cybersecurity-lessons-we-can-learn-or-re-learn-from-the-history-of-ics-attacks/]]></loc>
		<lastmod><![CDATA[2022-07-25T02:57:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/matt-hubbard.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserents-new-direction-appointing-former-north-md/]]></loc>
		<lastmod><![CDATA[2022-07-25T01:04:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/George-Katavic.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/uk-cyber-bosses-call-for-client-side-scanning-to-help-prevent-child-abuse/]]></loc>
		<lastmod><![CDATA[2022-07-24T23:35:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Shutterstock_1485288806.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyberthreats-impacting-anz/]]></loc>
		<lastmod><![CDATA[2022-07-22T03:07:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Cyberthreats-Impacting-ANZ.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/297-increase-in-u-s-breaches-tied-to-third-party-suppliers/]]></loc>
		<lastmod><![CDATA[2022-07-21T01:11:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Consumer-Identity-Breach-Report.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mitre-and-australian-dod-sign-agreement/]]></loc>
		<lastmod><![CDATA[2022-07-21T00:23:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/MITRE-and-Australian-DoD-Sign-Agreement.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-business-leaders-cyber-concerns/]]></loc>
		<lastmod><![CDATA[2022-07-20T03:49:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Cyber-Concerns.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Cyber-Concerns1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ai-research-helps-businesses-make-better-decisions/]]></loc>
		<lastmod><![CDATA[2022-07-20T03:48:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/artificial-intelligence.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paraflare-joins-microsoft-intelligent-security-association/]]></loc>
		<lastmod><![CDATA[2022-07-20T03:48:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Microsoft-Intelligent-Security-Association.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/preventing-financial-fraud-in-accounts-payable/]]></loc>
		<lastmod><![CDATA[2022-07-15T02:25:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_digital-financial-networks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/exploring-intelligent-ways-to-redefine-defence-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-07-15T00:01:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Digital-automation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-technology-jobs-boom-continues/]]></loc>
		<lastmod><![CDATA[2022-07-14T23:42:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Australias-Technology-Jobs.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-329-space-law-and-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-07-14T23:27:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Episode329.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zero-trust-approaches-in-digital-transformation-cloud-adoption/]]></loc>
		<lastmod><![CDATA[2022-07-14T01:30:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Digital-Transformation.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Digital-Transformation.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/Digital-Transformation1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-state-of-industrial-security-in-2022/]]></loc>
		<lastmod><![CDATA[2022-07-14T00:30:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_The-State-of-Industrial-Security-in-2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/adf-veterans-reskilling-for-cybersecurity-roles/]]></loc>
		<lastmod><![CDATA[2022-07-14T00:23:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Cybersecurity-Roles.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/up-to-10000-students-targeted-in-deakin-university-cyberattack/]]></loc>
		<lastmod><![CDATA[2022-07-13T01:30:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/shutterstock_1813940525.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/supporting-victorian-public-sector-innovation/]]></loc>
		<lastmod><![CDATA[2022-07-11T03:10:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/cloud-technologies.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ping-identity-partners-with-deloitte/]]></loc>
		<lastmod><![CDATA[2022-07-06T01:23:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Consulting-Technology-Partner.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Consulting-Technology-Partner2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-government-agencies-digitally-lagging/]]></loc>
		<lastmod><![CDATA[2022-07-04T05:55:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Digitally-Lagging.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-risks-looming-large-in-threat-landscape/]]></loc>
		<lastmod><![CDATA[2022-07-04T01:51:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_Security-Risks-Looming.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mx51-partners-with-sysdig/]]></loc>
		<lastmod><![CDATA[2022-07-01T01:30:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/img_mx51.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/haventecs-authenticate-launches-on-auth0-marketplace/]]></loc>
		<lastmod><![CDATA[2022-06-30T01:43:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Auth0-Marketplace.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-protected-result/]]></loc>
		<lastmod><![CDATA[2022-06-30T01:43:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Infosec-Registered-Assessors-Program.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/invnt-apac-spearheads-award-winning-cyber-security-virtual-experience-for-education-industry/]]></loc>
		<lastmod><![CDATA[2022-07-05T17:00:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/07/CyberLive.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://cyberriskleaders.com/wp-content/uploads/2022/06/Laura-Roberts-208x300.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/secolve-hires-big-for-new-advisory-board/]]></loc>
		<lastmod><![CDATA[2022-06-29T02:07:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Secolve.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/disable-ad-tracking-in-ios-and-android-reasons-to-do-it-now/]]></loc>
		<lastmod><![CDATA[2022-07-05T21:00:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_1675180834.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/4.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/5.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/6.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defi-and-cybersecurity-what-future-holds/]]></loc>
		<lastmod><![CDATA[2022-07-12T21:00:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_2045245052.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/crypto-thefts.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/open-source-stalkerware-detector-tinycheck/]]></loc>
		<lastmod><![CDATA[2022-06-29T01:27:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/29th-June-Open-Source-Stalkerware-Detector-TinyCheck.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Tiny-Check-1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/minors-spread-malware-for-extra-pocket-money/]]></loc>
		<lastmod><![CDATA[2022-06-29T01:02:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_online-community-of-minors.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-culture-does-your-organisation-have-it/]]></loc>
		<lastmod><![CDATA[2022-06-29T00:50:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Matt-Hanmer.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-companies-failing-to-report-on-cyber-security/]]></loc>
		<lastmod><![CDATA[2022-06-28T01:09:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Cyber-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ransomware-industry-earns-692m-from-attacks/]]></loc>
		<lastmod><![CDATA[2022-06-24T03:30:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Ransomware-Industry.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-ranks-12th-among-digitally-free-countries/]]></loc>
		<lastmod><![CDATA[2022-06-24T01:47:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Digitally-Free-Countries.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Digitally-Free-Countries1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_Digitally-Free-Countries3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-threat-hunting-leveraging-mitre-attck-framework-must-for-modern-soc/]]></loc>
		<lastmod><![CDATA[2022-06-24T00:35:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/img_MITRE-ATTCK-Framework.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/telstra-and-f5-team-up/]]></loc>
		<lastmod><![CDATA[2022-06-22T03:26:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Telstra-and-F5-Team-Up.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/forescout-discloses-oticefall-56-vulnerabilities-found/]]></loc>
		<lastmod><![CDATA[2022-06-22T01:06:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/ICEFALL-56-Vulnerabilities.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/stax-on-consegna-partnership/]]></loc>
		<lastmod><![CDATA[2022-06-21T01:15:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Stax-On-Consegna-Partnership.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/advent-partners-with-vicarius/]]></loc>
		<lastmod><![CDATA[2022-06-20T02:24:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Advent-Partners-with-Vicarius.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-worst-in-the-world-in-downloading-mobile-app/]]></loc>
		<lastmod><![CDATA[2022-06-16T02:10:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Lookout-App-Threats-Map.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybermindz-launches-to-protect-cyber-minds/]]></loc>
		<lastmod><![CDATA[2022-06-16T01:36:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Protect-Cyber-Minds.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-it-leaders-eager-to-eliminate-passwords/]]></loc>
		<lastmod><![CDATA[2022-06-15T03:59:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/passwordless-solutions.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/junes-patch-tuesday-tackles-follina-and-scores-more-software-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2022-06-15T03:13:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_1741780622.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-secures-former-mcafee-engineer/]]></loc>
		<lastmod><![CDATA[2022-06-14T02:53:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Michael-Murphy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/royal-flying-doctors-services-rapid-ransomware-recovery/]]></loc>
		<lastmod><![CDATA[2022-06-14T02:53:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Royal-Flying-Doctors-Service-Queensland.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/csiros-offer-to-smes-working-on-cyber-security/]]></loc>
		<lastmod><![CDATA[2022-06-14T01:44:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/cyber-security-sector.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-computer-vision-is-revolutionizing-the-manufacturing-supply-chain/]]></loc>
		<lastmod><![CDATA[2022-06-21T01:01:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/DT_ComputerVision-Manufacturing_MainImage.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/DT_ComputerVision-Manufacturing_Figure1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-businesses-false-sense-of-risk-management-confidence/]]></loc>
		<lastmod><![CDATA[2022-06-09T03:31:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/ANZ-Business-Risk-Resilience-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-acquires-tracer-cloud-and-consegna-cloud/]]></loc>
		<lastmod><![CDATA[2022-06-09T03:19:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/CyberCX-Acquires-Tracer-Cloud-and-Consegna-Cloud.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/free-cybersecurity-toolkit-for-australia-small-businesses/]]></loc>
		<lastmod><![CDATA[2022-06-09T00:58:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Global-Cyber-Alliance.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/inspecting-the-future-of-ransomware-threats-with-vectras-cto/]]></loc>
		<lastmod><![CDATA[2022-06-09T00:29:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Ransomware-Threats.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/attacker-dwell-time-increased-by-36/]]></loc>
		<lastmod><![CDATA[2022-06-08T02:51:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Active-Adversary-Playbook-2022.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Active-Adversary-Playbook-20221.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Active-Adversary-Playbook-20222.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ddos-scrubbing-centres-in-sydney-and-melbourne/]]></loc>
		<lastmod><![CDATA[2022-06-08T02:31:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/denial-of-service.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-piranha-snaps-up-global-infosec-awards/]]></loc>
		<lastmod><![CDATA[2022-06-08T02:19:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Global-InfoSec-Awards.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-remove-your-personal-information-from-googles-search-results/]]></loc>
		<lastmod><![CDATA[2022-06-14T21:00:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_1566986077.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/comparison-between-defi-vs-conventional-banking/]]></loc>
		<lastmod><![CDATA[2022-06-21T21:00:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_1802338570.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dragos-launches-ot-cert/]]></loc>
		<lastmod><![CDATA[2022-06-08T01:11:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Dragos-OT-CERT.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/another-vulnerability-exposed-in-atlassians-confluence-software/]]></loc>
		<lastmod><![CDATA[2022-06-06T03:00:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_1464830438.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ms-office-applications-under-threat-from-follina-vulnerability/]]></loc>
		<lastmod><![CDATA[2022-06-03T05:22:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/shutterstock_2011271558.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/secure-code-warrior-and-okta-collaborate/]]></loc>
		<lastmod><![CDATA[2022-06-03T02:13:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Okta-Integration-Network.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/get-set-for-esets-new-telco-and-isp-launch/]]></loc>
		<lastmod><![CDATA[2022-06-02T03:52:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Telecommunications.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/76-of-australian-cisos-concerned-vulnerabilities-leak-into-production/]]></loc>
		<lastmod><![CDATA[2022-06-02T03:12:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Vulnerability-Management.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-australian-government-appoints-dedicated-cyber-security-minister/]]></loc>
		<lastmod><![CDATA[2022-06-01T05:42:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Clare-ONeil.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/Clare-and-Tim.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/f5-unveils-nginx-for-microsoft-azure/]]></loc>
		<lastmod><![CDATA[2022-06-01T02:07:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/F5-NGINX-for-Microsoft-Azure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/github-enterprise-server-3-5/]]></loc>
		<lastmod><![CDATA[2022-06-01T01:05:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/GitHub-Enterprise-Server-3.5.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/06/GitHub.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/75-australians-suffer-attack-surface-from-web-apps/]]></loc>
		<lastmod><![CDATA[2022-05-31T01:55:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Attack-Surface.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/knowbe4-burrows-deep-for-new-leadership-appointment/]]></loc>
		<lastmod><![CDATA[2022-05-31T01:09:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Natalie-Burrows.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rogue-covid-19-apps-collected-info-on-australians/]]></loc>
		<lastmod><![CDATA[2022-05-30T03:40:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Rogue-COVID-19-Apps.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyberattacks-on-australian-healthcare-doubles/]]></loc>
		<lastmod><![CDATA[2022-05-30T01:51:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/img_Cyberattacks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-the-sports-and-entertainment-industry-is-reinventing-the-fan-experience-and-enhancing-revenues-with-computer-vision/]]></loc>
		<lastmod><![CDATA[2022-05-29T22:45:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Article.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.asiapacificsecuritymagazine.com/wp-content/uploads/2022/05/Figure1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/only-44-of-aussies-know-what-on-earth-the-metaverse-is/]]></loc>
		<lastmod><![CDATA[2022-05-26T00:34:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Metaverse.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Metaverse-2.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Metaverse-3.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Metaverse-4.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Metaverse-5.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/redefining-defences-shifting-to-cloud-and-digital-outsourcing-trends-and-observations/]]></loc>
		<lastmod><![CDATA[2022-05-25T01:57:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Redefining-Defences.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Screenshot-2022-05-20-191353.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/1-in-5-australian-businesses-pay-ransom-for-their-data/]]></loc>
		<lastmod><![CDATA[2022-05-24T04:52:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/2022-Thales-Data-Threat-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2022-security-culture-report/]]></loc>
		<lastmod><![CDATA[2022-05-24T02:45:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/2022-Security-Culture-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/five-key-information-management-capabilities/]]></loc>
		<lastmod><![CDATA[2022-05-23T01:06:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/data-protection-laws.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cmd-solutions-named-partner-of-the-year/]]></loc>
		<lastmod><![CDATA[2022-05-18T02:48:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/AWS-Partners-of-the-Year-Awards.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/advancement-in-predicting-software-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2022-05-18T02:15:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Software-Vulnerabilities.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/in-the-rush-to-the-multi-cloud-dont-lose-sight-of-visibility/]]></loc>
		<lastmod><![CDATA[2022-05-17T23:35:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/shutterstock_2044815758.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/esafety-for-kids-educate-equip-empower/]]></loc>
		<lastmod><![CDATA[2022-05-17T08:26:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/set_fea3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Kayelene-Kerr-tv.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/perspectives-on-cyber-risk-new-threats-in-2022/]]></loc>
		<lastmod><![CDATA[2022-05-17T01:48:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Perspectives-on-Cyber-Risk-report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/computer-vision-is-transforming-the-transportation-industry-making-it-safer-more-efficient-and-improving-the-bottom-line/]]></loc>
		<lastmod><![CDATA[2022-05-16T05:26:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Dell-article.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Dell-article-in-story.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/willyama-launches-new-cyber-business/]]></loc>
		<lastmod><![CDATA[2022-05-13T00:06:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Willyama-Cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cohesity-delivers-fortknox/]]></loc>
		<lastmod><![CDATA[2022-05-11T01:13:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Cohesity-FortKnox.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/planning-for-a-zero-trust-architecture/]]></loc>
		<lastmod><![CDATA[2022-05-08T23:48:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Zero-Trust-Architecture.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/study-reveals-phone-scams-rob-australians-by-over-100m/]]></loc>
		<lastmod><![CDATA[2022-05-06T02:51:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/phone-scams.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-eo-guidance-for-cybersecurity-supply-chain-risk-management/]]></loc>
		<lastmod><![CDATA[2022-05-06T00:57:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Cybersecurity-Supply-Chain.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tangible-uplift-women-in-security-program-2022/]]></loc>
		<lastmod><![CDATA[2022-05-06T00:46:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/banner1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/May4.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-skills-shortage-creating-risks/]]></loc>
		<lastmod><![CDATA[2022-05-05T02:37:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Advancing-cybersecurity-skills.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/enabling-a-layered-approach-to-platform-security/]]></loc>
		<lastmod><![CDATA[2022-05-05T02:00:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/shutterstock_1830340820.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/qr-codes-abused-for-qshing-attacks/]]></loc>
		<lastmod><![CDATA[2022-05-04T02:32:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/QR-Codes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tangible-uplift-mentoring-program-for-women-in-security/]]></loc>
		<lastmod><![CDATA[2022-05-04T01:18:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Tangible.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fujitsu-and-akamai-join-forces/]]></loc>
		<lastmod><![CDATA[2022-05-04T00:37:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Akamai-Technologies.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/jamf-unveils-holistic-endpoint-security-platform/]]></loc>
		<lastmod><![CDATA[2022-05-01T23:27:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/05/Endpoint-Security-Platform.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/1-5k-exposed-databases-in-australia/]]></loc>
		<lastmod><![CDATA[2022-04-29T01:24:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Exposed-Databases-in-Australia1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Exposed-Databases-in-Australia2.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Exposed-Databases-in-Australia3.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Exposed-Databases-in-Australia4.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Exposed-Databases-in-Australia5.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cloudian-strengthens-leadership-ranks/]]></loc>
		<lastmod><![CDATA[2022-04-28T01:52:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/pic1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/pic2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/pic3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tech-sector-forced-to-look-offshore-for-talent/]]></loc>
		<lastmod><![CDATA[2022-04-28T01:45:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Australias-tech-sector.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-warned-to-strengthen-passwords/]]></loc>
		<lastmod><![CDATA[2022-04-28T01:13:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/World-Password-Day.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/former-aws-leader-checks-into-check-point/]]></loc>
		<lastmod><![CDATA[2022-04-28T01:11:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Les-Williamson.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-321-state-of-cyber-security-2022-global-update-on-workforce-efforts-resources-and-cyberoperations/]]></loc>
		<lastmod><![CDATA[2022-04-27T11:09:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Episode331.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/smbs-targeted-in-80-of-ransomware-attacks/]]></loc>
		<lastmod><![CDATA[2022-04-27T03:14:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Ransomware-Attacks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/akamai-product-launch/]]></loc>
		<lastmod><![CDATA[2022-04-27T03:14:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/security-and-compute-product.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/PromoTileOp2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/guide-to-operational-technology-security/]]></loc>
		<lastmod><![CDATA[2022-04-27T01:35:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Operational-Technology-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/iam-the-first-line-of-defense/]]></loc>
		<lastmod><![CDATA[2022-04-26T05:34:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/shutterstock_412412431.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/image001.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/image002.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/image003.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/forgerocks-reset-of-passwordless-app/]]></loc>
		<lastmod><![CDATA[2022-04-22T03:38:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/ee.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-piranha-snag-former-nab-and-pwc-power-houses/]]></loc>
		<lastmod><![CDATA[2022-04-22T02:20:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/ff.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/five-eyes-advisory-flags-russian-backed-critical-infrastructure-attacks/]]></loc>
		<lastmod><![CDATA[2022-04-22T01:52:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/shutterstock_1932195935.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussies-scammed-by-a-record-95m/]]></loc>
		<lastmod><![CDATA[2022-04-21T03:25:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Aussies-Scamme.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/a2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/customer-satisfaction-guide-for-zero-trust/]]></loc>
		<lastmod><![CDATA[2022-04-21T01:16:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/ffasa.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cisos-guide-to-cyber-risk-quantification/]]></loc>
		<lastmod><![CDATA[2022-04-20T02:03:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/MetricStream-eBook.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-clicked-employee-emails/]]></loc>
		<lastmod><![CDATA[2022-04-20T00:35:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_2022-top-clicked-phishing-report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tenable-partners-with-servicenow/]]></loc>
		<lastmod><![CDATA[2022-04-20T00:01:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Tenable-Partners-with-ServiceNow.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/vulnerabilities-discovered-in-lenovo-laptops/]]></loc>
		<lastmod><![CDATA[2022-04-19T23:46:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Vulnerabilities.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/api-security-the-backbone-to-a-digital-world/]]></loc>
		<lastmod><![CDATA[2022-04-19T03:20:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/api_sec.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/PromoTile.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/collaborating-cyber-insights-on-critical-infrastructure-act-changes/]]></loc>
		<lastmod><![CDATA[2022-04-19T02:10:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/1648093132724.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Gaye.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Backs-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Chats.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nothing-changes-if-nothing-changes/]]></loc>
		<lastmod><![CDATA[2022-04-19T01:52:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_globalised-threat-of-ransomware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ukraine-foils-planned-cyberattack-on-electricity-grid/]]></loc>
		<lastmod><![CDATA[2022-04-13T04:54:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Cyberattack-On-Electricity-Grid.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/devsecops-market-shift/]]></loc>
		<lastmod><![CDATA[2022-04-13T01:15:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/DevSecOps-Market.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/warning-for-customers-of-former-cryptocurrency-exchange/]]></loc>
		<lastmod><![CDATA[2022-04-12T23:53:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Cryptocurrency-Exchange.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyrc-vulnerability-advisory-stored-xss-in-directus/]]></loc>
		<lastmod><![CDATA[2022-04-12T03:43:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/CyRC-Vulnerability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/is-the-new-security-legislation-enough/]]></loc>
		<lastmod><![CDATA[2022-04-12T02:01:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Security-Legislation.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Security-Legislation1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ot-cybersecurity-in-conversation-with-robert-lee-ceo-founder-of-dragos/]]></loc>
		<lastmod><![CDATA[2022-04-11T06:29:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/RobertLee-Tile1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/RobertLee-Tile.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kpmg-builds-cyber-powerhouse/]]></loc>
		<lastmod><![CDATA[2022-04-11T02:15:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_National-Cyber-Lead.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/armis-opens-office-in-australia/]]></loc>
		<lastmod><![CDATA[2022-04-08T01:38:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Armis-Opens-Office-in-Australia.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-311-reforming-electronic-surveillance-in-australia-part-2-submission-from-the-australia-national-university/]]></loc>
		<lastmod><![CDATA[2022-04-07T08:12:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Episode311.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-318-multi-cloud-protection-of-a-digital-world/]]></loc>
		<lastmod><![CDATA[2022-04-07T08:04:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/Episode318.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/too-many-companies-failing-to-block-fraudulent-emails/]]></loc>
		<lastmod><![CDATA[2022-04-07T03:10:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Security-Culture-Maturity-Model.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-state-of-developer-driven-security/]]></loc>
		<lastmod><![CDATA[2022-04-07T02:52:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_The-State-of.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/watchguard-winners-announced/]]></loc>
		<lastmod><![CDATA[2022-04-07T02:30:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_WatchGuard-Winners.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/absolute-expansion/]]></loc>
		<lastmod><![CDATA[2022-04-07T00:15:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Absolute-Expansion.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/multi-cloud-protecting-in-a-digital-world/]]></loc>
		<lastmod><![CDATA[2022-04-06T06:46:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Multi-Cloud.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/JasonBaden.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-security-sectors-biggest-challenge/]]></loc>
		<lastmod><![CDATA[2022-04-06T05:45:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_Future-of-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/lets-kill-the-passwords-for-good/]]></loc>
		<lastmod><![CDATA[2022-04-06T03:41:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/04/img_password-less-future.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/china-and-russia-likely-behind-nation-state-attacks/]]></loc>
		<lastmod><![CDATA[2022-03-31T03:37:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Organisations-and-Nation-State-Cyber-Threats.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussie-kids-are-alright-dealing-with-online-risks/]]></loc>
		<lastmod><![CDATA[2022-03-30T03:41:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Safer-Kids-Online.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/budget-boost-of-9-9m-to-australian-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-03-30T03:11:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_2117812544.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/opening-of-macquaries-85m-data-centre/]]></loc>
		<lastmod><![CDATA[2022-03-28T01:09:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Data-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ransomware-groups-more-active-than-ever/]]></loc>
		<lastmod><![CDATA[2022-03-25T01:54:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_2022-Unit-42-Ransomware-Threat-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mtx-group-spreads-its-wings/]]></loc>
		<lastmod><![CDATA[2022-03-25T00:31:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_MTX-Group.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/66-report-difficulty-retaining-cybersecurity-professionals/]]></loc>
		<lastmod><![CDATA[2022-03-24T05:27:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_State-of-Cybersecurity-2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-right-dx-strategy-for-getting-ahead-in-the-digital-economy/]]></loc>
		<lastmod><![CDATA[2022-03-24T01:18:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Digital-Economy.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Digital-Economy1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Digital-Economy2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/secure-code-warrior-integrates-with-gitlab/]]></loc>
		<lastmod><![CDATA[2022-03-23T22:55:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_GitLabs-DevOps-Platform.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/recommendations-for-cybersecurity-labelling/]]></loc>
		<lastmod><![CDATA[2022-03-23T01:26:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/changing-of-the-guard-at-austcyber/]]></loc>
		<lastmod><![CDATA[2022-03-21T03:55:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Michelle-Price-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-coordinated-cybercrime-crackdown/]]></loc>
		<lastmod><![CDATA[2022-03-21T03:45:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyber-Security-Strategy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-small-businesses-post-lowest-growth-rate/]]></loc>
		<lastmod><![CDATA[2022-03-21T02:44:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Australian-small-businesses.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ey-bolsters-ranks-with-appointment-of-former-austcyber-ceo/]]></loc>
		<lastmod><![CDATA[2022-03-21T02:25:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Michelle-Price.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/building-a-global-encryption-business/]]></loc>
		<lastmod><![CDATA[2022-03-21T02:03:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_-Global-Encryption-Business.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/accc-slaps-down-meta/]]></loc>
		<lastmod><![CDATA[2022-03-18T03:55:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_1196788900.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_2065638467.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/calls-for-greater-scrutiny-of-ci-bill/]]></loc>
		<lastmod><![CDATA[2022-03-18T03:25:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Greater-Scrutiny-of-CI-Bill.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/logrhythm-appoints-new-anz-country-manager/]]></loc>
		<lastmod><![CDATA[2022-03-17T02:43:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Michael-Bovalino.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-security-fatigue/]]></loc>
		<lastmod><![CDATA[2022-03-17T02:16:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Australians-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/vulnerability-discovered-for-cri-o-container-engine/]]></loc>
		<lastmod><![CDATA[2022-03-16T03:00:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_CrowdStrikes-Cloud-Threat-Research.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/meta-pledges-additional-resources-to-counter-electoral-misinformation/]]></loc>
		<lastmod><![CDATA[2022-03-15T00:21:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_1919688479.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/exploring-the-myths-of-zero-trust/]]></loc>
		<lastmod><![CDATA[2022-03-14T23:34:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Myths-of-Zero-Trust.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/jumpcloud-lands-on-solid-leadership/]]></loc>
		<lastmod><![CDATA[2022-03-14T02:08:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Adam-Folb.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/check-point-on-point-with-new-leadership-team/]]></loc>
		<lastmod><![CDATA[2022-03-14T01:54:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Leo-Lynch.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/confidential-computing-enforces-the-trusted-execution-environment-tee/]]></loc>
		<lastmod><![CDATA[2022-03-29T17:00:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_30th-March.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/web-3-0-sign-in-with-ethereum-on-its-way/]]></loc>
		<lastmod><![CDATA[2022-03-22T17:00:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_23rd-March.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zero-knowledge-proofs-zkps-for-vulnerability-disclosure/]]></loc>
		<lastmod><![CDATA[2022-03-15T17:00:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_16th-March.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-three-malware-in-australia-revealed/]]></loc>
		<lastmod><![CDATA[2022-03-11T02:15:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_777674632-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/do-no-harm-first-rule-for-cyber-incident-first-responders/]]></loc>
		<lastmod><![CDATA[2022-03-10T02:11:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Rule-for-Cyber-Incident.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/39-australian-companies-adopting-multi-cloud-tech/]]></loc>
		<lastmod><![CDATA[2022-03-10T02:04:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Multi-Cloud-Tech.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/quintessencelabs-multibillion-dollar-quantum-safe-crypto-solutions/]]></loc>
		<lastmod><![CDATA[2022-03-09T04:02:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Quantum-Safe-Crypto-Solutions.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/google-buys-mandiant-in-blockbuster-5-4-billion-deal/]]></loc>
		<lastmod><![CDATA[2022-03-09T02:22:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_1083498080.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_1303879393-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/viatek-achieves-critical-security-and-quality-certifications/]]></loc>
		<lastmod><![CDATA[2022-03-09T01:33:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Critical-Security-and-Quality-Certifications.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/78-of-asx-200-companies-at-higher-risks-of-email-fraud/]]></loc>
		<lastmod><![CDATA[2022-03-08T02:01:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Email-Fraud.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-close-the-cybersecurity-gender-gap/]]></loc>
		<lastmod><![CDATA[2022-03-08T00:42:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/piya.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Judges-Panel-Social-Tile.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/women-in-cybersecurity-scholarship-australia/]]></loc>
		<lastmod><![CDATA[2022-03-08T00:16:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Women-in-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/TopWiS_MarketplaceBanner_Mobile_450x156.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-war-tactics-and-the-change-in-threat-landscape/]]></loc>
		<lastmod><![CDATA[2022-03-07T09:18:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/ru-spisode.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Mar4a.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/race-to-invest-in-cyber-technology/]]></loc>
		<lastmod><![CDATA[2022-03-08T23:11:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyber-Technology-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fake-news-of-cyberattacks-in-russian-ukraine-conflict/]]></loc>
		<lastmod><![CDATA[2022-03-07T01:09:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict4.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict5.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict6.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/img_Cyberattacks-in-Russian-Ukraine-Conflict7.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asg-to-acquire-velrada/]]></loc>
		<lastmod><![CDATA[2022-03-03T02:48:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/shutterstock_1246617028.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sekuro-secures-solid-growth/]]></loc>
		<lastmod><![CDATA[2022-03-03T02:30:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Sekuro-Secures-Growth.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/relativity-completes-irap-assessment/]]></loc>
		<lastmod><![CDATA[2022-03-03T01:42:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/03/Infosec-Registered-Assessors-Program.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/reform-of-australias-electronic-surveillance-framework/]]></loc>
		<lastmod><![CDATA[2022-02-28T11:48:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/set2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Feb24.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-310-reforming-electronic-surveillance-in-australia-part-1-submission-from-the-australia-computer-society/]]></loc>
		<lastmod><![CDATA[2022-02-28T11:30:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Episode310.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-centric-appoints-former-trend-micro-lead/]]></loc>
		<lastmod><![CDATA[2022-02-28T02:22:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Sameh-Girgis.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/45-increase-in-scams-reported-to-accc/]]></loc>
		<lastmod><![CDATA[2022-02-28T02:19:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Scams-Reported-to-ACCC.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/4.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/5.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/6.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-posts-strong-half-year-results/]]></loc>
		<lastmod><![CDATA[2022-02-28T01:34:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Tesserent-Posts-Strong-Half-Year-Results.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/tesserent.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Tesserent-Posts-Strong-Half-Year-Results.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-mayday-and-the-day-after-arrives-in-australia/]]></loc>
		<lastmod><![CDATA[2022-02-25T20:54:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Cyber-Mayday_3D-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/pic-3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/pic1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/CyberRisk-and-Cyber-Mayday_Combined_4.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/call-out-to-stop-deputising-tech-companies/]]></loc>
		<lastmod><![CDATA[2022-02-24T06:30:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Feb-18.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Feb-18.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dicker-data-acquires-hills/]]></loc>
		<lastmod><![CDATA[2022-02-24T02:03:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Dicker-Data-Acquires-Hills.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/billion-dollar-plan-to-stop-australian-tech-economy-falling-behind/]]></loc>
		<lastmod><![CDATA[2022-02-24T00:20:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Australian-Tech-Economy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/shields-up-cyber-agencies-issue-high-alerts/]]></loc>
		<lastmod><![CDATA[2022-02-23T21:50:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_2023392170.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-data-protection-lagging/]]></loc>
		<lastmod><![CDATA[2022-02-23T00:52:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_2078707528-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/health-and-finance-top-data-breach-sectors/]]></loc>
		<lastmod><![CDATA[2022-02-22T02:07:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_751047805.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/only-5-can-correctly-identify-a-scam/]]></loc>
		<lastmod><![CDATA[2022-02-22T01:19:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_216671029.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/personal-email-protection-with-duckduckgo/]]></loc>
		<lastmod><![CDATA[2022-03-08T17:00:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_9-March.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/DuckDuckGo.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defence-certification-for-veroguard-systems/]]></loc>
		<lastmod><![CDATA[2022-02-20T23:50:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/imgDefence-Certification-for-VeroGuard-Systems.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/amazon-branches-out-in-australia/]]></loc>
		<lastmod><![CDATA[2022-02-17T02:19:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_1921124915.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2022-ransomware-hostage-rescue-manual/]]></loc>
		<lastmod><![CDATA[2022-02-17T01:31:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_1955117524.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-first-veteran-cyber-academy/]]></loc>
		<lastmod><![CDATA[2022-02-17T00:50:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/SANS-Cyber-Academy.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/no-confidence-in-aus-government-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-02-15T22:29:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Aus-Government-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rayguns-fully-loaded-leadership-team/]]></loc>
		<lastmod><![CDATA[2022-02-15T00:02:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Eliza-Clulow.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/critical-infrastructure-acts-second-bill-introduced/]]></loc>
		<lastmod><![CDATA[2022-02-14T20:51:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_588723479.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/stop-the-press-murdoch-seconded-to-secolve/]]></loc>
		<lastmod><![CDATA[2022-02-14T03:29:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_mur.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zscaler-appoints-former-agl-chief/]]></loc>
		<lastmod><![CDATA[2022-02-14T00:55:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Heng-Mok.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-ransomware-gangs-keep-adapting/]]></loc>
		<lastmod><![CDATA[2022-02-10T01:26:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_1501789454.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asio-director-general-highlights-security-concerns-in-annual-threat-assessment/]]></loc>
		<lastmod><![CDATA[2022-02-10T00:43:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Annual-Threat-Assessment.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-and-lithuania-cyber-security-network/]]></loc>
		<lastmod><![CDATA[2022-02-09T23:52:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Cyber-Security-Network.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/quintessencelabs-supersizes-leadership-ranks/]]></loc>
		<lastmod><![CDATA[2022-02-09T03:37:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Silvio-Pappalardo.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sigstore-an-opensource-answer-to-software-supply-chain-security/]]></loc>
		<lastmod><![CDATA[2022-02-15T17:00:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_16-Feb.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Sigstore-in-works.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/oracles-in-the-crypto-world/]]></loc>
		<lastmod><![CDATA[2022-02-22T17:00:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_23-Feb.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mobile-device-cybersecurity-checklist/]]></loc>
		<lastmod><![CDATA[2022-03-01T17:00:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/shutterstock_2-March.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-will-we-stop-the-march-of-cybercrime/]]></loc>
		<lastmod><![CDATA[2022-02-09T01:09:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Cybercrime.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/way-to-secure-your-inactive-google-account/]]></loc>
		<lastmod><![CDATA[2022-02-08T23:26:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_746562430.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-research-from-isaca-explores-the-latest-trends-in-enterprise-privacy/]]></loc>
		<lastmod><![CDATA[2022-02-08T10:47:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_isca.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/ISACA2022.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/digital-gap-parents-and-teens-online-awareness/]]></loc>
		<lastmod><![CDATA[2022-02-08T05:06:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Digital-Gap.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-cloud-skillset-limited/]]></loc>
		<lastmod><![CDATA[2022-02-08T03:57:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Enterprise-Cloud-Index.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nextdcs-new-aws-direct-connect-sydney-location/]]></loc>
		<lastmod><![CDATA[2022-02-08T02:04:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_AWS-Direct-Connect.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-boost-your-salary-by-8k/]]></loc>
		<lastmod><![CDATA[2022-02-07T23:50:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Boost-Your-Salary.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-sus-out-sneaky-wifi-in-boardrooms/]]></loc>
		<lastmod><![CDATA[2022-02-07T23:35:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Sneaky-WiFi-in-Boardrooms.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/chinese-interests-allegedly-behind-news-corp-cyberattack/]]></loc>
		<lastmod><![CDATA[2022-02-07T04:05:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Corp-Cyberattack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/charge-to-improve-nations-cybersecurity/]]></loc>
		<lastmod><![CDATA[2022-02-07T00:39:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Nations-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/reuters-partners-with-6clicks/]]></loc>
		<lastmod><![CDATA[2022-02-04T01:57:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Reuters-Partners-with-6clicks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussie-cybersecurity-tech-partners-with-microsoft/]]></loc>
		<lastmod><![CDATA[2022-02-03T01:52:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Aussie-Cybersecurity-Tech.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/Dec21.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-practice-guide/]]></loc>
		<lastmod><![CDATA[2022-02-03T01:52:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Cybersecurity-Practice-Guide.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/safeguarding-public-access-of-library-archives/]]></loc>
		<lastmod><![CDATA[2022-02-03T00:32:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_digital-government.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/facebook-faces-world-first-criminal-charges-down-under/]]></loc>
		<lastmod><![CDATA[2022-02-03T00:16:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Facebook.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macro-deal-for-micro-focus/]]></loc>
		<lastmod><![CDATA[2022-02-02T00:37:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Macro-Deal-for-Micro-Focus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rubriks-new-md-an-industry-guru/]]></loc>
		<lastmod><![CDATA[2022-02-02T00:23:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_Scott-Magill.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paraflare-fanfare-with-appointment-of-former-nab-chief/]]></loc>
		<lastmod><![CDATA[2022-02-01T02:41:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/02/img_David-Fairman.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/latest-tesserent-cash-and-business-report/]]></loc>
		<lastmod><![CDATA[2022-01-31T02:13:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-02.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-03.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-04.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-05.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tesserent-Business-Report-06.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/warrants-issued-under-new-identify-disrupt-law/]]></loc>
		<lastmod><![CDATA[2022-01-31T01:49:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_137398256.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/data-privacy-day-2022/]]></loc>
		<lastmod><![CDATA[2022-01-27T23:37:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_cybr-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Guillaume-Noe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nist-releases-risk-report/]]></loc>
		<lastmod><![CDATA[2022-01-27T00:18:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_cybersecurity-risk-management.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/eventbrite-tile.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/uk-australia-cyber-and-critical-technology-partnership/]]></loc>
		<lastmod><![CDATA[2022-01-24T23:57:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Cyber-and-Critical-Technology.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-306-assessing-risk-in-ics-environments/]]></loc>
		<lastmod><![CDATA[2022-01-24T08:47:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Episode306.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/omicron-threat-to-businesses/]]></loc>
		<lastmod><![CDATA[2022-01-24T03:17:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Omicron-Threat-to-Businesses.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/online-safety-act-commences/]]></loc>
		<lastmod><![CDATA[2022-01-24T01:44:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Online-Safety-Act-Commences.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-cloud-computing-spend-sky-high/]]></loc>
		<lastmod><![CDATA[2022-01-24T00:34:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Cloud-Computing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/community-sourced-github-comes-to-rescue/]]></loc>
		<lastmod><![CDATA[2022-02-01T17:30:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_2091277234.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/bug-alert-critical-vulnerability-alerting-system/]]></loc>
		<lastmod><![CDATA[2022-01-25T17:00:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1497727082.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/critical-infrastructure-bill-final-blow-for-open-source/]]></loc>
		<lastmod><![CDATA[2022-01-21T02:21:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Critical-Infrastructure.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Critical-Infrastructure-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Critical-Infrastructure-02.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-cross-cyberattack-threatens-the-vulnerable/]]></loc>
		<lastmod><![CDATA[2022-01-20T02:56:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1571196460.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/quantum-computing-hits-99-accuracy/]]></loc>
		<lastmod><![CDATA[2022-01-20T00:06:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Quantum-Computing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/efex-acquires-logic-plus/]]></loc>
		<lastmod><![CDATA[2022-01-19T02:14:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_efex-Acquires-Logic-Plus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/baxe-partners-with-idemia-and-haventec/]]></loc>
		<lastmod><![CDATA[2022-01-19T01:22:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/BAXE.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/snyk-appoint-former-vmware-and-westpac-leaders/]]></loc>
		<lastmod><![CDATA[2022-01-18T00:27:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Tessa-Davis.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/equinix-launches-network-edge-in-melbourne/]]></loc>
		<lastmod><![CDATA[2022-01-18T00:26:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Network-Edge-in-Melbourne.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ukraine-accuses-russia-of-grey-zone-malware-attack/]]></loc>
		<lastmod><![CDATA[2022-01-17T00:46:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_179308868.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ping-identity-partners-with-ascention/]]></loc>
		<lastmod><![CDATA[2022-01-13T03:51:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Ping-Identity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/6-cyber-threats-to-look-out-for-in-2022/]]></loc>
		<lastmod><![CDATA[2022-01-13T03:38:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Cyber-Threats.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/bunnings-customer-data-compromised/]]></loc>
		<lastmod><![CDATA[2022-01-13T00:57:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1839093253.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macquarie-signs-government-cyber-agreement/]]></loc>
		<lastmod><![CDATA[2022-01-12T02:34:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_Cyber-Agreement.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/microsofts-latest-security-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2022-01-12T01:13:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1744949696.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-304-aussie-cyber-security-innovation-secures-over-us10m-for-us-expansion-plans/]]></loc>
		<lastmod><![CDATA[2022-01-11T09:12:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/Episode304.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-vulnerabilities-discovered-in-url-parsing/]]></loc>
		<lastmod><![CDATA[2022-01-11T02:16:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_URL-Parsing.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/img_URL-Parsing-02.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/protect-the-apis-using-leading-open-source-tools-part-ii/]]></loc>
		<lastmod><![CDATA[2022-01-18T17:30:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1348992422.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-5-api-testing-methods-to-secure-your-data-part-i/]]></loc>
		<lastmod><![CDATA[2022-01-11T17:30:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2022/01/shutterstock_1356746021-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-partners-with-vocus/]]></loc>
		<lastmod><![CDATA[2021-12-21T02:01:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Security-Information-and-Event-Monitoring.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/recommendations-for-log4j-mitigation/]]></loc>
		<lastmod><![CDATA[2021-12-20T01:44:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_vulnerability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-us-sign-data-sharing-agreement/]]></loc>
		<lastmod><![CDATA[2021-12-19T22:08:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_199068755.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/haventec-grows-with-passwordless-authentication/]]></loc>
		<lastmod><![CDATA[2021-12-17T03:02:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Passwordless-Authentication.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/three-tips-for-successful-cyber-defence/]]></loc>
		<lastmod><![CDATA[2021-12-17T02:32:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Cyber-Defence-Roadmap.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-cyber-threat-alert/]]></loc>
		<lastmod><![CDATA[2021-12-15T23:56:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Australian-Cyber-Threat.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/former-ibm-professional-joins-schneider-electric/]]></loc>
		<lastmod><![CDATA[2021-12-15T01:47:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Nikki-Saunders.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-numbers-behind-a-cyber-pandemic/]]></loc>
		<lastmod><![CDATA[2021-12-15T01:47:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/Cyber-Pandemic.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-02.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-03.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-04.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-05.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-07.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-08.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-09.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_acsm-10.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-hat-and-acscs-essential-eight/]]></loc>
		<lastmod><![CDATA[2021-12-14T04:24:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/the_essential_8.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-requirement-for-visa-payments-in-australia/]]></loc>
		<lastmod><![CDATA[2021-12-14T01:14:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_visa.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/south-australian-payroll-cyberattack/]]></loc>
		<lastmod><![CDATA[2021-12-12T21:23:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_402658597.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ai-in-cybersecurity-through-engineers-eyes/]]></loc>
		<lastmod><![CDATA[2021-12-10T01:33:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_AI-in-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-skills-boost-for-high-school-students/]]></loc>
		<lastmod><![CDATA[2021-12-09T02:55:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Securing-the-XIoT.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/queenslands-electricity-supply-under-cyberattack/]]></loc>
		<lastmod><![CDATA[2021-12-08T23:55:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_1236384691-1-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asic-cyber-resilience-report/]]></loc>
		<lastmod><![CDATA[2021-12-07T02:32:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_1838736967.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-authorities-keep-close-eye-on-blackmatter/]]></loc>
		<lastmod><![CDATA[2021-12-07T01:33:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_BlackMatter.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kasada-secures-23-million/]]></loc>
		<lastmod><![CDATA[2021-12-06T23:57:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Kasada-Secures.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-acquires-two-government-focused-organisations/]]></loc>
		<lastmod><![CDATA[2021-12-06T23:57:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/img_Tesserent-Limited.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/Tesserent.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/federal-government-goes-all-digital-by-2025/]]></loc>
		<lastmod><![CDATA[2021-12-06T23:25:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_188324945.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/social-media-giants-feel-the-heat-as-australian-government-launches-formal-inquiry/]]></loc>
		<lastmod><![CDATA[2021-12-01T21:19:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/12/shutterstock_201260894.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/eftpos-taps-into-ai-anti-fraud-technology/]]></loc>
		<lastmod><![CDATA[2021-11-30T01:43:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_AI-Anti-Fraud-Technology.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/adelaide-dark-fibre-build-sees-the-light/]]></loc>
		<lastmod><![CDATA[2021-11-30T01:19:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Aussie-Broadband.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/proposed-legislation-puts-social-media-trolls-on-notice/]]></loc>
		<lastmod><![CDATA[2021-11-29T07:58:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/shutterstock_722420158-2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/shutterstock_1488795377-2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/2021-Holiday-Resource-Kit-cover-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-resource-kit-to-protect-against-dangerous-holiday-scams/]]></loc>
		<lastmod><![CDATA[2021-11-29T06:51:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Holiday-Cybersecurity-Resource-Kit-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/be-aware-of-newly-disclosed-advanced-attacks-designed-to-steal-ip/]]></loc>
		<lastmod><![CDATA[2021-11-29T04:25:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Biomanufacturing-facilities.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/data-security-a-key-concern-for-trustees-as-cyber-risks-increase/]]></loc>
		<lastmod><![CDATA[2021-11-29T00:49:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Data-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/qualys-appoints-former-tal-and-amp-cyber-expert-as-chief-tso/]]></loc>
		<lastmod><![CDATA[2021-11-25T00:52:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Rahn-Wakeley-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/leading-uk-grc-tech-heads-down-under-to-meet-demand/]]></loc>
		<lastmod><![CDATA[2021-11-24T03:38:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Australian-compliance-market-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/logicalis-and-microsoft-announce-secure-onmesh/]]></loc>
		<lastmod><![CDATA[2021-11-24T00:51:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Secure-OnMesh-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/critical-infrastructure-bill-passes-senate-with-labor-backing/]]></loc>
		<lastmod><![CDATA[2021-11-23T01:45:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Critical-Infrastructure-Bill.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-10-products-reported-in-online-shopping-scams-in-2021/]]></loc>
		<lastmod><![CDATA[2021-11-23T00:52:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_A-ScamWatch-Alert.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/demographic.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/Top-10-products-reported-in-online-shopping-scams-in-2021-.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/uk-giant-acquires-aussies-saas-compliance-company-for-105m/]]></loc>
		<lastmod><![CDATA[2021-11-22T07:45:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_SaS-Compliance-Company-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/200-most-common-passwords-of-2021-in-australia/]]></loc>
		<lastmod><![CDATA[2021-11-22T07:09:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Common-Passwords-Of-2021-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/former-sophos-account-executive-steps-into-extrahop-management-position/]]></loc>
		<lastmod><![CDATA[2021-11-22T01:32:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Tanya-Hovagimian-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-faces-join-tesserents-leadership-team-in-time-for-roadshow/]]></loc>
		<lastmod><![CDATA[2021-11-19T03:16:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_krut-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asd-co-lab-orate-with-anu-to-foster-new-cyber-talent/]]></loc>
		<lastmod><![CDATA[2021-11-19T01:22:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Talent-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/79-shortfall-of-skilled-workers-in-australia-predicted-by-2025/]]></loc>
		<lastmod><![CDATA[2021-11-19T00:41:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Amazon-Web-Services-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/global-joint-advisory-issues-warning-of-iranian-cyber-activity-threat/]]></loc>
		<lastmod><![CDATA[2021-11-18T01:48:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Iranian-Cyber-Activity-Threat-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/docusign-receives-protected-assessment-for-e-signature/]]></loc>
		<lastmod><![CDATA[2021-11-17T01:46:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_eSignature-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/capgemini-acquires-empired-limited/]]></loc>
		<lastmod><![CDATA[2021-11-17T00:57:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Capgemini-Acquires-Empired-Limited.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/google-australias-1-billion-investment-promises-thousands-of-new-jobs/]]></loc>
		<lastmod><![CDATA[2021-11-16T03:01:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Google-Australia-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/acsc-alerts-flags-microsoft-excel-palo-alto-firewall-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2021-11-12T01:38:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_The-Excel-vulnerability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/60-australian-organisations-anticipate-increase-in-cyber-crime/]]></loc>
		<lastmod><![CDATA[2021-11-12T00:59:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Crime.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussies-still-using-check-in-apps-despite-distrust/]]></loc>
		<lastmod><![CDATA[2021-11-11T23:24:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Check-In-Apps.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/warning-kids-are-not-alright-online/]]></loc>
		<lastmod><![CDATA[2021-11-11T02:02:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Kids-Are-Not-Alright-Online.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-learning-available-for-veterans-and-spouses/]]></loc>
		<lastmod><![CDATA[2021-11-11T01:49:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Academy-Scholarship.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/68-australian-businesses-at-risk-of-ransomware-attack/]]></loc>
		<lastmod><![CDATA[2021-11-10T02:24:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Australian-Business-Assurance-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-294-zero-trust-approach-us13-billion-market-opportunity/]]></loc>
		<lastmod><![CDATA[2021-11-09T04:09:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/Episode294.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cpa-audits-its-own-cybersecurity-performance/]]></loc>
		<lastmod><![CDATA[2021-11-09T01:51:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cybersecurity-Performance.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-education-crucial-for-future-skills-legacy/]]></loc>
		<lastmod><![CDATA[2021-11-09T01:49:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Education.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-breach-warning-for-all-mysa-gov-users/]]></loc>
		<lastmod><![CDATA[2021-11-05T01:58:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Security-Breach-Warning.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/mysagov.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aussies-walk-away-from-brands-that-dont-protect-them-from-cyber-threats/]]></loc>
		<lastmod><![CDATA[2021-11-04T03:16:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Threats.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/terrestrial-communications-contract-nets-telstra-a-nice-1-billion/]]></loc>
		<lastmod><![CDATA[2021-11-04T02:56:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Terrestrial-Communications.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/curtin-amazon-web-services-collaborate-to-transform-digital-experiences/]]></loc>
		<lastmod><![CDATA[2021-11-03T01:27:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Web-Services.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/audit-details-poor-cyber-maturity-across-nsw-government-agencies/]]></loc>
		<lastmod><![CDATA[2021-11-02T05:56:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Cyber-Maturity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/enterprise-security-spending-in-australia-to-increase-at-6-7-cagr-over-2020-2025/]]></loc>
		<lastmod><![CDATA[2021-11-02T01:57:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_Enterprise-Security-Spending.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybertrace-launches-scamsleuth/]]></loc>
		<lastmod><![CDATA[2021-11-01T01:07:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/11/img_ScamSleuth.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zero-trust-approach-us13-billion-market-opportunity/]]></loc>
		<lastmod><![CDATA[2021-10-29T03:54:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Zero-Trust-Approach.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/auldhouse-to-become-new-zealands-leading-cybersecurity-training-provider/]]></loc>
		<lastmod><![CDATA[2021-10-29T03:39:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cybersecurity-Training-Provider.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-start-ups-dazzle-at-cyber-week-pitch-event/]]></loc>
		<lastmod><![CDATA[2021-10-28T03:25:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cyber-Week-Pitch-Event.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-releases-september-appendix-4c-quarterly-activities-report-and-operational-update/]]></loc>
		<lastmod><![CDATA[2021-10-28T02:15:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Quarterly-Activities-Report.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nationwide-survey-finds-women-in-stem-are-underpaid-underrepresented-and-unsupported/]]></loc>
		<lastmod><![CDATA[2021-10-27T04:45:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Women-in-Stem-Are-Underpaid.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/orro-reshapes-service-areas-with-key-appointments/]]></loc>
		<lastmod><![CDATA[2021-10-27T03:40:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Orro.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-draft-legislation-calls-for-stronger-protections-for-childrens-privacy-and-safety-online/]]></loc>
		<lastmod><![CDATA[2021-10-27T03:16:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Privacy-And-Safety.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-program-to-support-next-generation-of-cyber-security-experts/]]></loc>
		<lastmod><![CDATA[2021-10-27T03:13:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cyber-Security-Experts.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/quintessencelabs-raises-25-million-to-take-quantum-safe-cybersecurity-worldwide/]]></loc>
		<lastmod><![CDATA[2021-10-27T02:04:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cybersecurity.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/63-of-australian-organisations-expect-to-face-a-cyberattack-within-a-year/]]></loc>
		<lastmod><![CDATA[2021-10-27T01:05:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1921030160.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/hypothetical-hospital-cyber-attack-highlights-cyber-risks-in-healthcare/]]></loc>
		<lastmod><![CDATA[2021-10-26T05:50:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cyber-Risks-in-Healthcare.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-291-global-coalition-builds-to-protect-cyber-researchers/]]></loc>
		<lastmod><![CDATA[2021-10-26T02:48:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Episode291.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-network-testing-and-assurance-lab-launches-to-provide-proof-of-performance/]]></loc>
		<lastmod><![CDATA[2021-10-26T02:24:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Network-Testing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/turning-cyber-health-scare-into-digital-trust/]]></loc>
		<lastmod><![CDATA[2021-10-26T02:14:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Guillaume-Noe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/60m-to-grow-australias-cyber-security-workforce/]]></loc>
		<lastmod><![CDATA[2021-10-25T20:29:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_571087984.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nextdc-to-develop-darwins-first-world-class-data-centre-in-partnership-with-northern-territory-government/]]></loc>
		<lastmod><![CDATA[2021-10-25T02:36:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Data-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/check-point-reveals-discord-infrastructure-can-be-used-for-malicious-intent/]]></loc>
		<lastmod><![CDATA[2021-10-22T02:59:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Malicious-Intent.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/white-paper-exposes-pitfalls-shares-solutions-for-safe-data-sharing/]]></loc>
		<lastmod><![CDATA[2021-10-21T05:05:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Safe-Data-Sharing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-eset-home-platform-offers-consumers-greater-control-and-superior-management/]]></loc>
		<lastmod><![CDATA[2021-10-21T00:55:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_-HOME-Platform.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cloudflare-research-reveals-australian-enterprises-lead-asia-pacific-adoption-of-zero-trust/]]></loc>
		<lastmod><![CDATA[2021-10-21T00:53:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_IT-and-cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/global-coalition-builds-to-protect-cyber-researchers/]]></loc>
		<lastmod><![CDATA[2021-10-20T04:13:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_oct19.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2-out-of-3-australian-smbs-became-victims-of-cyber-attacks-over-the-past-year/]]></loc>
		<lastmod><![CDATA[2021-10-20T03:02:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_2045225453.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/la-trobe-university-unveils-technology-investment-with-partners-cisco-and-optus-enterprise/]]></loc>
		<lastmod><![CDATA[2021-10-20T02:15:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Latrobe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/preparing-australian-business-for-a-cyber-attack/]]></loc>
		<lastmod><![CDATA[2021-10-18T22:05:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_652587526.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/CYB10510_banners_media_partners_v5_high_res5_side-tile.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/four-established-australian-security-consultancies-join-forces-to-become-sekuro/]]></loc>
		<lastmod><![CDATA[2021-10-18T02:39:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1291900534.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/softiron-to-launch-australias-first-ever-computer-manufacturing-facility/]]></loc>
		<lastmod><![CDATA[2021-10-18T02:32:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1747004057.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Motorola-Powerpoint-Still-Screen.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/check-point-reveals-top-malware-affecting-australians-in-september/]]></loc>
		<lastmod><![CDATA[2021-10-18T02:22:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_422673484.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/motorola-solutions-hauls-in-seven-good-design-australia-awards/]]></loc>
		<lastmod><![CDATA[2021-10-17T23:19:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1792919920.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Oct28-latest2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/venueswest-adds-hyprfires-firebug-to-its-cyber-security-defences/]]></loc>
		<lastmod><![CDATA[2021-10-14T23:56:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_121063801.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-tech-start-up-signs-global-deal-with-speedcast/]]></loc>
		<lastmod><![CDATA[2021-10-14T22:02:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1822122983.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/government-takes-up-calls-for-national-ransomware-strategy/]]></loc>
		<lastmod><![CDATA[2021-10-14T21:42:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_2048008340.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rba-sees-widespread-stress-from-inevitable-cyber-attacks-on-banks/]]></loc>
		<lastmod><![CDATA[2021-10-14T01:57:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Inevitable-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Inevitable-02.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/akamai-appoints-chris-gibbs-as-managing-director-and-regional-vice-president-anz/]]></loc>
		<lastmod><![CDATA[2021-10-14T00:41:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/CHRIS-GIBBS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tech-associations-call-on-australian-lawmakers-to-revise-critical-infrastructure-bill/]]></loc>
		<lastmod><![CDATA[2021-10-14T00:33:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Critical-Infrastructure-Bill.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/south-australia-and-queensland-uplifting-cyber-resilience-of-defence-smes-with-cynch-cyber-fitness-program/]]></loc>
		<lastmod><![CDATA[2021-10-13T22:47:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Cyber-Resilience.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-plan-to-protect-australians-against-ransomware/]]></loc>
		<lastmod><![CDATA[2021-10-13T20:47:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1407725624.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/micro-credentialling-helps-plug-australias-cyber-skills-gap/]]></loc>
		<lastmod><![CDATA[2021-10-13T06:38:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Australias-Cyber-Skills-Gap.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/middle-aged-australians-ripped-off-by-investment-scams-hitting-a-record-high/]]></loc>
		<lastmod><![CDATA[2021-10-13T00:57:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Investment-Scams-main.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Investment-Scams-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Investment-Scams-03.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Investment-Scams-04.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/Investment-Scams-05.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/draft-guide-on-cybersecurity-for-distributed-energy-resources-call-for-comment/]]></loc>
		<lastmod><![CDATA[2021-10-13T00:34:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Cybersecurity-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aucyberweek21-with-michelle-price/]]></loc>
		<lastmod><![CDATA[2021-10-12T12:27:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Oct12.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/pwc-australia-strengthens-cybersecurity-capabilities-with-websecure-acquisition/]]></loc>
		<lastmod><![CDATA[2021-10-12T02:33:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_PwC-Australia.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sharpening-the-cyber-security-axe-in-australia-to-stay-in-the-race/]]></loc>
		<lastmod><![CDATA[2021-10-12T02:08:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1421868443.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1869186550.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/sarah-bailey-penten.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1862158930.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1150273004.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_777674632.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_650843539.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/shutterstock_1344705506.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/four-hour-training-sessions-the-most-time-efficient-way-for-australian-technology-professionals-to-get-ahead/]]></loc>
		<lastmod><![CDATA[2021-10-12T01:45:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Australian-Technology.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-mobile-wallet-adoption-surge-creates-new-opportunities-and-challenges-for-merchants/]]></loc>
		<lastmod><![CDATA[2021-10-12T00:02:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_-Adoption-Surge.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Adoption-Surge-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Adoption-Surge-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ransomware-its-just-getting-worse/]]></loc>
		<lastmod><![CDATA[2021-10-11T05:52:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_slider-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/keeping-australian-data-safe-and-secure/]]></loc>
		<lastmod><![CDATA[2021-10-08T01:29:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Amazon-Web-Services-AWS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/85-of-australians-are-concerned-about-data-privacy/]]></loc>
		<lastmod><![CDATA[2021-10-07T04:08:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_tiktok.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/massive-data-leak-following-twitch-cyberattack/]]></loc>
		<lastmod><![CDATA[2021-10-07T02:24:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_cyberattack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/armis-appoints-andrew-draper-as-regional-vice-president-for-asia-pacific-and-japan/]]></loc>
		<lastmod><![CDATA[2021-10-07T02:06:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Andrew-Draper.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/facebooks-network-backbone-breaks-causing-six-hour-outage/]]></loc>
		<lastmod><![CDATA[2021-10-06T05:20:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Facebooks-Network.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/claroty-discloses-three-severe-vulnerabilities-in-honeywells-experion-pks/]]></loc>
		<lastmod><![CDATA[2021-10-06T02:45:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Process-Knowledge-System.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/yubico-launches-first-yubikeys-with-biometric-authentication/]]></loc>
		<lastmod><![CDATA[2021-10-06T02:19:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_Biometric-Authentication.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/group-ib-chief-executive-officer-facing-treason-charge-following-arrest/]]></loc>
		<lastmod><![CDATA[2021-10-04T00:34:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/10/img_cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/what-changes-to-the-critical-infrastructure-act-will-mean-to-industry-cyber-risk-meetup-highlights/]]></loc>
		<lastmod><![CDATA[2021-09-30T06:56:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/E_9w8bzVgAIfbl0.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/E_9w8bTVQAABTqi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-286-acsc-annual-cyber-security-threat-report-20-2021-industry-sector-review/]]></loc>
		<lastmod><![CDATA[2021-09-30T03:54:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Episode286.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/enterprise-server-spending-in-australia-to-increase-at-6-3-cagr-over-2020-2025/]]></loc>
		<lastmod><![CDATA[2021-09-30T01:33:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_IT-modernization-efforts.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/pjcis-recommends-critical-infrastructure-bill-split-to-tackle-urgent-threats/]]></loc>
		<lastmod><![CDATA[2021-09-29T01:28:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_critical-infrastructure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-digital-competitiveness-slide-accelerates/]]></loc>
		<lastmod><![CDATA[2021-09-29T00:29:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Australias-digital-competitiveness.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/scientists-focus-on-keeping-australians-safe/]]></loc>
		<lastmod><![CDATA[2021-09-28T23:55:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scientists-Focus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/public-comments-close-october-4-for-nccoe-mitigating-cybersecurity-risk-in-telehealth-smart-home-integration-project-description/]]></loc>
		<lastmod><![CDATA[2021-09-28T23:55:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Australians-Safety.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mastercard-applies-for-accreditation-under-the-trusted-digital-identity-framework-in-australia/]]></loc>
		<lastmod><![CDATA[2021-09-28T01:51:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_-Digital-Identity-Framework.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Ekata-Webinar5.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/eset-research-discovers-famoussparrow-apt-group-spying-on-hotels-governments-and-private-companies/]]></loc>
		<lastmod><![CDATA[2021-09-27T01:02:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Cyberespionage-Group.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Slide1-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/state-of-cybersecurity-part-2/]]></loc>
		<lastmod><![CDATA[2021-09-24T07:42:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/hikvision-vulnerability-leaves-surveillance-cameras-open-to-cyberattacks/]]></loc>
		<lastmod><![CDATA[2021-09-22T22:18:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/shutterstock_1858733785.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cring-ransomware-exploits-11-year-old-adobe-coldfusion-software-to-launch-advanced-attack/]]></loc>
		<lastmod><![CDATA[2021-09-22T03:51:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Cring-Ransomware.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Slide1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/omigod-vulnerability-risk-for-microsoft-azure-cloud-customers/]]></loc>
		<lastmod><![CDATA[2021-09-22T03:46:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Microsoft-Azure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/child-wise-partners-with-global-software-company-netclean/]]></loc>
		<lastmod><![CDATA[2021-09-22T02:45:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Child-Wise.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/empired-wins-au15-million-managed-services-contract-with-horizon-power/]]></loc>
		<lastmod><![CDATA[2021-09-22T00:24:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/imgHorizon-Power.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/atturra-appoints-estelle-ivory-as-general-manager-business-applications/]]></loc>
		<lastmod><![CDATA[2021-09-20T02:08:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Estelle-Ivory.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macquarie-telecom-group-reaches-milestone-for-government-security-cleared-personnel/]]></loc>
		<lastmod><![CDATA[2021-09-20T01:25:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Macquarie-Telecom.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/isaca-conference-oceania-2021/]]></loc>
		<lastmod><![CDATA[2021-09-16T02:56:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_ISACA-Conference.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/ISACA_conference_Oceania_2021_logo_RGB.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/orro-announces-esecure-acquisition/]]></loc>
		<lastmod><![CDATA[2021-09-16T02:19:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_eSecure-Acquisition.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/92-of-anz-it-professionals-find-observability-of-strategic-importance-to-business/]]></loc>
		<lastmod><![CDATA[2021-09-16T02:02:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Strategic-Importance.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/vault-cloud-partners-with-iseek-in-queenslands-first-protected-cloud-service/]]></loc>
		<lastmod><![CDATA[2021-09-16T00:45:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_cloud.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/acsc-annual-cyber-threat-report-confirms-cyber-crime-is-on-the-rise/]]></loc>
		<lastmod><![CDATA[2021-09-15T04:58:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/ACSC-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-invests-in-federal-government-integration-and-innovation-centre/]]></loc>
		<lastmod><![CDATA[2021-09-15T03:13:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Innovation-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-appoints-former-head-of-uk-national-cyber-security-centre/]]></loc>
		<lastmod><![CDATA[2021-09-15T02:26:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Ciaran-Martin.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/avanade-appoints-laura-malcolm-to-lead-australia-business/]]></loc>
		<lastmod><![CDATA[2021-09-14T02:16:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Laura-Malcolm.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-10-malware-affecting-australians/]]></loc>
		<lastmod><![CDATA[2021-09-13T02:35:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Malware-Affecting.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/call-for-a-cyber-security-summit-interview-with-liberal-senator-eric-abetz/]]></loc>
		<lastmod><![CDATA[2021-09-10T10:01:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Sept9a.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/scams-increase-by-more-than-50-in-august-as-australians-in-lockdown-are-hit-hard-by-identity-theft/]]></loc>
		<lastmod><![CDATA[2021-09-10T02:42:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scams-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scams-02.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scams-03.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scams-04.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Scams-05.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/with-a-cyber-attack-every-10-minutes-its-time-for-a-cyber-security-summit/]]></loc>
		<lastmod><![CDATA[2021-09-09T05:31:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Abetz_Eric_20200413-07.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Slide4a2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/now-open-for-comment-nists-draft-ransomware-risk-management-profile/]]></loc>
		<lastmod><![CDATA[2021-09-09T00:34:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Ransomware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/crest-launches-new-globally-available-practical-penetration-testing-certification/]]></loc>
		<lastmod><![CDATA[2021-09-08T01:37:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Practical-Penetration-Testing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ping-identity-appoints-australia-and-new-zealand-channel-manager/]]></loc>
		<lastmod><![CDATA[2021-09-08T00:03:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Robert-Cipriani.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ddls-acquires-auldhouse-to-create-trans-tasman-ict-and-digital-skills-training-powerhouse/]]></loc>
		<lastmod><![CDATA[2021-09-07T01:17:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_AULDHOUSE-ROOMS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asia-pacific-the-top-region-for-network-ddos-attacks-in-2021/]]></loc>
		<lastmod><![CDATA[2021-09-03T02:56:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_445200349.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/critical-vulnerability-leaves-atlassians-confluence-exposed/]]></loc>
		<lastmod><![CDATA[2021-09-02T03:23:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Critical-Vulnerability.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/enrolments-open-for-the-2022-adf-cyber-gap-program/]]></loc>
		<lastmod><![CDATA[2021-09-02T01:29:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_Cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nist-seeking-comments-draft-criteria-for-labelling-program-on-capabilities-of-iot-devices/]]></loc>
		<lastmod><![CDATA[2021-09-02T01:27:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_-IoT-Devices.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-281-canberras-hackerspace-analysis-of-infosect-researching-with-a-passion/]]></loc>
		<lastmod><![CDATA[2021-09-01T14:51:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/Episode281.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/bad-actor-targets-stonnington-city-council-in-cyberattack/]]></loc>
		<lastmod><![CDATA[2021-09-01T06:09:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_-Stonnington-cyberattack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/global-storage-announces-new-sales-director/]]></loc>
		<lastmod><![CDATA[2021-09-01T03:10:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/09/img_James-Mackie.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-will-not-become-a-leading-digital-economy-by-2030-without-a-full-scale-national-strategy-aiia-warns/]]></loc>
		<lastmod><![CDATA[2021-08-31T02:26:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/AI.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/best-is-in-the-west-wa-schools-sweep-national-science-week-hackathon-awards/]]></loc>
		<lastmod><![CDATA[2021-08-31T00:08:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_school-pic-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_school-pic-02.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zscaler-expands-anz-commercial-segment-presence-with-orca-tech-appointment-as-distributor-for-australia/]]></loc>
		<lastmod><![CDATA[2021-08-30T01:39:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Craig-Ashwood.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Foad_Farrokhnia.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/gut-instinct-could-see-you-fall-for-covid-misinformation/]]></loc>
		<lastmod><![CDATA[2021-08-30T01:18:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_COVID-19.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/telcos-fail-to-respond-to-rising-rates-of-phone-spoofing/]]></loc>
		<lastmod><![CDATA[2021-08-26T06:36:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Phone-Spoofing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-senate-passes-identify-and-disrupt-bill-amid-overreach-concerns/]]></loc>
		<lastmod><![CDATA[2021-08-26T03:09:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_digitally-spy-on-suspected-criminals.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macquarie-telecom-group-delivers-7-successive-years-of-ebitda-growth/]]></loc>
		<lastmod><![CDATA[2021-08-25T04:00:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Macquarie-Telecom.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/Aiden_Tudehope_-U_tube-thumbnail.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kaseya-launches-online-collaboration-platform-and-expands-in-australia/]]></loc>
		<lastmod><![CDATA[2021-08-24T01:40:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_APAC-Expansion.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/police-charge-ships-master-over-cut-telecommunications-cable/]]></loc>
		<lastmod><![CDATA[2021-08-23T05:05:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Telecommunications-Cable.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/education-sector-sees-29-increase-in-attacks-against-organisations-globally/]]></loc>
		<lastmod><![CDATA[2021-08-23T04:13:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Attacks-Against-Organisations-Globally.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/chat-table1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/chat-table2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/report-highlights-ransomware-and-impersonation-fraud-as-concerns/]]></loc>
		<lastmod><![CDATA[2021-08-23T01:53:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Ransomware-and-Impersonation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/3-steps-to-strengthening-cyber-defences-and-resilience/]]></loc>
		<lastmod><![CDATA[2021-08-23T01:31:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Cyber-Defences-and-Resilience.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://cyberriskleaders.com/wp-content/uploads/2021/08/Slide4a2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-aquires-loop-secure/]]></loc>
		<lastmod><![CDATA[2021-08-19T03:32:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Tesserent-Aquires-Loop-Secure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/velrada-bolsters-team-with-suite-of-strategic-hires-and-organisational-changes/]]></loc>
		<lastmod><![CDATA[2021-08-19T02:40:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Velrada-Bolsters-Team.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/women-in-stem-support-hits-record-high/]]></loc>
		<lastmod><![CDATA[2021-08-18T07:21:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Women-in-Stem-Support.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/Aug17.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/data-protection-considerations-during-a-security-transformation-project-webinar-takeaway/]]></loc>
		<lastmod><![CDATA[2021-08-18T06:40:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Security-Transformation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-expands-services-in-new-zealand-and-establishes-new-entity/]]></loc>
		<lastmod><![CDATA[2021-08-18T01:45:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Tesserent.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/snp-expands-portfolio-with-new-sap-s-4hana-migration-solution-for-ibm-cloud/]]></loc>
		<lastmod><![CDATA[2021-08-18T01:44:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_cloud-software.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/Aug3-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-law-firm-modernises-with-cloud-first-approach/]]></loc>
		<lastmod><![CDATA[2021-08-18T01:01:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Cloud-first-Approach.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-50m-equity-partner-for-penten/]]></loc>
		<lastmod><![CDATA[2021-08-16T00:08:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Matthew-and-Sarah-portrait-002.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sophos-australias-data-centre-open-for-business/]]></loc>
		<lastmod><![CDATA[2021-08-11T01:53:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_data-centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/proofpoint-appoints-yvette-lejins-as-resident-ciso-for-apac-region/]]></loc>
		<lastmod><![CDATA[2021-08-11T00:43:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Yvette-Lejins.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/riverbed-appoints-new-anz-country-manager/]]></loc>
		<lastmod><![CDATA[2021-08-10T00:59:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Tony-Wright.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/civic-data-to-offer-agnostic-data-analytics-solutions-in-new-advisory/]]></loc>
		<lastmod><![CDATA[2021-08-10T00:38:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Civic-Data.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/abs-confident-it-infrastructure-can-handle-2021-census-risks/]]></loc>
		<lastmod><![CDATA[2021-08-09T22:13:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/shutterstock_1217250034.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-data-strategy-for-department-of-defence/]]></loc>
		<lastmod><![CDATA[2021-08-09T08:56:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Department-of-Defence.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-iis-web-server-threats-eavesdropping-on-governments-and-targeting-e-commerce-transactions/]]></loc>
		<lastmod><![CDATA[2021-08-09T04:58:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_IIS-web-server-threats.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/attribute-based-access-control-for-microservices-based-applications-using-a-service-mesh-nist-sp-800-204b/]]></loc>
		<lastmod><![CDATA[2021-08-08T06:51:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/decor-image_Cloud-native-applications.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ey-set-for-secureworx-acquisition/]]></loc>
		<lastmod><![CDATA[2021-08-08T00:49:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_ecureworx-Acquisition-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/a-major-industry-wake-up-call-is-needed-to-shield-australian-critical-national-infrastructure-from-increased-cyber-threat/]]></loc>
		<lastmod><![CDATA[2021-08-07T06:30:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Ransomware-attacks.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/pic_Chris-Fisher.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/snp-launches-strategic-alliance-with-think180-australia/]]></loc>
		<lastmod><![CDATA[2021-08-06T06:28:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Remote-Migration.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/proposal-to-withdraw-special-publications-800-15-800-25-and-800-32/]]></loc>
		<lastmod><![CDATA[2021-08-05T06:01:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Withdraw-Special-Publications-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/69-of-australian-organisations-expect-to-experience-a-breach-of-customer-records-in-the-next-year/]]></loc>
		<lastmod><![CDATA[2021-08-05T03:53:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Australian-Organisations-Expect.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/qualys-collaborates-with-red-hat/]]></loc>
		<lastmod><![CDATA[2021-08-05T03:06:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Qualys-Collaborates.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/Aug3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/elastic-releases-limitless-security-tool/]]></loc>
		<lastmod><![CDATA[2021-08-05T02:09:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_tony.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-pc-home-users-have-a-24-chance-of-encountering-cyber-threats/]]></loc>
		<lastmod><![CDATA[2021-08-03T02:39:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Australian-PC.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/Australia-All-Threats-2021.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/joint-cybersecurity-advisory-fails-to-capture-non-technical-aspects-of-attacks/]]></loc>
		<lastmod><![CDATA[2021-08-01T23:44:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/08/img_Non-Technical-Aspects-Of-Attacks.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/5-ways-to-defend-against-spyware-attack-on-your-smartphone/]]></loc>
		<lastmod><![CDATA[2021-07-31T02:43:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_smartphone.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/home-affairs-says-no-time-to-lose-with-critical-infrastructure-bill/]]></loc>
		<lastmod><![CDATA[2021-07-30T01:26:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Critical-Infrastructure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-surges-on-back-of-record-growth-for-the-june-quarter/]]></loc>
		<lastmod><![CDATA[2021-07-29T05:29:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Tesserent-surges.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Tesserent-surges-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Tesserent-surges-02.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Tesserent-surges-03.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/opportunities-for-business-and-it-collaboration-in-managing-enterprise-risk/]]></loc>
		<lastmod><![CDATA[2021-07-29T02:27:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/omg_Opportunities-for.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kaseya-denies-ransom-payment-as-decryptor-key-released/]]></loc>
		<lastmod><![CDATA[2021-07-28T05:42:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_kaseya.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/anti-lockdown-protests-see-nsw-police-use-data-to-make-arrests/]]></loc>
		<lastmod><![CDATA[2021-07-27T02:52:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Anti-Lockdown-Protests.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/microsoft-to-deliver-on-austcybers-traineeship-program/]]></loc>
		<lastmod><![CDATA[2021-07-26T04:44:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_AustCybers-Traineeship-Program.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/redacted-report-hides-data-on-covidsafe-apps-effectiveness/]]></loc>
		<lastmod><![CDATA[2021-07-23T03:13:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_COVIDSafe-Apps.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/operation-orcus-task-force-established-to-fight-ransomware-gangs/]]></loc>
		<lastmod><![CDATA[2021-07-20T06:34:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Operation-Orcus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/act-now-to-defend-against-vicious-cybercriminals-australian-cyber-security-centre/]]></loc>
		<lastmod><![CDATA[2021-07-20T01:58:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Australian-Cyber-Security-Centre.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/china-attributed-by-us-allies-for-microsoft-exchange-attack/]]></loc>
		<lastmod><![CDATA[2021-07-20T01:34:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/shutterstock_1652741782.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-joins-allies-condemning-chinese-state-sponsored-malicious-cyber-activity/]]></loc>
		<lastmod><![CDATA[2021-07-20T01:33:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/shutterstock_1759719731.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nextdc-enhanced-with-google-cloud-expansion/]]></loc>
		<lastmod><![CDATA[2021-07-20T01:14:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_google-cloud.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/andy-penn-hands-down-cyber-security-industry-advisory-committee-2021-annual-report/]]></loc>
		<lastmod><![CDATA[2021-07-16T03:32:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_2021-Annual-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-itsm-hub-rolls-out-nist-cyber-security-professional-program/]]></loc>
		<lastmod><![CDATA[2021-07-15T01:32:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_NIST-Cyber-Security.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/NCSP-Bootcamp-Foundation-Practitioner.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/NIST-Cyber-Security-Professional.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-audit-office-report-exposes-significant-cybersecurity-vulnerabilities-at-sydney-trains-tfnsw/]]></loc>
		<lastmod><![CDATA[2021-07-14T07:28:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Sydney-Trains-TfNSW.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/education-suffered-more-ransomware-attacks-than-any-other-sector-in-2020/]]></loc>
		<lastmod><![CDATA[2021-07-14T02:50:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/shutterstock_660345604.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-271-cybersecurity-professionals-australia-invests-8-million-on-skills-and-availability/]]></loc>
		<lastmod><![CDATA[2021-07-13T05:05:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/Episode271.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-272-virsec-enters-anz-cybersecurity-market/]]></loc>
		<lastmod><![CDATA[2021-07-13T05:05:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/Episode272.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/simplifying-security-why-a-robust-secure-internet-gateway-doesnt-have-to-break-the-bank/]]></loc>
		<lastmod><![CDATA[2021-07-12T05:21:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Simplifying-Security.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/parliamentary-committee-warned-about-malignant-state-actors-as-big-tech-resists-proposed-reforms/]]></loc>
		<lastmod><![CDATA[2021-07-12T04:24:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_pcwam.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-education-department-cyberattack-as-term-3-resumes/]]></loc>
		<lastmod><![CDATA[2021-07-12T04:00:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_edu-cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tecala-and-esentire-partner/]]></loc>
		<lastmod><![CDATA[2021-07-11T23:50:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/Pieter-DeGunst.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/BLayton.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cso-group-win-nsw-government-contract-with-macquarie-government/]]></loc>
		<lastmod><![CDATA[2021-07-09T03:22:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Michael-Simkovic.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/Aiden_Tudehope_-U_tube-thumbnail.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/parliamentary-committee-hears-industry-concerns-on-critical-infrastructure-bill/]]></loc>
		<lastmod><![CDATA[2021-07-08T16:08:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1518108761.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/virsec-announces-expansion-into-the-anz-market-with-new-appointments/]]></loc>
		<lastmod><![CDATA[2021-07-08T03:51:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Robert-Nobil.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/July9.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-piranha-launches-partner-assurance-program/]]></loc>
		<lastmod><![CDATA[2021-07-08T03:46:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_partner_assurance.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/one-person-in-four-risks-sharing-confidential-work-related-information/]]></loc>
		<lastmod><![CDATA[2021-07-08T02:44:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_risks.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/PhishER-Banner_300x250-Copy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-cyber-patients-dilemma/]]></loc>
		<lastmod><![CDATA[2021-07-07T04:49:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/oracle-completes-irap-assessment/]]></loc>
		<lastmod><![CDATA[2021-07-07T01:37:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_IRAP-Assessment.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/identifying-and-estimating-cybersecurity-risk-for-enterprise-risk-management-2nd-public-draft-of-nistir-8286a-available-for-comment/]]></loc>
		<lastmod><![CDATA[2021-07-07T01:26:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_NISTIR.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-organisations-not-feeling-prepared-for-the-it-security-threat/]]></loc>
		<lastmod><![CDATA[2021-07-05T05:56:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/Australian-organisations-not-feeling-prepared-for-the-IT-security-threat.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/extraordinary-sophistication-behind-kaseya-ransomware-attack/]]></loc>
		<lastmod><![CDATA[2021-07-05T01:50:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Kaseya-Ransomware-Attack.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/linkedin-denies-massive-data-breach/]]></loc>
		<lastmod><![CDATA[2021-07-01T06:34:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/07/img_Data-Breach.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/video-game-industry-suffers-highest-growth-in-cyberattacks-during-pandemic/]]></loc>
		<lastmod><![CDATA[2021-06-29T02:43:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Video-Game-Industry-Suffers-Highest-Growth-in-Cyberattacks-during-Pandemic.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-corporate-soft-underbelly-the-first-point-of-attack/]]></loc>
		<lastmod><![CDATA[2021-06-28T06:11:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_Australia-corporate.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/telling-stories-with-data-from-crime-to-child-protection-and-defence/]]></loc>
		<lastmod><![CDATA[2021-06-28T01:01:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_child.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/attack-on-bitcoin-erodes-payment-status/]]></loc>
		<lastmod><![CDATA[2021-06-28T00:53:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_bitcoin.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/john-mcafee-dies-in-barcelona/]]></loc>
		<lastmod><![CDATA[2021-06-28T00:25:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_165497819.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-flaws-in-atlassians-platform-led-to-account-takeover-in-one-click/]]></loc>
		<lastmod><![CDATA[2021-06-25T05:33:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_Security-Flaws.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/major-wa-government-contract-awarded/]]></loc>
		<lastmod><![CDATA[2021-06-24T02:04:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_person-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_person-02.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/varonis-names-first-certified-delivery-partner-in-anz/]]></loc>
		<lastmod><![CDATA[2021-06-24T01:26:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_Adam-Gordon.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-government-hands-digital-restart-fund-a-500-million-budget-boost/]]></loc>
		<lastmod><![CDATA[2021-06-22T22:04:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_515044024.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-268-the-emerging-role-of-bitcoin-in-spreading-malware/]]></loc>
		<lastmod><![CDATA[2021-06-22T06:48:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Episode268-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/commonwealth-bank-eyes-hiring-600-it-engineers-in-12-months/]]></loc>
		<lastmod><![CDATA[2021-06-22T06:43:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_Commonwealth-Bank-Eyes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defence-minister-peter-dutton-opens-macquaries-new-data-centre-in-canberra/]]></loc>
		<lastmod><![CDATA[2021-06-20T05:16:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_ndcc.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Aiden_Tudehope_-U_tube-thumbnail.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/akamai-disruption-the-second-significant-cdn-outage-in-two-weeks/]]></loc>
		<lastmod><![CDATA[2021-06-17T23:36:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_1468124342.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/presidents-biden-putin-agree-to-further-cybersecurity-talks/]]></loc>
		<lastmod><![CDATA[2021-06-17T04:03:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_pbpa.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/micro-focus-announces-csr-program/]]></loc>
		<lastmod><![CDATA[2021-06-17T03:35:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_mfa.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/police-chief-defends-accessing-covid-tracing-app-data/]]></loc>
		<lastmod><![CDATA[2021-06-17T03:20:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_pcd.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-agility-is-essential-for-effective-cybersecurity/]]></loc>
		<lastmod><![CDATA[2021-06-17T02:19:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_agile.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/vicuni.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/pandemic-induced-digital-reliance-creates-lingering-security-side-effects/]]></loc>
		<lastmod><![CDATA[2021-06-16T03:05:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_pid.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/operation-ironside-sees-police-raids-worldwide/]]></loc>
		<lastmod><![CDATA[2021-06-15T18:17:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_afp.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-267-the-wordpress-economy-set-to-grow-to-636-billion-this-year/]]></loc>
		<lastmod><![CDATA[2021-06-15T06:45:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Episode267.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nine-in-ten-australian-cisos-cite-mobile-devices-as-the-focal-point-of-their-cybersecurity-strategies-ivanti-research-reveals/]]></loc>
		<lastmod><![CDATA[2021-06-15T05:51:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Ivantis-Australian-CISO-Survey-web.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mcdonalds-cyberattack-sees-customer-employee-data-stolen/]]></loc>
		<lastmod><![CDATA[2021-06-15T02:14:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_macdonald.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ransomware-prevention-and-protection-guide-and-emergency-response-guide-acsc/]]></loc>
		<lastmod><![CDATA[2021-06-14T22:32:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Ransomacsc.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/June24a.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/wp-engine-the-future-of-websites-fake-news-dark-data/]]></loc>
		<lastmod><![CDATA[2021-06-14T06:26:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2017/11/CSWP-Ver-2_1400x1400.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/jacqui-visch-joins-pwc-australia-as-new-partner-to-commence-in-cdio-role/]]></loc>
		<lastmod><![CDATA[2021-06-10T11:28:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_jv.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/government-to-mandate-essential-eight-mitigation-strategies/]]></loc>
		<lastmod><![CDATA[2021-06-10T08:09:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_gme.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/minerva-labs-partners-with-cyber-hive-technology-in-australia/]]></loc>
		<lastmod><![CDATA[2021-06-09T21:48:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_acm-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-265-endpoint-of-singularity-sentinelone-disrupting-the-top-right-quadrant-for-endpoint-protection/]]></loc>
		<lastmod><![CDATA[2021-06-09T02:22:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Episode265.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-266-disrupting-dangerous-malware-microsofts-legal-action-to-disrupt-trickbot/]]></loc>
		<lastmod><![CDATA[2021-06-09T02:20:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Episode266.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rise-in-critical-infrastructure-attacks-pose-australian-threat/]]></loc>
		<lastmod><![CDATA[2021-06-09T01:24:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Rise-in-critical-infrastructure-attacks-pose-Australian-threat.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/2021-australia-security-insights-report-surge-in-cyberattacks-targeting-the-anywhere-workforce/]]></loc>
		<lastmod><![CDATA[2021-06-08T04:01:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/Australian-Security-Insights-Report-web.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/recommendations-for-federal-vulnerability-disclosure-guidelines-draft-nist-sp-800-216-available-for-comment/]]></loc>
		<lastmod><![CDATA[2021-06-08T02:23:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_ioc.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-must-regulate-child-sex-content-online/]]></loc>
		<lastmod><![CDATA[2021-06-08T02:22:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_Child-Sex-Content.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/simproject-launched-to-protect-mobile-numbers-from-being-hijacked/]]></loc>
		<lastmod><![CDATA[2021-06-08T01:02:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_330037622.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/pwc-australia-adopts-security-awareness-platform-securityadvisor/]]></loc>
		<lastmod><![CDATA[2021-06-07T02:53:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_427033891.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/knowb4_bnner-02.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paid-cloud-computing-on-the-rise-across-australian-businesses/]]></loc>
		<lastmod><![CDATA[2021-06-06T22:06:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_1217250037.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/firstwave-partners-with-shelt-global-to-launch-firstcloud-cybercisiontm/]]></loc>
		<lastmod><![CDATA[2021-06-03T04:42:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_neil.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/south-metropolitan-tafe-offers-fortinet-security-academy-program-to-bolster-students-cyber-security-skills/]]></loc>
		<lastmod><![CDATA[2021-06-03T03:34:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_securitytraning.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-tola-law-poses-long-term-risks-to-australian-economy/]]></loc>
		<lastmod><![CDATA[2021-06-02T03:27:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_396884110.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aws-announces-general-availability-of-amazon-location-service/]]></loc>
		<lastmod><![CDATA[2021-06-02T02:57:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/img_AWS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/claims-cybercriminal-group-revil-behind-jbs-ransomware-attack/]]></loc>
		<lastmod><![CDATA[2021-06-02T02:39:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_1902116458.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cryptocurrency-scams-increase-as-fake-trading-apps-proliferate/]]></loc>
		<lastmod><![CDATA[2021-06-01T04:50:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_1096576184.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/say-no-to-nobelium-cyber-attacks/]]></loc>
		<lastmod><![CDATA[2021-05-31T21:31:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/06/shutterstock_1919572964.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/home-affairs-secretary-flags-mandatory-ransomware-reporting-regime/]]></loc>
		<lastmod><![CDATA[2021-05-31T02:23:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_FLAGS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/claroty-finds-severe-memory-protection-bypass-vulnerability-in-siemens-plcs/]]></loc>
		<lastmod><![CDATA[2021-05-31T01:08:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_Claroty.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/750x150_SCADA_ICS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/e-waste-a-security-blind-spot/]]></loc>
		<lastmod><![CDATA[2021-05-31T00:59:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_ewaste.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-264-state-of-cybersecurity-2021-global-update-on-workforce-efforts-resources-and-budgets/]]></loc>
		<lastmod><![CDATA[2021-05-29T12:10:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode264.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/hrc-calls-for-a-moratorium-on-ai/]]></loc>
		<lastmod><![CDATA[2021-05-28T04:06:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_AI.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/where-autism-offers-a-competitive-advantage/]]></loc>
		<lastmod><![CDATA[2021-05-28T02:37:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_autism.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-secure-sd-wan-integration-to-google-clouds-ncc/]]></loc>
		<lastmod><![CDATA[2021-05-27T02:34:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img-sd.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/malicious-emails-target-microsoft-and-google-users/]]></loc>
		<lastmod><![CDATA[2021-05-24T11:11:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_zoom.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Email-picture.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/zoom-picture.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-5g-networks-could-have-been-controlled-by-huawei/]]></loc>
		<lastmod><![CDATA[2021-05-24T10:56:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_5g.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cost-and-lack-of-business-objectives-impeding-it-professionals/]]></loc>
		<lastmod><![CDATA[2021-05-24T01:51:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_cost.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-cybersecurity-strategy-supporting-new-technology-landscape/]]></loc>
		<lastmod><![CDATA[2021-05-21T09:35:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_strategy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-attack-threatens-domain-real-estate/]]></loc>
		<lastmod><![CDATA[2021-05-21T09:27:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_cyber-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kentik-partners-with-tds-to-strengthen-asia-pacific-growth/]]></loc>
		<lastmod><![CDATA[2021-05-21T09:20:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_kentek.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mobile-app-developers-expose-data-of-100-million-android-users/]]></loc>
		<lastmod><![CDATA[2021-05-21T02:23:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_mobile.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/akamai-security-research-financial-services-continues-getting-bombarded-with-credential-stuffing-and-web-application-attacks/]]></loc>
		<lastmod><![CDATA[2021-05-20T07:53:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_phising.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kpmg-australia-announces-alliance-with-ncino/]]></loc>
		<lastmod><![CDATA[2021-05-20T04:54:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_kpmg.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/behavioural-dectection-and-response-capabilities-deployed-at-superloop/]]></loc>
		<lastmod><![CDATA[2021-05-19T08:36:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_indic.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/logo_superloop.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-features-crowdstrikes-falcon-horizon/]]></loc>
		<lastmod><![CDATA[2021-05-19T07:56:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_crowd.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/wastedloader-campaign-targets-unpatched-ie-browsers/]]></loc>
		<lastmod><![CDATA[2021-05-19T03:02:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_rig.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/knowbe4-launches-phishflip-to-turn-active-phishing-attacks-into-safe-templates/]]></loc>
		<lastmod><![CDATA[2021-05-19T02:32:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_knowb4.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/barracuda-releases-cloud-application-protection-2-0/]]></loc>
		<lastmod><![CDATA[2021-05-19T01:24:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/img_Barracuda.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyberattack-sees-unisa-systems-shut-down/]]></loc>
		<lastmod><![CDATA[2021-05-18T02:30:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_1637855488.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-263-introducing-hyprfire-and-the-firebug-intrusion-detection-system/]]></loc>
		<lastmod><![CDATA[2021-05-18T00:10:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode263.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/genius-armoury-focused-on-australias-autistic-cyber-security-professionals/]]></loc>
		<lastmod><![CDATA[2021-05-17T08:07:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_1661003383.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/proofpoint-appoints-steve-moros-to-lead-asia-pacific-advanced-technology-group/]]></loc>
		<lastmod><![CDATA[2021-05-17T02:15:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Proofpoint_Steve-Moros_High-Res.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/covid-effect-left-worlds-children-more-vulnerable-online/]]></loc>
		<lastmod><![CDATA[2021-05-17T01:38:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_177132158.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/74-of-cisos-would-pay-a-premium-to-work-with-thought-leaders/]]></loc>
		<lastmod><![CDATA[2021-05-14T02:19:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_421484053.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/PRI-21-164_Code_Red_Infographic_A4_F.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/organised-cyber-criminal-syndicates-a-growing-threat-for-businesses-auscert-2021/]]></loc>
		<lastmod><![CDATA[2021-05-14T01:43:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_673891129.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/global-cisos-feel-unprepared-to-cope-with-a-cyberattack-proofpoint/]]></loc>
		<lastmod><![CDATA[2021-05-13T07:03:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_562179769.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ceos-and-cisos-doubling-down-on-cybersecurity/]]></loc>
		<lastmod><![CDATA[2021-05-13T06:22:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/CEOs-and-CISOs-Doubling-Down-on-Cybersecurity.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/adobe-completes-australian-irap-assessment-for-adobe-sign/]]></loc>
		<lastmod><![CDATA[2021-05-13T03:31:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_719314501.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-262-cyber-influence-and-misinformation-a-growing-threat-in-cyber-space/]]></loc>
		<lastmod><![CDATA[2021-05-13T01:41:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode262.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-261-cynterra-wins-major-dta-contract-for-secure-internet-gateway/]]></loc>
		<lastmod><![CDATA[2021-05-13T01:37:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode261.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-study-cybersecurity/]]></loc>
		<lastmod><![CDATA[2021-05-12T03:29:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_1170728281-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/veeam-reports-25-growth-in-q1-2021-with-unmatched-scale-and-market-expansion/]]></loc>
		<lastmod><![CDATA[2021-05-12T03:17:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_1147407575.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/why-your-business-future-is-more-cloudy-than-you-think/]]></loc>
		<lastmod><![CDATA[2021-05-11T00:15:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_1939005595.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/veeam_box_BR.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-aid-centre-announced/]]></loc>
		<lastmod><![CDATA[2021-05-10T02:43:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Cybersecurity-Aid-Centre-announced.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/salary-spike-predicted-against-talent-shortage/]]></loc>
		<lastmod><![CDATA[2021-05-06T23:51:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/shutterstock_549167005.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aurecon-appoints-julieanne-saxty-as-client-leader-defence-service-delivery-division-to-bolster-economic-stimulus-project-delivery/]]></loc>
		<lastmod><![CDATA[2021-05-05T06:21:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Aurecon-Julieanne-Saxty.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/gitlabs-5th-annual-global-devsecops-survey-020-was-catalyst-for-devops-tool-adoption/]]></loc>
		<lastmod><![CDATA[2021-05-05T03:26:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/GitLabs-5th-Annual-Global-DevSecOps-Survey.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-260-cloud-networking-on-the-alkira-cloud-services-exchange-csx/]]></loc>
		<lastmod><![CDATA[2021-05-03T03:14:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode260.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-259-call-for-an-australian-national-ai-strategy/]]></loc>
		<lastmod><![CDATA[2021-05-03T03:06:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-258-6clicks-achieves-irap-certification-for-australian-government-services/]]></loc>
		<lastmod><![CDATA[2021-05-03T02:58:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/05/Episode258.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/senate-inquiry-on-new-data-sharing-legislation-hands-down-report/]]></loc>
		<lastmod><![CDATA[2021-04-30T05:51:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_287194124.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/average-ransomware-recovery-cost-in-apj-increases-from-us1-16-million-to-us2-34-million/]]></loc>
		<lastmod><![CDATA[2021-04-29T03:17:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1726098022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/snowflake-achieves-protected-status-after-completing-irap-assessment/]]></loc>
		<lastmod><![CDATA[2021-04-29T02:10:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1472495273.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/PeterOConnor.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nccoe-releases-final-report-on-challenges-with-adopting-post-quantum-cryptographic-algorithms/]]></loc>
		<lastmod><![CDATA[2021-04-29T00:57:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_509910508.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/funding-released-to-improve-cyber-security-awareness-and-capabilities-of-smes/]]></loc>
		<lastmod><![CDATA[2021-04-28T22:23:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_571087984.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/exploitation-of-click-studios-passwordstate-software-acsc-issues-high-alert/]]></loc>
		<lastmod><![CDATA[2021-04-27T08:04:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/launch-of-global-cyber-security-awards/]]></loc>
		<lastmod><![CDATA[2021-04-27T07:25:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_662606308.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cio-survey-confirms-cybersecurity-specialists-remain-in-high-demand/]]></loc>
		<lastmod><![CDATA[2021-04-27T05:59:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/CIO-Survey-Confirms-Cybersecurity-Specialists-Remain-In-High-Demand.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/unitingcare-queensland-ransomware-attack-impacts-major-brisbane-hospitals/]]></loc>
		<lastmod><![CDATA[2021-04-27T03:52:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1673968429.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cynterra-wins-major-dta-contract/]]></loc>
		<lastmod><![CDATA[2021-04-26T04:06:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1310493494.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/drago2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-257-why-5g-matters-with-the-australian-mobile-telecommunications-association/]]></loc>
		<lastmod><![CDATA[2021-04-23T05:09:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Episode257.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/five-companies-win-26-ghz-band-spectrum-auction/]]></loc>
		<lastmod><![CDATA[2021-04-23T04:54:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1038753427.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-projects-worth-over-16-million-up-and-running/]]></loc>
		<lastmod><![CDATA[2021-04-22T05:50:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1298078380.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/top-10-cybersecurity-books-to-read-for-beginners/]]></loc>
		<lastmod><![CDATA[2021-04-22T05:50:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1117887194.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Cyber-Security-Infographics-3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-government-launches-its-international-cyber-and-critical-technology-engagement-strategy/]]></loc>
		<lastmod><![CDATA[2021-04-22T01:21:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1198194190.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/6clicks-and-microsoft-partner-to-meet-australian-government-and-defence-security-requirements/]]></loc>
		<lastmod><![CDATA[2021-04-21T05:01:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/governance-article-image.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/avast-recorded-future-partner-on-threat-intelligence/]]></loc>
		<lastmod><![CDATA[2021-04-21T06:00:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/real-time-report-article-image.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/brainbox-ai-partners-with-skyfii-for-energy-savings-in-commercial-real-estate/]]></loc>
		<lastmod><![CDATA[2021-04-21T00:10:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/AI-Article.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-increasing-importance-of-artificial-intelligence-in-contact-centres/]]></loc>
		<lastmod><![CDATA[2021-04-20T23:37:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/cloud-article.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-gadens-reporting-platform-a-game-changer-for-the-financial-services-sector-as-government-mandates-stricter-regulatory-regimes/]]></loc>
		<lastmod><![CDATA[2021-04-20T23:19:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Reporting-Image-Article.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Liam-Hennessy_3790_PORT.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/6clicks-appoints-global-security-authority-matt-gyde-as-non-executive-director/]]></loc>
		<lastmod><![CDATA[2021-04-19T03:36:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1723539205.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/red-tape-or-enablers-of-change-5-ways-to-upswing-the-perception-of-cyber-security-in-your-organisation/]]></loc>
		<lastmod><![CDATA[2021-04-19T00:50:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1669180291.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/VU-course.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/accc-wins-federal-court-privacy-case-against-google/]]></loc>
		<lastmod><![CDATA[2021-04-18T09:04:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_746561158.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-agrees-russian-state-actors-behind-solarwinds-hack/]]></loc>
		<lastmod><![CDATA[2021-04-16T05:57:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1897248388.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/huntsman-securitys-enterprise-siem-v7-0-integrates-mitre-attck-intelligence-into-soc-workflows/]]></loc>
		<lastmod><![CDATA[2021-04-16T02:20:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_744577681.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Huntsman-Securitys-Enterprise-SIEM-V7.0.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-lose-over-60-million-to-scams-in-q1/]]></loc>
		<lastmod><![CDATA[2021-04-16T02:04:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1688340721.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/All-scams-in-Australia.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Top-5-types-of-scams-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Amount-lost-and-no.-of-reports.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-zealands-ccl-and-spark-awarded-fortinets-apac-growth-partner/]]></loc>
		<lastmod><![CDATA[2021-04-16T01:20:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_686973811.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/is-your-smartphone-spying-on-you-take-the-test/]]></loc>
		<lastmod><![CDATA[2021-04-15T06:36:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Smartphones-spying.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/logrhythm-appoints-chillisoft-as-first-global-authorised-training-centre/]]></loc>
		<lastmod><![CDATA[2021-04-15T02:17:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_443081269.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Simon-Howe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/a-process-not-a-product-why-changing-the-perception-of-cybersecurity-is-essential-for-ongoing-success/]]></loc>
		<lastmod><![CDATA[2021-04-14T06:24:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_549680125.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/VU-course.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-fair-trading-warns-consumers-about-flood-damage-scams/]]></loc>
		<lastmod><![CDATA[2021-04-14T05:40:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_685711540.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zero-day-exploit-found-in-desktop-window-manager/]]></loc>
		<lastmod><![CDATA[2021-04-14T05:34:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_445200349.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/call-for-comment-automation-of-the-cryptographic-module-validation-program-cmvp/]]></loc>
		<lastmod><![CDATA[2021-04-14T02:46:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_445172830.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sapien-cyber-and-honeywell-team-up/]]></loc>
		<lastmod><![CDATA[2021-04-13T03:51:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_679066552.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/uni-students-second-year-homework-picked-up-by-amazon-quantum-researchers/]]></loc>
		<lastmod><![CDATA[2021-04-13T03:23:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1212718402.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Pablo-Bonilla-Ataides.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/it-leaders-increasing-impact-on-employee-experience-and-business-resilience/]]></loc>
		<lastmod><![CDATA[2021-04-13T02:40:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_558022423.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Elastic_Infographic.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-256-the-secure-board-book-launch-with-claire-pales-and-anna-leibel/]]></loc>
		<lastmod><![CDATA[2021-04-12T04:49:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Episode256.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-255-deepfakes-shallowfakes-cheapfakes-seeing-is-believing/]]></loc>
		<lastmod><![CDATA[2021-04-12T04:41:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Episode255.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/verizon-mobile-security-index-covid-19-unearths-new-cyber-threats/]]></loc>
		<lastmod><![CDATA[2021-04-12T02:51:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/Verizon-Mobile-Security-Index.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/reimagining-cybersecurity-in-government-through-zero-trust/]]></loc>
		<lastmod><![CDATA[2021-04-12T02:12:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1917381320.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/SAVVIDES_Headshot.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/icera-grants-announced-for-cyber-security-capabilities/]]></loc>
		<lastmod><![CDATA[2021-04-12T01:43:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1713381982.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-wormable-android-malware-spreads-by-creating-auto-replies-to-messages-in-whatsapp/]]></loc>
		<lastmod><![CDATA[2021-04-08T05:33:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1621499698.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/FlixOnline.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/FlixOnline-Permissions-Request.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cipherpoint-announces-successful-completion-of-brace168-acquisition/]]></loc>
		<lastmod><![CDATA[2021-04-08T04:18:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_691685071.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/infotrust-implements-keith-buckley-as-ceo/]]></loc>
		<lastmod><![CDATA[2021-04-08T03:23:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_232574431.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/act-government-sets-up-hub-to-counter-cybersecurity-threat/]]></loc>
		<lastmod><![CDATA[2021-04-07T06:36:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1607065009.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/what-the-scraped-data-of-500-million-linkedin-users-being-sold-online-means-for-aussie-users/]]></loc>
		<lastmod><![CDATA[2021-04-07T04:54:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_757964926.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/wipro-appoints-sarah-adam-gedge-as-managing-director-for-australia-and-new-zealand/]]></loc>
		<lastmod><![CDATA[2021-04-07T03:54:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_348496148.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-software-vendor-vix-vizions-imagus-high-in-nist-report/]]></loc>
		<lastmod><![CDATA[2021-04-07T02:28:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1717584034.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/knowbe4-research-launches-2021-security-culture-report/]]></loc>
		<lastmod><![CDATA[2021-04-07T02:11:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/KnowBe4-Research-Launches-2021-Security-Culture-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fujitsu-australia-acquires-versor/]]></loc>
		<lastmod><![CDATA[2021-04-06T02:27:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_341958080.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-enhances-students-cybersecurity-awareness-with-free-training-and-childrens-book/]]></loc>
		<lastmod><![CDATA[2021-04-06T01:27:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1887563953.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/illumio-signs-spectrum-to-bring-micro-segmentation-to-the-nz-market/]]></loc>
		<lastmod><![CDATA[2021-04-01T02:44:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/04/shutterstock_1129015031.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/international-back-up-day-today-back-up-data-to-defend-against-cybercrime/]]></loc>
		<lastmod><![CDATA[2021-03-31T00:11:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_114096781.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Ep22Jan22.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-report-explores-benefits-and-challenges-of-digital-transactions/]]></loc>
		<lastmod><![CDATA[2021-03-30T04:16:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_701873641.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/women-in-ai-awards-anz-winners-2021/]]></loc>
		<lastmod><![CDATA[2021-03-30T03:36:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_484900039.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Women-in-AI-Awards.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/live-tv-programming-subject-to-cyberattack-takes-down-channel-9/]]></loc>
		<lastmod><![CDATA[2021-03-29T04:35:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1149399851-1-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/intergen-and-empired-appoint-mark-dyer-to-new-cto-for-new-zealand-leadership-role/]]></loc>
		<lastmod><![CDATA[2021-03-29T03:48:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_662832832.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Mark_Dyer.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-announces-winners-of-australian-partner-awards/]]></loc>
		<lastmod><![CDATA[2021-03-29T03:12:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1113947324.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/penten-board-adds-dr-marcus-thompson/]]></loc>
		<lastmod><![CDATA[2021-03-29T02:23:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_334096322-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds/]]></loc>
		<lastmod><![CDATA[2021-03-25T07:13:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1713381982-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/securing-the-modern-workforce-zero-trust-in-a-sase-architecture/]]></loc>
		<lastmod><![CDATA[2021-03-25T07:11:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-23.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/SAVVIDES_Headshot.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/container-forensics-what-to-do-if-container-get-compromised/]]></loc>
		<lastmod><![CDATA[2021-03-25T07:09:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/container-terminal-wharf-transport.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Pushkar-Tiwari.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-case-for-vendors-in-public-private-advisory-committees/]]></loc>
		<lastmod><![CDATA[2021-03-25T06:40:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-25.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/watchguard-technologies-appoints-new-regional-director-australia-new-zealand-and-pacific-islands/]]></loc>
		<lastmod><![CDATA[2021-03-25T02:45:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_420967090.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Anthony-Daniel.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-254-ransomware-threat-report-2021-unit-42-palo-alto-networks/]]></loc>
		<lastmod><![CDATA[2021-03-25T00:40:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode254.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/claroty-discovers-remote-access-flaws-affecting-ovarros-tbox-remote-terminal-units-and-twinsoft-engineering-software/]]></loc>
		<lastmod><![CDATA[2021-03-24T06:18:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1393547288.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Mar26a.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Internet-exposed-TBOXs.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/black-kingdom-ransomware-taking-advantage-of-proxylogon-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2021-03-24T03:19:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1141202159.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ditno-extends-its-cybersecurity-management-platform/]]></loc>
		<lastmod><![CDATA[2021-03-24T03:12:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1389157238-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/worlds-first-market-ready-diamond-based-quantum-accelerator-coming-to-australia/]]></loc>
		<lastmod><![CDATA[2021-03-24T02:26:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/diamond-based-quantum-accelerator.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode253.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/machine-learning-for-access-control-policy-verification-draft-nistir-8360-available-for-comment/]]></loc>
		<lastmod><![CDATA[2021-03-24T02:19:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1210258594.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-university-of-queensland-selects-tenable-with-indigenous-cybersecurity-scholarship/]]></loc>
		<lastmod><![CDATA[2021-03-24T01:55:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_646788154.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-253-the-impact-of-australian-high-performance-computing-in-the-coming-decade-prof-sean-smith-of-nci/]]></loc>
		<lastmod><![CDATA[2021-03-22T06:49:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode253.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-252-microsoft-exchange-hack-and-advice-for-threat-hunting-mysectv-takeaway/]]></loc>
		<lastmod><![CDATA[2021-03-22T06:46:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode252.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-251-how-i-navigated-getting-a-job-at-atlassian-as-security-training-manager-mysectv-takeaway/]]></loc>
		<lastmod><![CDATA[2021-03-22T06:42:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode251.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-250-darknet-takedowns-disrupt-drugs-markets-mysectv-takeaway/]]></loc>
		<lastmod><![CDATA[2021-03-22T06:34:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode250.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/menlo-security-extends-secure-web-gateway-swg/]]></loc>
		<lastmod><![CDATA[2021-03-22T03:21:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1389157238.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/will-apras-new-focus-on-resilience-help-banks-through-the-next-covid/]]></loc>
		<lastmod><![CDATA[2021-03-19T22:38:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1726585282.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kasada-releases-v2-platform/]]></loc>
		<lastmod><![CDATA[2021-03-19T06:50:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_302508602.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mobile-device-security-bring-your-own-device-byod-draft-sp-1800-22-available-for-comment/]]></loc>
		<lastmod><![CDATA[2021-03-19T01:36:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_635616209.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/not-for-profits-and-charities-are-high-risk-targets-for-costly-bin-bashing-fraud-heres-what-to-do-about-it/]]></loc>
		<lastmod><![CDATA[2021-03-18T04:42:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1082513054.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/thumbnail_IMG_3814.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/IMG-3360-003.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-ransomware-war-avoid-the-inevitability-of-ransomware-losses/]]></loc>
		<lastmod><![CDATA[2021-03-18T03:57:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1450167512.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/5g-networks-snaps-up-intergrid-in-3m-deal/]]></loc>
		<lastmod><![CDATA[2021-03-17T21:46:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/5GN-Intergrid-Cover-Image.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/book-release-the-secure-board/]]></loc>
		<lastmod><![CDATA[2021-03-17T06:05:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/The-Secure-Board.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/victorian-information-commissioner-concludes-investigation-into-data-breach/]]></loc>
		<lastmod><![CDATA[2021-03-17T03:49:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Generic-Fingers-on-Keyboard.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aegis9-and-australian-data-centres-announce-partnership/]]></loc>
		<lastmod><![CDATA[2021-03-17T02:11:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1433361287-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-taxation-office-extends-national-digital-identity-program-with-face-verification-technology/]]></loc>
		<lastmod><![CDATA[2021-03-16T05:11:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/iProov-Genuine-Presence-Assurance-4.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Andrew-Bud-CBE-iProov-CEO.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/penten-and-worldstack-collaborate-on-honeytrace-ai-solution/]]></loc>
		<lastmod><![CDATA[2021-03-16T01:47:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1028168668.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cfc-acquires-insane-technologies/]]></loc>
		<lastmod><![CDATA[2021-03-16T01:37:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1748078198.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dragos-opens-office-and-training-centre-in-melbourne/]]></loc>
		<lastmod><![CDATA[2021-03-16T01:28:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_558873121.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/hosting-certification-framework-released-with-industry-support/]]></loc>
		<lastmod><![CDATA[2021-03-15T03:19:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1141707758.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Aidan-Tudehope-Managing-Director-Macquarie-Government_2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fepl-reveals-details-of-wa-and-nt-us1-5bn-project-koete/]]></loc>
		<lastmod><![CDATA[2021-03-12T03:01:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_638349103.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/most-wanted-malware-trickbot-takes-over-following-emotet-shutdown/]]></loc>
		<lastmod><![CDATA[2021-03-12T02:49:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1532815775.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/darknet-takedowns-disrupt-drugs-markets/]]></loc>
		<lastmod><![CDATA[2021-03-12T02:12:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Darknet-takedowns-disrupt-drugs-markets-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Darknet-takedowns-disrupt-drugs-markets.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/microsoft-outlook-hack-and-advice-for-threat-hunting/]]></loc>
		<lastmod><![CDATA[2021-03-12T01:48:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_735097033.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/ESET-hourly-detection.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/ESET-hourly-detection-map.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/claroty-uncovers-vulnerabilities-in-schneider-electric-smart-meters/]]></loc>
		<lastmod><![CDATA[2021-03-12T00:44:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1247019490.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-police-nab-criminal-syndicate-in-3m-cryptocurrency-money-laundering-scheme/]]></loc>
		<lastmod><![CDATA[2021-03-12T00:30:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1091298530.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/NSW-Police-Force.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nozomi-networks-first-saas-platform-for-ot-and-iot-cybersecurity/]]></loc>
		<lastmod><![CDATA[2021-03-10T03:07:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1848825748.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zscaler-achieves-protected-for-irap/]]></loc>
		<lastmod><![CDATA[2021-03-10T01:22:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1518108761.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Budd-Ilic.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/threat-actors-target-victims-by-promising-covid-19-relief-vaccines-and-variant-news/]]></loc>
		<lastmod><![CDATA[2021-03-10T01:04:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1729284268.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Spoof-IRS-branded-message.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Excel-file-prompt.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Fake-HHS-email-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/WHO.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/BEC-attacker-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/BEC-threat-actors-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/DHL.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/The-fake-DHL-branded-landing-page.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-249-the-big-biz-of-cryptocrime-pandemic-year-of-2020/]]></loc>
		<lastmod><![CDATA[2021-03-08T06:03:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode249.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-248-quantum-technology-and-implications-for-security-in-todays-computer-infrastructure/]]></loc>
		<lastmod><![CDATA[2021-03-08T06:01:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode-248.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-247-insights-into-the-centre-for-cybersecurity-world-economic-forum-interview-with-the-lead-strategic-initiatives/]]></loc>
		<lastmod><![CDATA[2021-03-08T06:00:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode-247.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kaspersky-industry-and-policy-experts-tackle-strategies-to-beef-up-apacs-cyberdefenses-in-a-pandemic-and-beyond/]]></loc>
		<lastmod><![CDATA[2021-03-05T02:01:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/APAC-OPF2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Eugene-Kaspersky.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Dr.-Greg-Austin.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyrc-vulnerability-advisory-denial-of-service-vulnerability-in-jetty-web-server/]]></loc>
		<lastmod><![CDATA[2021-03-04T06:48:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1050436496.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/CyRC-Vulnerability-Advisory.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/data-integrity-critical-for-future-of-retail/]]></loc>
		<lastmod><![CDATA[2021-03-04T05:31:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_558995770.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/opentext-encase-solutions-now-certified-on-microsoft-azure/]]></loc>
		<lastmod><![CDATA[2021-03-04T03:06:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1499154053.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-245-protecting-us-and-our-kids-online-startthechat​-interview-with-the-australian-esafety-commissioner/]]></loc>
		<lastmod><![CDATA[2021-03-03T03:04:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Episode-245.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-246-security-surveillance-market-update-2021-with-genetec-anz-country-manager/]]></loc>
		<lastmod><![CDATA[2021-03-03T03:02:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Episode-246.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sailpoint-adds-identity-extensibility/]]></loc>
		<lastmod><![CDATA[2021-03-03T02:25:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_1814418299-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/thingsat-appoints-ruy-franco-as-ceo/]]></loc>
		<lastmod><![CDATA[2021-03-03T01:51:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_569434432-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/RuyFranco_CEO_ThingsAt.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fiber-segment-to-drive-australias-fixed-broadband-service-revenue-over-next-five-years/]]></loc>
		<lastmod><![CDATA[2021-03-02T06:21:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_500272420-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Australia-broadband-lines-by-technology.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/tesserent-turnover-increases-500-to-36-5-million/]]></loc>
		<lastmod><![CDATA[2021-03-02T03:51:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/shutterstock_734391004-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/03/Actual-H1-FY21-headline-results.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-launches-nextwave-3-0/]]></loc>
		<lastmod><![CDATA[2021-02-26T02:20:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1675260034-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/critical-authentication-bypass-in-rockwell-software/]]></loc>
		<lastmod><![CDATA[2021-02-26T01:28:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1228736578-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortiguard-labs-reports-disruptive-shift-of-cyber-threats/]]></loc>
		<lastmod><![CDATA[2021-02-25T05:46:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/FortiGuard-Labs-reports-disruptive-shift-of-cyber-threats.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macquarie-launches-17m-sovereign-government-data-centre-in-canberra/]]></loc>
		<lastmod><![CDATA[2021-02-25T05:04:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Macquarie-Government_IC5_2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/veeam-releases-new-v11-for-modern-data-protection/]]></loc>
		<lastmod><![CDATA[2021-02-25T02:46:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_549680125-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/accellion-data-breach-impact-on-australian-organisations/]]></loc>
		<lastmod><![CDATA[2021-02-25T02:31:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_405302020-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paraflare-appoints-major-general-retired-marcus-thompson-am-phd-as-strategic-advisor/]]></loc>
		<lastmod><![CDATA[2021-02-24T01:42:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1452712298-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Marcus-Thompson-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/qualcomm-snapdragon-compute-platforms-adopt-sophos/]]></loc>
		<lastmod><![CDATA[2021-02-24T01:24:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Qualcomm-Snapdragon-8cx-Gen-2-5G-compute-platform-chip-image-2211.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Qualcomm-Snapdragon-8cx-Gen-2-5G-compute-platform-Badge211.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/vault-cloud-signs-partnership-with-aruba-to-bolster-its-cloud-security-solutions-for-government-and-critical-industries/]]></loc>
		<lastmod><![CDATA[2021-02-23T05:13:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_141922135-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/macquarie-telecom-commences-sd-lan-service/]]></loc>
		<lastmod><![CDATA[2021-02-23T05:04:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1320531251-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Macquarie-Telecom_SD-LAN_1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Macquarie-Telecom_SD-LAN_2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/austcyber-becomes-a-wholly-owned-subsidiary-of-stone-chalk/]]></loc>
		<lastmod><![CDATA[2021-02-18T01:34:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/merger.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/trust-online-is-hard-won-easily-lost-and-non-existent-for-14-of-australians/]]></loc>
		<lastmod><![CDATA[2021-02-18T01:19:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1202221816-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/interactive-tool-developed-for-australias-cybersecurity-talent-gap/]]></loc>
		<lastmod><![CDATA[2021-02-17T02:18:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_669226135-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/key-hire-as-ingram-micro-builds-cybersecurity-practice/]]></loc>
		<lastmod><![CDATA[2021-02-16T02:45:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1815683369-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Rod-Lazarus-GM-of-Cyberseurity-Ingram-Micro.jpeg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/secolve-and-lmntrix-partner-to-combat-ot-attacks/]]></loc>
		<lastmod><![CDATA[2021-02-15T01:28:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1181998801-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Laith-Shahin.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/extrahop-data-shows-150-percent-increase-in-suspicious-network-activity-during-peak-of-sunburst-attack/]]></loc>
		<lastmod><![CDATA[2021-02-12T02:40:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/SUNBURST-Attack-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Jeff_Costlow.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nists-key-practices-in-cyber-supply-chain-risk-management/]]></loc>
		<lastmod><![CDATA[2021-02-12T01:27:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_447406066-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-discovers-bendybear-new-malware-from-apt-blacktech/]]></loc>
		<lastmod><![CDATA[2021-02-11T06:59:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_674184883-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aiia-announces-new-2021-board-of-directors/]]></loc>
		<lastmod><![CDATA[2021-02-11T02:44:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_144792703-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/more-than-100-financial-services-firms-hit-with-ddos-extortion-attacks/]]></loc>
		<lastmod><![CDATA[2021-02-11T02:34:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1797753556-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Episode223.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/DDoS-Attacks-by-Sub-Vertical.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/DDoS-Attacks-by-Region.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/blockchain-networks-token-design-and-management-overview/]]></loc>
		<lastmod><![CDATA[2021-02-10T01:57:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_712558591-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/eset-issues-its-q4-2020-threat-report-recording-a-massive-increase-in-rdp-attack-attempts-since-q1/]]></loc>
		<lastmod><![CDATA[2021-02-09T02:24:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/ESET-Issues-Its-Q4-2020-Threat-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/comment-period-extended-for-draft-iot-cybersecurity-guidance-sp-800-213-and-nistirs-8259b-c-d/]]></loc>
		<lastmod><![CDATA[2021-02-09T00:53:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1648826491-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/loss-of-customers-and-mission-critical-data-are-top-security-concerns-to-australian-businesses/]]></loc>
		<lastmod><![CDATA[2021-02-05T01:25:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Barracuda-article.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/veeam-increases-public-cloud-support-with-veeam-backup-for-google-cloud-platform/]]></loc>
		<lastmod><![CDATA[2021-02-05T00:40:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1769703494-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Veeam_Availability_Suite_v10_300x250_1_22_2021_12_14_43_AM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/micro-focus-offers-service-management-automation-x-smax-as-a-service-in-australia/]]></loc>
		<lastmod><![CDATA[2021-02-04T05:24:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_622329221-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/acclimation-appoints-mark-giles-to-head-up-sap-centre-of-excellence/]]></loc>
		<lastmod><![CDATA[2021-02-04T04:06:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_148867004-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2021-02-04T03:32:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_797077918-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Configuration-file-with-ORION-backend-database-credentials.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Authenticated-users-can-read-the-file-content.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/Inside-the-configuration-file-are-database-credentials-for-the-ORION-backend.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/After-using-a-small-decryption-utility-we-can-connect-to-the-database.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/SolarWinds-Orion-Collector-uses-MSMQ-heavily.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/security-is-not-configured-on-the-queues.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/authenticated-users-can-write-to-the-configuration-directory.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nist-releases-sp-800-172-enhanced-security-requirements-for-protecting-controlled-unclassified-information-a-supplement-to-nist-special-publication-800-171/]]></loc>
		<lastmod><![CDATA[2021-02-03T01:13:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1010172436-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-6clicks-closes-a-5-million-capital-raise-and-appoints-steve-nola-as-a-non-executive-director/]]></loc>
		<lastmod><![CDATA[2021-02-01T05:20:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/02/shutterstock_1681788868-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/human-factor-dominates-latest-data-breach-statistics/]]></loc>
		<lastmod><![CDATA[2021-01-28T05:39:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_405302020-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-australians-can-safeguard-their-data-data-privacy-day-28-january/]]></loc>
		<lastmod><![CDATA[2021-01-28T04:57:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_766980976-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/KCM-Demo-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-taskforce-releases-priority-recommendations/]]></loc>
		<lastmod><![CDATA[2021-01-28T04:43:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Cyber-security-taskforce-releases-priority-recommendations.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-ai-tool-ensures-anonymous-covid-19-data-remains-secure-and-private/]]></loc>
		<lastmod><![CDATA[2021-01-28T02:27:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1709186062-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/attribute-based-access-control-nist-draft-sp-800-204b-is-available-for-comment/]]></loc>
		<lastmod><![CDATA[2021-01-28T00:32:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1663002136-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-announces-ai-powered-xdr/]]></loc>
		<lastmod><![CDATA[2021-01-27T04:35:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1322295827.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-year-new-version-of-danabot/]]></loc>
		<lastmod><![CDATA[2021-01-27T04:15:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1169875264.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-4.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-5.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-6.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-7.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-8.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-9.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/DanaBot-figure-10.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/prisma-cloud-enhanced/]]></loc>
		<lastmod><![CDATA[2021-01-27T02:04:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_141922135.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/private-sector-expects-to-lose-control-of-ai-governance-within-five-years-says-new-study/]]></loc>
		<lastmod><![CDATA[2021-01-22T05:38:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Future-proof-2025-Technology-Trends-Report.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/linux-users-should-patch-now-to-block-new-freakout-malware-which-exploits-new-vulnerabilities-check-point/]]></loc>
		<lastmod><![CDATA[2021-01-22T01:34:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1454959556.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/vulnerabilities-Check-Point.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/vulnerabilities-Check-Point-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/vulnerabilities-Check-Point-2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-appoints-andrew-sheedy-as-director-of-operational-technology-solutions/]]></loc>
		<lastmod><![CDATA[2021-01-21T01:41:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_546533152.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Andrew_Sheedy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/q4-2020-knowbe4-finds-work-from-home-related-phishing-email-attacks-on-the-rise/]]></loc>
		<lastmod><![CDATA[2021-01-21T01:11:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_582006619.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/PhishER-Banner_728x90.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/varonis-announces-new-features-to-combat-insider-threats-and-collaboration-risks-in-microsoft-365/]]></loc>
		<lastmod><![CDATA[2021-01-20T02:26:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_82914550.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/unisys-to-research-deceitful-and-persuasive-writing-for-australias-defence-and-national-security-communities/]]></loc>
		<lastmod><![CDATA[2021-01-20T01:31:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1107870548.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fireeye-report-re-unc2452-remediation/]]></loc>
		<lastmod><![CDATA[2021-01-20T01:13:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/megan-haas-joins-tesserent-board/]]></loc>
		<lastmod><![CDATA[2021-01-19T05:07:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_144792703.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Megan-Haas.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/staying-secure-online-during-back-to-school/]]></loc>
		<lastmod><![CDATA[2021-01-19T01:11:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_581490715.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/entrust-acquires-hytrust/]]></loc>
		<lastmod><![CDATA[2021-01-18T03:30:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/how-to-avoid-a-data-breach-perimeter-81-discusses/]]></loc>
		<lastmod><![CDATA[2021-01-18T03:00:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_580473913.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-lost-176-million-to-scams-in-2020-23-higher-than-the-previous-year/]]></loc>
		<lastmod><![CDATA[2021-01-18T02:50:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1399145951.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/All-scams-in-Australia.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/All-scams-in-Australia-in-2020-month-by-month.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Top-5-types-of-scams.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/All-scams-2020-delivery-method.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/going-rogue-a-mastermind-behind-android-malware-returns-with-a-new-rat/]]></loc>
		<lastmod><![CDATA[2021-01-15T05:43:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1454959559.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/22-billion-records-exposed-from-breaches-in-2020-tenable-threat-landscape-report/]]></loc>
		<lastmod><![CDATA[2021-01-15T02:03:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/acsc-high-alert-fireeye-identifies-global-campaign-leveraging-malicious-updates-to-solarwinds-software/]]></loc>
		<lastmod><![CDATA[2021-01-13T21:47:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1885971511-e1612321806490.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/splunks-2021-data-security-predictions/]]></loc>
		<lastmod><![CDATA[2021-01-13T04:17:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/Splunk’s-2021-Data-Security-Predictions.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-new-cloud-location-for-australian-clients/]]></loc>
		<lastmod><![CDATA[2021-01-13T03:33:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_390041587.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/senetas-announces-the-first-quantum-resistant-network-encryption-capability/]]></loc>
		<lastmod><![CDATA[2021-01-10T03:45:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2021/01/shutterstock_1210158169.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/staying-secure-when-shopping-online-this-festive-season/]]></loc>
		<lastmod><![CDATA[2020-12-21T22:02:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Securing-the-Internet-of-Things-for-Consumers-web.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/pod-Episode225-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/isaca-launches-blockchain-framework-and-executive-guide-to-help-enterprises-adopt-the-emerging-tech/]]></loc>
		<lastmod><![CDATA[2020-12-21T01:12:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_1403298782.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zscaler-appoints-new-regional-vice-president-and-country-manager-for-australia-and-new-zealand/]]></loc>
		<lastmod><![CDATA[2020-12-17T01:24:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/Steve-Singer-3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/Steve-Singer-4.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/redzed-goes-live-with-sap-cloud-for-banking/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:29:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-28.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-data-centres-underway-in-tamworth-and-coffs-harbour/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:26:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-27.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/Tamworth-groundbreaking.jpeg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/asd-offensive-operation-targets-foreign-cybercriminals/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:23:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-26.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/okta-completes-irap-assessment/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:16:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-24.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/isaca-launches-cdpse-beta-exam-for-privacy-professionals/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:07:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-22.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aws-announces-plans-to-open-second-region-in-australia/]]></loc>
		<lastmod><![CDATA[2020-12-16T15:04:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-21.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-report-finds-that-criminals-leverage-ai-for-malicious-use-and-its-not-just-deep-fakes/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:58:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-20.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/suspected-chinese-hackers-impersonate-catholic-news-outlets-to-gather-intel-on-vatican/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:54:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-19.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-predictions-for-2021-from-hackers-around-the-world/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:52:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-18.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-nist-report-on-hardware-enabled-security-in-the-cloud/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:49:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/decor_acsm-img-17.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/third-of-australians-are-self-sabotaging-their-online-security-at-home-sailpoint/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:31:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-16.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortiguard-labs-predicts-weaponising-of-the-intelligent-edge-will-dramatically-alter-speed-and-scale-of-future-cyberattacks/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:29:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-10.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/gitlab-partners-with-integrationqa/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:27:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-15.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/px-partners-launches-in-australia/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:24:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-14.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/lastpass-progresses-irap-assessment/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:19:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-13.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-administrators-gain-new-skills-at-tafe-nsw/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:16:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-12.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Peter-Glover-left-and-Shantha.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-nice-framework-released/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:13:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-11.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/creating-a-strong-culture-of-security-within-organisations/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:09:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-10.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-3-cs-of-cyber-crisis-culture-compliance-fortinet-series/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:04:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/CCC-Fortinet.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/reverse-engineering-surveillance-capitalism/]]></loc>
		<lastmod><![CDATA[2020-12-16T14:02:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/decor_acsm-img-09.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/misinformation-spread-by-the-tricks-of-our-brains/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:59:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/decor_acsm-img-08.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-culture-eats-cyber-security-strategy-for-breakfast/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:56:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/decor_acsm-img-07.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/JJ-pic.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/esafety-commissioner-take-down-scheme-addresses-social-media-harm-but-not-the-cause-call-for-regulation/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:51:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/decor_acsm-img-06.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/a-perfect-storm-how-covid-19-has-upped-stakes-for-operational-resilience-in-finance/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:46:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-05.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/knowbe4-2021-cybersecurity-predictions-mfa-exploitation-qr-code-phishing-and-ransomware-mobile-attacks/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:36:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-03.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/10-million-investment-in-ai-for-defence/]]></loc>
		<lastmod><![CDATA[2020-12-16T13:35:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/decor_acsm-img-04.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-224-dtex-systems-strong-growth-in-alignment-with-australian-cyber-collaboration-centre-a3c/]]></loc>
		<lastmod><![CDATA[2020-12-16T11:13:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/pod-Episode224.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-225-protect-assist-interview-with-the-head-of-the-australian-cyber-security-centre/]]></loc>
		<lastmod><![CDATA[2020-12-16T11:13:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/pod-Episode225-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://msmdevtest.com/ACSM/wp-content/uploads/2020/10/pod-Episode225-298x300.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/palo-alto-networks-announces-winners-of-2020-australian-partner-awards/]]></loc>
		<lastmod><![CDATA[2020-12-15T02:22:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_588676484.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/identifying-and-estimating-cybersecurity-risk-for-enterprise-risk-management-draft-nistir-8286a-is-available-for-comment/]]></loc>
		<lastmod><![CDATA[2020-12-15T00:28:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_1815385922.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nccoe-releases-two-final-data-integrity-practice-guides/]]></loc>
		<lastmod><![CDATA[2020-12-11T00:44:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_790851892.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-acquires-foresight/]]></loc>
		<lastmod><![CDATA[2020-12-10T02:39:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_684671557.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/datasec-enters-into-mobile-credential-partnership-with-rf-ideas/]]></loc>
		<lastmod><![CDATA[2020-12-09T02:32:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/Closing-the-cybersecurity-.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/ntts-top-cyber-threats-for-december-qakbot-ransomware-as-a-service-phishing/]]></loc>
		<lastmod><![CDATA[2020-12-08T01:39:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/NTT’s-top-cyber-threats-for-December.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fortinet-secure-sd-wan-appliances-for-ot-environments/]]></loc>
		<lastmod><![CDATA[2020-12-03T06:18:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/12/shutterstock_1095422036px.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-confirmed-as-leading-australias-cybersecurity-sector/]]></loc>
		<lastmod><![CDATA[2020-11-30T03:01:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/NSW-confirmed-as-leading-Australia’s-Cybersecurity-Sector.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/haventec-23strands-score-500k-federal-funds-to-store-and-share-dna-test-data/]]></loc>
		<lastmod><![CDATA[2020-11-30T01:32:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/shutterstock_1077882065.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-security-during-black-friday-cyber-monday/]]></loc>
		<lastmod><![CDATA[2020-11-30T01:23:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/shutterstock_1838785399.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/western-australia-government-partners-with-aiia-to-stimulate-local-ict-industry/]]></loc>
		<lastmod><![CDATA[2020-11-26T03:14:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/shutterstock_739324678.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/michael-rogers-joins-cybercx-advisory-board/]]></loc>
		<lastmod><![CDATA[2020-11-23T03:41:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/CyberCX1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kaspersky-completes-global-transparency-initiative-by-moving-data-storage-and-processing-activities-from-russia-to-switzerland/]]></loc>
		<lastmod><![CDATA[2020-11-23T02:04:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/10/Kaspersky_Lab_New-logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/threatquotient-integrates-with-infoblox-for-enhanced-dns-and-ip-address-visibility/]]></loc>
		<lastmod><![CDATA[2020-11-23T01:51:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/threat-quotient-and-infoblox1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sophos-threat-report-flags-ransomware-and-other-significant-cyberattack-trends-expected-to-shape-it-security-in-2021/]]></loc>
		<lastmod><![CDATA[2020-11-19T02:40:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Sophos_logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/msps-report-ransomware-is-still-the-1-malware-threat-affecting-businesses-cost-of-downtime-nearly-doubles-since-2019/]]></loc>
		<lastmod><![CDATA[2020-11-18T03:02:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/datto_logo1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-state-of-australian-minings-digital-transformation/]]></loc>
		<lastmod><![CDATA[2020-11-11T03:39:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Accenture-logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/digital-transformation-in-government-micro-focus-study/]]></loc>
		<lastmod><![CDATA[2020-11-11T02:44:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Micro-Focus_logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/kroll-expands-global-data-breach-notification-in-australia/]]></loc>
		<lastmod><![CDATA[2020-11-10T03:18:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Kroll835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australia-continues-to-hold-its-own-with-most-digitally-ready-countries-of-the-world-but-investment-is-needed-for-societal-resilience/]]></loc>
		<lastmod><![CDATA[2020-11-10T02:50:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/01/Cisco_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/october-2020s-most-wanted-malware-trickbot-and-emotet-trojans-are-driving-spike-in-ransomware-attacks/]]></loc>
		<lastmod><![CDATA[2020-11-10T01:47:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/check-point_logonew.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-contracts-staff-and-advisers-for-avertro/]]></loc>
		<lastmod><![CDATA[2020-11-09T01:57:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/06/Avertro-logo835x3960.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/Ian-Yip-CEO-and-Co-Founder-Avertro.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/women-in-cyber-scholarship-closes-11-december-2020/]]></loc>
		<lastmod><![CDATA[2020-11-04T18:12:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/cover-ccx.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/major-survey-finds-australians-aware-of-cyber-threats-but-not-fully-prepared-for-them/]]></loc>
		<lastmod><![CDATA[2020-11-03T14:36:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/cover-asr-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/comments-wanted-for-the-nccoes-data-integrity-paper/]]></loc>
		<lastmod><![CDATA[2020-11-03T02:11:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/11/cover-nccoe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mcafee-releases-mvision-cloud-native-application-protection-platform/]]></loc>
		<lastmod><![CDATA[2020-10-30T03:25:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/McAfee_logo1000x470.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/MPOWER_20_MVISION-CNAPP_300dpi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/organisations-paid-hackers-23-5-million-for-these-10-vulnerabilities-in-one-year/]]></loc>
		<lastmod><![CDATA[2020-10-30T01:44:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/09/hackerone-logo835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/speech-to-the-house-of-representatives-cyber-threats-to-democratic-institutions/]]></loc>
		<lastmod><![CDATA[2020-10-29T01:56:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/02/Parliament-of-australia835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-audit-of-publicly-accessible-australian-government-websites-has-been-released/]]></loc>
		<lastmod><![CDATA[2020-10-29T00:06:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Security-audit-of-publicly-accessible-Australian-government-websites-has-been-released.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/third-consecutive-quarter-of-growth-in-overall-complaints-q1-small-business-complaints-spike-28/]]></loc>
		<lastmod><![CDATA[2020-10-28T03:08:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/trust-in-artificial-intelligence-australians-need-to-know-more-university-of-queensland-kpmg-australia-report/]]></loc>
		<lastmod><![CDATA[2020-10-28T02:59:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/KPMG-and-University-of-Queensland1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-adopts-ibms-open-p-tech-platform-to-bolster-pipeline-of-cyber-security-experts/]]></loc>
		<lastmod><![CDATA[2020-10-28T02:19:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/IBM-NSW.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-opens-perth-office/]]></loc>
		<lastmod><![CDATA[2020-10-27T02:45:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/CyberCX1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-government-upgrades-to-cutting-edge-information-systems-for-navys-ships/]]></loc>
		<lastmod><![CDATA[2020-10-26T01:24:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/20200215ran8492792_001.t5ee99f89.m1200.x5ZvF0mq9oiZTVvMW.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-largest-cyber-test-range-officially-opens-with-a-global-cyber-security-competition/]]></loc>
		<lastmod><![CDATA[2020-10-22T02:27:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/07/a3c-header835x396.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/111A3714.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/111A3502.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/power-of-budget-in-security/]]></loc>
		<lastmod><![CDATA[2020-10-22T02:22:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/shutterstock_1709836873.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Figure-1-Approach-types.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Table-1-Approach-pros-and-cons.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Figure-2-Balancing-budget.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Figure-3-Budget-contributors.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/university-of-wollongong-deploys-tenable-for-cybersecurity/]]></loc>
		<lastmod><![CDATA[2020-10-22T02:08:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/University-of-Wollongong1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/digital-skills-organisation-appoints-new-ceo-patrick-kidd-obe-oam-as-it-kicks-off-first-pilot-project-to-train-100-data-analysts/]]></loc>
		<lastmod><![CDATA[2020-10-22T01:53:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Digital-Skills-Organisation1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sourced-group-secures-additional-2-5-million-in-funding/]]></loc>
		<lastmod><![CDATA[2020-10-21T03:44:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Kivera1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cato-appoints-brett-waddington-regional-sales-director-and-thanh-khong-sales-engineer-for-australia-new-zealand/]]></loc>
		<lastmod><![CDATA[2020-10-21T02:46:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/cato1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-to-acquire-decipher-works-and-cloudten/]]></loc>
		<lastmod><![CDATA[2020-10-20T02:37:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/CyberCX1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/veridian-solutions-achieves-crest-accreditation/]]></loc>
		<lastmod><![CDATA[2020-10-20T02:11:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/veridian-logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/queensland-businesses-to-go-online-to-get-defence-ready/]]></loc>
		<lastmod><![CDATA[2020-10-19T02:50:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/04/DepartmentofDefence835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/anz-businesses-underprepared-for-the-future-of-work-ntt/]]></loc>
		<lastmod><![CDATA[2020-10-19T00:51:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/NTT_Logo1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dicker-data-announces-new-microsoft-cloud-division/]]></loc>
		<lastmod><![CDATA[2020-10-15T03:03:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Dicker-Data1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/updated-national-security-science-and-technology-priorities/]]></loc>
		<lastmod><![CDATA[2020-10-15T01:49:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/09/Australian-Government2835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dtex-systems-strong-growth-in-alignment-with-australian-cyber-collaboration-centre-a3c/]]></loc>
		<lastmod><![CDATA[2020-10-12T03:00:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/DTEX1000x470.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Episode224.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nsw-at-risk-of-significant-data-breach-needs-cyber-cops/]]></loc>
		<lastmod><![CDATA[2020-10-12T01:48:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Unions-NSW1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/20-million-boost-for-world-leading-ai-research/]]></loc>
		<lastmod><![CDATA[2020-10-09T03:19:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/aiml-students.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/anton-van-den-hengel.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/aiml-students-web.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cyber-students-called-for-the-2021-adf-cyber-gap-program/]]></loc>
		<lastmod><![CDATA[2020-10-08T03:35:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/shutterstock_1077839372.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybersecurity-framework-version-1-1-manufacturing-profile-nistir-8183-revision-1/]]></loc>
		<lastmod><![CDATA[2020-10-08T02:41:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/fujitsu-australia-new-zealand-announces-new-ceo/]]></loc>
		<lastmod><![CDATA[2020-10-08T00:12:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/Fujitsu-Logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zerologon-exploited-by-nation-states/]]></loc>
		<lastmod><![CDATA[2020-10-07T02:17:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/shutterstock_1247019490.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/comments-wanted-on-new-data-integrity-paper/]]></loc>
		<lastmod><![CDATA[2020-10-02T01:11:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/10/nccoe-logo1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/iscma-an-information-security-continuous-monitoring-program-assessment-draft-nistir-8212-available-for-comment/]]></loc>
		<lastmod><![CDATA[2020-10-02T00:56:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/rmit-to-lead-national-cybersecurity-project-for-the-tertiary-sector/]]></loc>
		<lastmod><![CDATA[2020-09-30T01:58:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/RMIT_logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/aiia-welcomes-federal-government-800m-digital-business-investment/]]></loc>
		<lastmod><![CDATA[2020-09-29T05:52:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/12/AIIA_Logo835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/security-guidance-for-first-responder-mobile-and-wearable-devices-draft-nistir-8235-available-for-comment/]]></loc>
		<lastmod><![CDATA[2020-09-29T00:45:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/wontok-appoints-mick-esber-as-head-of-technology/]]></loc>
		<lastmod><![CDATA[2020-09-28T11:21:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Mick-Esber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/episode-93-introducing-fujitsus-geospatial-big-data-platform-spatiowl/]]></loc>
		<lastmod><![CDATA[2020-09-25T07:36:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2017/11/CSWP-Ver-2_1400x1400.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/08/fujitsu.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/varonis-appoints-adam-gordon-as-country-manager-in-anz/]]></loc>
		<lastmod><![CDATA[2020-09-25T01:46:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Varoni-logo1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Adam-high-res.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-importance-of-encryption-and-the-cloud/]]></loc>
		<lastmod><![CDATA[2020-09-25T00:14:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Amazon-Web-Services_logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/business-leaders-in-australia-new-zealand-expect-full-recovery-from-2020-disruptions-within-three-years-according-to-dxc-technology-study/]]></loc>
		<lastmod><![CDATA[2020-09-24T04:51:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/DXC-Technology1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-cyber-strategy-navigating-unchartered-territories-needs-both-caution-diplomacy/]]></loc>
		<lastmod><![CDATA[2020-09-24T03:26:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/IPAG-logo1000x470.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/data-integrity-recovering-from-ransomware-and-other-destructive-events-nist-publishes-sp-1800-11/]]></loc>
		<lastmod><![CDATA[2020-09-24T02:06:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-ot-cyber-security-specialist-to-protect-australian-business-interests/]]></loc>
		<lastmod><![CDATA[2020-09-23T02:29:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Secolve835x396.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Laith-Shahin-CEO-Secolve.com_.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/adf-cyber-gap-program-underway/]]></loc>
		<lastmod><![CDATA[2020-09-21T23:38:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/09/Australian-Government2835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/edith-cowan-university-to-develop-perths-first-comprehensive-city-campus/]]></loc>
		<lastmod><![CDATA[2020-09-21T01:40:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/01/ECU_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-think-tech-companies-must-act-to-stamp-out-online-harms-in-our-new-research-report/]]></loc>
		<lastmod><![CDATA[2020-09-18T02:11:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/07/esafety-logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/securing-home-iot-devices-using-mud-final-public-draft-of-sp-1800-15-now-available/]]></loc>
		<lastmod><![CDATA[2020-09-17T03:54:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/election-security-study-disinformation-campaigns-biggest-potential-threat-to-future-australian-elections/]]></loc>
		<lastmod><![CDATA[2020-09-17T03:24:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/ISACA_logo1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/election-security-infographic-ANZ.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/radware-survey-reveals-remote-work-blind-spots/]]></loc>
		<lastmod><![CDATA[2020-09-17T03:03:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Radware1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/now-available-nist-sp-1800-21-mobile-device-security-corporate-owned-personally-enabled-cope/]]></loc>
		<lastmod><![CDATA[2020-09-16T03:07:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/yubico-delivers-new-security-key-to-defend-against-hackers-in-the-age-of-modern-work-the-yubikey-5c-nfc/]]></loc>
		<lastmod><![CDATA[2020-09-15T04:04:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/5CNFC-lifestyle2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/defining-the-role-of-sase-in-a-connected-future/]]></loc>
		<lastmod><![CDATA[2020-09-15T03:31:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Forcepoint1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/SAVVIDES_Headshot.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/400k-investment-to-develop-tech-skills-in-queensland/]]></loc>
		<lastmod><![CDATA[2020-09-15T00:34:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/12/AIIA_Logo835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/technology-investment-and-adoption-a-top-focus-for-australian-firms-post-covid-19-new-research-reveals/]]></loc>
		<lastmod><![CDATA[2020-09-14T02:24:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Poly835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-cyber-collaboration-centre-increases-cyber-resilience-through-connecting-global-organisations-with-australian-smes/]]></loc>
		<lastmod><![CDATA[2020-09-11T04:50:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/07/a3c-header835x396.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/A3C8401.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/service-nsw-cyber-incident/]]></loc>
		<lastmod><![CDATA[2020-09-11T04:28:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/shutterstock_635530685.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/guide-to-enterprise-telework-security-pre-draft-call-for-comments-available-on-special-publication-800-46-rev-2/]]></loc>
		<lastmod><![CDATA[2020-09-11T02:21:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-fintech-vc-investment-bullish-in-2020-merger-activity-declines-kpmg-pulse-of-fintech/]]></loc>
		<lastmod><![CDATA[2020-09-10T03:14:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/06/KPMG_logo835x396-white.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/blackberry-partners-with-sliced-tech-to-host-secusuite-its-certified-mobile-communications-solution-in-australia/]]></loc>
		<lastmod><![CDATA[2020-09-09T03:09:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/08/blackberry_logo835x396.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Jason-and-David.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/paessler-and-flowmon-networks-team-up/]]></loc>
		<lastmod><![CDATA[2020-09-09T02:03:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/paessler_logo1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Steven-Feurer_CTO.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/securing-the-internet-of-things-for-consumers/]]></loc>
		<lastmod><![CDATA[2020-09-08T04:29:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Securing-the-Internet-of-Things-for-Consumers-web.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/dont-become-a-victim-of-uncertainty-with-it-risk-management/]]></loc>
		<lastmod><![CDATA[2020-09-08T03:22:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/paessler_logo1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Daniel-Sultana-APAC-Regional-Director-at-Paessler.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/telecommunications-sector-security-reforms-under-committee-scrutiny/]]></loc>
		<lastmod><![CDATA[2020-09-08T02:41:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/02/Parliament-of-australia835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australian-defence-force-pilots-cyber-training-program/]]></loc>
		<lastmod><![CDATA[2020-09-08T01:37:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/ADCT-image.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/salaries-rise-and-opportunities-grow-pandemic-resilient-tech-sector-report-shows/]]></loc>
		<lastmod><![CDATA[2020-09-08T01:17:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/12/AIIA_Logo835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/arq-group-partner-with-swinburne-to-upskill-talent/]]></loc>
		<lastmod><![CDATA[2020-09-04T04:29:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/ARQ-Group1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cybercx-acquires-new-zealand-cyber-security-testing-firm-insomnia-security/]]></loc>
		<lastmod><![CDATA[2020-09-04T02:56:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/10/CyberCX835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/new-report-shows-australians-can-fight-back-against-cyber-criminals/]]></loc>
		<lastmod><![CDATA[2020-09-04T02:48:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/ACSC-Annual-Cyber-Threat-Report-web.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/forum-group-and-tecala-join-forces/]]></loc>
		<lastmod><![CDATA[2020-09-03T05:43:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Forum-Group-and-Tecala.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Pieter-DeGunst.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Bill-Papas.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australias-enterprise-storage-revenue-will-maintain-5-7-cagr-between-2019-and-2024/]]></loc>
		<lastmod><![CDATA[2020-09-03T02:09:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/shutterstock_97546352.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/mimecast-now-certified-in-the-servicenow-store/]]></loc>
		<lastmod><![CDATA[2020-09-02T03:22:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/06/Mimecast-New835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/eset-research-discovers-kryptocibule-the-multitasking-multicurrency-cryptostealer/]]></loc>
		<lastmod><![CDATA[2020-09-02T02:32:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/06/ESET_new835x396.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/ESET-Research-discovers-KryptoCibule.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/the-impact-of-an-organisations-security-posture-on-its-external-partners-or-customers/]]></loc>
		<lastmod><![CDATA[2020-09-02T01:46:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/09/Fortinet_logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/cert-nz-q1-q2-2020-reports-released/]]></loc>
		<lastmod><![CDATA[2020-08-31T01:49:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/CERT-Logo1000x470.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/regulation-risks-australian-access-to-google-services/]]></loc>
		<lastmod><![CDATA[2020-08-27T03:35:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/IBISWorld1000x470.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Google-and-Facebook-revenue-in-Australia.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/placing-the-warning-below-on-its-Google-Search-results.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Decline-of-the-newsletter-publishing-industry.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Australian-advertising-expenditure.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/zscaler-ramps-up-anz-presence-with-two-anz-regional-sales-director-appointments/]]></loc>
		<lastmod><![CDATA[2020-08-27T03:01:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/05/ZScalerLogo835x396.gif]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Kirk-Henzlik.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Benjamin-Weldon.jpeg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/sophisticated-apt-style-cyber-espionage-group-wreaking-havoc-in-australia/]]></loc>
		<lastmod><![CDATA[2020-08-27T02:42:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/06/bitdefender_white_red-logo835x396.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/impact-analysis-tool-for-independent-cyber-supply-chain-risks-nistir-8272-now-available/]]></loc>
		<lastmod><![CDATA[2020-08-26T02:28:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/nist-cloud-computing-forensic-science-challenges-nistir-8006-now-available/]]></loc>
		<lastmod><![CDATA[2020-08-26T02:02:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2018/05/nistident_logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/empired-enters-strategic-partnership-with-informatica-in-australia-and-new-zealand/]]></loc>
		<lastmod><![CDATA[2020-08-25T01:14:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2019/08/Empired_Logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/extrahop-pushes-the-australian-security-market-with-nextgen-appointment/]]></loc>
		<lastmod><![CDATA[2020-08-25T00:09:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/06/extrahop-logo835x396.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://australiancybersecuritymagazine.com.au/australians-going-online-can-be-secure-by-default/]]></loc>
		<lastmod><![CDATA[2020-08-24T21:29:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/06/PALO-ALTO_NETWORKS835x396.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://australiancybersecuritymagazine.com.au/wp-content/uploads/2020/08/Cover-Ep2-2.jpg]]>			</image:loc>
		</image:image>
	</url>
</urlset>
