<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://macwangrid.com/</loc><lastmod>2026-04-19</lastmod><priority>1.0</priority></url>
  <url><loc>https://macwangrid.com/about.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/contact.html</loc><lastmod>2026-04-19</lastmod><priority>0.8</priority></url>
  <url><loc>https://macwangrid.com/blog/</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/threat-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/infra-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/dark-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/ai-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/intel-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/lab-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/action-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/wire-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/patch-grid.html</loc><lastmod>2026-04-19</lastmod><priority>0.9</priority></url>
  <url><loc>https://macwangrid.com/blog/why-i-built-darkpulse.html</loc><lastmod>2026-04-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/kev-as-backlog.html</loc><lastmod>2026-04-10</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/ai-in-ops-reality-check.html</loc><lastmod>2026-04-05</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/mit-week-1.html</loc><lastmod>2026-04-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/first-24-hours-breach-response.html</loc><lastmod>2026-03-29</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/home-security-lab-minimum-viable-stack.html</loc><lastmod>2026-03-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/zero-trust-reality.html</loc><lastmod>2026-03-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/reading-the-threat-intelligence-landscape.html</loc><lastmod>2026-03-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/llm-powered-runbooks-where-they-work.html</loc><lastmod>2026-03-26</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/ransomware-10-point-checklist.html</loc><lastmod>2026-03-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/osint-for-it-leaders.html</loc><lastmod>2026-03-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/kubernetes-enterprise-it-not-just-devs.html</loc><lastmod>2026-03-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/setting-up-whonix-step-by-step.html</loc><lastmod>2026-03-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/us-cyber-authorities-who-to-call.html</loc><lastmod>2026-03-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/tor-for-it-professionals-primer.html</loc><lastmod>2026-03-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/mfa-necessary-not-sufficient.html</loc><lastmod>2026-03-22</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/prompt-injection-owasp-of-ai.html</loc><lastmod>2026-03-21</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/dark-web-intel-what-actually-matters.html</loc><lastmod>2026-03-21</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/hidden-cost-multi-cloud.html</loc><lastmod>2026-03-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/whonix-architecture-explained.html</loc><lastmod>2026-03-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/local-llm-for-soc-prototyping.html</loc><lastmod>2026-03-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/tabletop-exercises-that-work.html</loc><lastmod>2026-03-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/credit-freeze-step-by-step.html</loc><lastmod>2026-03-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/rag-for-internal-documentation.html</loc><lastmod>2026-03-17</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/observability-vs-monitoring.html</loc><lastmod>2026-03-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/building-intel-driven-security-program.html</loc><lastmod>2026-03-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/edr-alone-not-enough.html</loc><lastmod>2026-03-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/hidden-service-fundamentals.html</loc><lastmod>2026-03-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/proxmox-vs-esxi-2026.html</loc><lastmod>2026-03-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/ai-tier1-soc-triage-six-months.html</loc><lastmod>2026-03-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/identity-theft-recovery-workflow.html</loc><lastmod>2026-03-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/data-platform-maturity-lakehouse.html</loc><lastmod>2026-03-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/vendor-threat-feeds-reality.html</loc><lastmod>2026-03-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/insider-threat-uncomfortable-truth.html</loc><lastmod>2026-03-10</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/ethics-of-dark-web-research.html</loc><lastmod>2026-03-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/hardening-your-home-network.html</loc><lastmod>2026-03-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/executive-breach-response-playbook.html</loc><lastmod>2026-03-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/why-sre-not-scaling.html</loc><lastmod>2026-03-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/model-selection-for-enterprise-it.html</loc><lastmod>2026-03-07</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/five-sources-i-read-every-morning.html</loc><lastmod>2026-03-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/vulnerability-management-that-works.html</loc><lastmod>2026-03-05</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/identity-separation-in-security-work.html</loc><lastmod>2026-03-04</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/bitwarden-enterprise-review.html</loc><lastmod>2026-03-04</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/endpoint-management-zero-trust.html</loc><lastmod>2026-03-03</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/gdpr-breach-notification-requirements.html</loc><lastmod>2026-03-03</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/data-leakage-in-ai-workflows.html</loc><lastmod>2026-03-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/attribution-when-it-matters.html</loc><lastmod>2026-03-01</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/breach-notification-state-laws.html</loc><lastmod>2026-02-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/1password-vs-keepassxc.html</loc><lastmod>2026-02-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/network-architecture-hybrid-work.html</loc><lastmod>2026-02-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/pgp-for-technical-leaders.html</loc><lastmod>2026-02-26</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/ransomware-negotiation-when-not-to-pay.html</loc><lastmod>2026-02-26</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/economics-of-genai-in-enterprise.html</loc><lastmod>2026-02-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/signal-vs-noise-security-firehose.html</loc><lastmod>2026-02-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/cloud-cost-optimization-framework.html</loc><lastmod>2026-02-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/personal-osint-workstation-build.html</loc><lastmod>2026-02-22</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/soc-maturity-common-plateaus.html</loc><lastmod>2026-02-22</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/business-email-compromise-recovery.html</loc><lastmod>2026-02-21</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/running-a-warrant-canary.html</loc><lastmod>2026-02-21</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/shadow-ai-what-it-doesnt-know.html</loc><lastmod>2026-02-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/threat-landscape-q1-2026-patterns.html</loc><lastmod>2026-02-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/identity-as-new-perimeter.html</loc><lastmod>2026-02-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/home-lab-threat-model.html</loc><lastmod>2026-02-17</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/breach-disclosure-letter-templates.html</loc><lastmod>2026-02-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/privacy-respecting-logging-patterns.html</loc><lastmod>2026-02-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/patching-priority-practitioner-framework.html</loc><lastmod>2026-02-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/agentic-ai-hype-vs-production.html</loc><lastmod>2026-02-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/mitre-attack-for-defenders.html</loc><lastmod>2026-02-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/boring-technology-case.html</loc><lastmod>2026-02-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/from-home-lab-to-production-lessons.html</loc><lastmod>2026-02-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/reading-the-dark-web-intel-sources.html</loc><lastmod>2026-02-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/supply-chain-breach-your-responsibilities.html</loc><lastmod>2026-02-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/supply-chain-security-after-solarwinds.html</loc><lastmod>2026-02-10</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/evaluating-ai-vendors-practitioner-checklist.html</loc><lastmod>2026-02-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://macwangrid.com/blog/onion-services-v3-operator-notes.html</loc><lastmod>2026-02-06</lastmod><priority>0.7</priority></url>
</urlset>
