<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url> <loc>https://www.smokescreen.io/the-bright-side-of-the-darkside-ransomware/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/ransomware-the-limits-of-prevention-and-active-defense/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/6-takeaways-from-gov-uks-2021-cybersecurity-breaches-survey/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/the-pragmatic-security-leaders-guide-to-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/using-deception-to-shield-the-insurance-sector/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/finding-active-defense-opportunities-in-a-pentest-report/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/four-mitre-shield-techniques-you-can-implement-in-2021/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/active-defense-for-incident-responders/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/you-need-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/how-many-decoys-do-i-need/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/covid-19-essential-services/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/6-ways-deception-technology-levels-up-your-soc/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/deception-technology-101/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/practical-honeypots-a-list-of-open-source-deception-tools-that-detect-threats-for-free/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/7-deadly-sins-how-to-fail-at-implementing-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/10-questions-to-ask-your-deception-technology-provider/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/signatures-rock-defending-a-cybersecurity-whipping-boy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/adversarial-thinking-improving-cybersecurity-with-ants-and-barcodes/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/deception-and-kerckhoffss-cryptographic-principle/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/the-capability-maturity-of-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/gartner-identifies-deception-as-a-top-10-security-technology-for-2016/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/why-deception-matters/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/5-ways-the-most-successful-csos-stop-attacks/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/malware-detection-is-a-failing-strategy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/drowning-in-data-the-event-fatigue-problem/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/lenny-zeltser-on-protean-security-tactics/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/web-application-attacks/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/lateral-movement-detection/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/ransomware/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/targeted-threat-detection/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/social-engineering/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/malware-less-attacks/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/building-visibility-in-industrial-networks-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/mitigating-cyber-risks-in-it-services-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/mitigating-3rd-party-risks-for-atms-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/the-business-case-for-detecting-targeted-cyber-attacks/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/adversarial-driven-security-for-scada-ics-systems/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-for-the-next-gen-soc/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/a-guide-to-evaluating-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-techology-vs-network-traffic-analysis/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/smokescreen-illusionblack-vs-fidelis-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/smokescreen-illusionblack-vs-attivo-technologies/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-technology-vs-user-and-entity-behavior-analytics/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/smokescreen-illusionblack-vs-symantec-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-technology-for-banking-and-finance/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-technology-for-scada-ics-systems/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-technology-for-the-healthcare-industry/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/deception-technology-at-the-worlds-fastest-stock-exchange/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/detecting-supply-chain-attacks-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/detecting-sunburst-with-smokescreen/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/defending-against-sunburst-style-supply-chain-attacks-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/creating-private-threat-intelligence-with-deception-ahead-of-a-business-launch/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/an-attackers-view-of-a-work-from-home-world/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/adopting-the-mitre-shield-framework-with-smokescreen/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/threat-detection-with-deception-technology/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/resources/actively-defending-air-gapped-networks-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/active-defense/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/gartner/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/history/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/incident-response/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/industry/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/malware/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/mitre/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/philosophy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/ransomware/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/sans/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/strategy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/tools/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/categories/uncategorized/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/red-team-chronicles/the-one-where-failed-to-break-in/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/red-team-chronicles/the-one-where-we-broke-into-a-bank/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/red-team-chronicles/the-one-where-i-pulled-an-oceans-11/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/handbooks/building-an-active-defense-plan-from-a-pen-test-report/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/handbooks/scalable-endpoint-forensics-triage-handbook/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/siege-craft/the-top-40-ransomware-techniques-and-how-to-screw-with-them/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/siege-craft/top-lateral-movement-techniques/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/shadowhunt-intel/perimeter-under-siege-report/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/unfiltered/at-the-cutting-edge-of-attack-phase-identification-adversary-intent-recognition-and-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/unfiltered/cisos-blueprint-for-red-teaming/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/unfiltered/take-back-the-advantage/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/from-the-lab/detecting-snake-ransomware-with-deception/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/about/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/all-resources/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/blog/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/contact/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/demo/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/pricing/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/privacy-policy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/register-deal/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/responsible-disclosure-policy/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
<url> <loc>https://www.smokescreen.io/library/red-team-chronicles/</loc> <changefreq>daily</changefreq> <priority>0.7</priority> </url>
</urlset>