<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://milleroncyber.com/2020/02/05/online-scams-how-to-better-protect-online-information/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2020/02/account-transaction.png</image:loc><image:title>account transaction</image:title></image:image><lastmod>2024-06-16T02:57:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2023/12/30/is-passwordless-authentication-better/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2023/12/passwordless-authentication.png</image:loc><image:title>passwordless-authentication</image:title></image:image><lastmod>2023-12-31T03:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2023/03/08/api-security-and-the-risks-within/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2023/03/apparch-application_and_api_attack_patterns-f.png</image:loc><image:title>apparch-application_and_api_attack_patterns-f</image:title></image:image><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2023/03/waap-and-api-pic.png</image:loc><image:title>waap-and-api-pic</image:title></image:image><lastmod>2023-03-09T01:15:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2022/05/07/security-concerns-with-wallet-and-cryptocurrency/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2022/05/cryptocurrency-and-wallet.webp</image:loc><image:title>cryptocurrency-and-wallet</image:title></image:image><lastmod>2022-05-08T13:37:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/contact/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2022/05/girl-in-black.png</image:loc><image:title>Girl in black</image:title></image:image><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/06/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2022-05-08T13:29:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://milleroncyber.com/2020/09/12/cyber-warfare-of-the-new-decade/</loc><lastmod>2022-02-28T00:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2022/01/01/new-year-new-cyber-scams/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2022/01/new-year-new-cyber-scams-pic.jpeg</image:loc></image:image><lastmod>2022-01-01T23:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/12/08/holiday-scams-tis-the-season-to-stay-protected/</loc><lastmod>2021-10-29T12:18:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2021/09/06/cloud-services-and-security-threats-within-them/</loc><lastmod>2021-09-06T17:55:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/10/25/the-two-faced-artificial-intelligence-and-machine-learning/</loc><lastmod>2021-09-03T17:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/11/07/securing-windows-10/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/11/locked-down-windows10.gif</image:loc><image:title>locked-down-windows10</image:title></image:image><lastmod>2021-06-27T13:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/09/08/human-factor-and-information-security/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/09/pi-awareness.png</image:loc><image:title>PI Awareness</image:title></image:image><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/09/security-awareness.jpg</image:loc><image:title>Security Awareness</image:title></image:image><lastmod>2021-06-14T04:13:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2021/06/13/insider-threat-within-organizations/</loc><lastmod>2021-06-14T04:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/10/12/privacy-vs-security-which-is-more-important/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/10/cybersecurity-vs-privacy.png</image:loc><image:title>Cybersecurity-vs-Privacy</image:title></image:image><lastmod>2021-06-14T04:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/06/06/issues-related-to-education-and-information-security/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/06/cyber-2120014_1280.png</image:loc><image:title>cyber-2120014_1280</image:title></image:image><lastmod>2021-06-14T04:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/06/17/cyber-challenges-in-education/</loc><lastmod>2021-06-14T04:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/06/23/top-6-higher-education-security-risks-and-issues/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/06/coaching-development-education-hand-royalty-free-thumbnail.jpg</image:loc><image:title>coaching-development-education-hand-royalty-free-thumbnail</image:title></image:image><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/06/cybersecurity-awareness-2017-blog-660x330-1.jpg</image:loc><image:title>Cybersecurity-Awareness-2017-BLOG-660x330</image:title></image:image><lastmod>2021-06-14T04:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/01/the-importance-of-cybersecurity-lessons-in-school/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/17938125051_6a6eac3e35_b.jpg</image:loc><image:title>17938125051_6a6eac3e35_b</image:title></image:image><lastmod>2021-06-14T04:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/03/student-hacking-highlight-weak-k-12-cybersecurity/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/44035385264_f32e63c3cc.jpg</image:loc><image:title>44035385264_f32e63c3cc</image:title></image:image><lastmod>2021-06-14T04:01:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/11/education-department-knows-it-needs-cyberskills-but-doesnt-know-which-ones/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/ransomware-cybersecurity-cyber-security.jpg</image:loc><image:title>ransomware-cybersecurity-cyber-security</image:title></image:image><lastmod>2021-06-14T03:57:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/17/leading-by-example-security-and-privacy-in-education/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/privacypll.jpg</image:loc><image:title>PrivacyPll</image:title></image:image><lastmod>2021-06-14T03:55:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/24/top-u-s-universities-failing-at-cybersecurity-education/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/cybersecurity-pic.jpg</image:loc><image:title>Cybersecurity pic</image:title></image:image><lastmod>2021-06-14T03:54:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2018/07/31/cybersecurity-in-higher-education/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2018/07/open-hero.jpg</image:loc><image:title>open-hero</image:title></image:image><lastmod>2021-06-14T03:50:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/09/29/using-framework-to-help-improve-critical-infrastructure-cybersecurity/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/09/nice_cybersecurity_workforce_framework.jpg</image:loc><image:title>NICE_Cybersecurity_Workforce_Framework</image:title></image:image><lastmod>2021-06-14T03:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/10/30/blockchain-technology-and-its-advantages/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/10/transactioncycle.jpg</image:loc><image:title>transactioncycle</image:title></image:image><lastmod>2021-06-14T03:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2019/12/14/psychology-and-cybersecurity/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2019/12/avast-cyber-psychology-part-2-cover.png</image:loc><image:title>Avast-Cyber-Psychology-Part-2-Cover</image:title></image:image><lastmod>2021-06-14T03:31:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/03/18/coronavirus-and-security-issues/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2020/03/outbreak-coronavirus-world-large.png</image:loc></image:image><lastmod>2021-06-14T03:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/04/26/5g-and-cybersecurity-hackers-dream/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2020/04/access-antenna-computer-connect-thumbnail.jpg</image:loc></image:image><lastmod>2021-06-14T03:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/05/25/drones-and-cyber-security-protecting-against-data-attacks/</loc><image:image><image:loc>https://milleroncyber.com/wp-content/uploads/2020/05/clouds-control-discovery-drone-royalty-free-thumbnail.jpg</image:loc><image:title>clouds-control-discovery-drone-royalty-free-thumbnail</image:title></image:image><lastmod>2021-06-14T03:19:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2020/07/03/election-security-and-cyber-challenges/</loc><lastmod>2021-06-14T03:14:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2021/04/28/what-is-a-ddos-attack/</loc><lastmod>2021-06-14T03:03:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com/2021/03/28/mobile-devices-becoming-a-greater-target/</loc><lastmod>2021-06-14T03:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://milleroncyber.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-06-16T02:57:53+00:00</lastmod></url></urlset>
