<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 4:45 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://testudocyber.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Testudo Cybersecurity</title>
		<link><![CDATA[https://testudocyber.com]]></link>
		<description><![CDATA[Testudo Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Tue, 11 Nov 2025 21:28:22 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://testudocyber.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://testudocyber.com/becoming-ai-durable-how-to-future-proof-yourself-in-the-age-of-automation/]]></guid>
			<link><![CDATA[https://testudocyber.com/becoming-ai-durable-how-to-future-proof-yourself-in-the-age-of-automation/]]></link>
			<title>Becoming AI Durable: How to Future-Proof Yourself in the Age of Automation</title>
			<pubDate><![CDATA[Tue, 11 Nov 2025 21:28:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/the-agent-rule-of-two-designing-safer-ai-agents-through-limitation/]]></guid>
			<link><![CDATA[https://testudocyber.com/the-agent-rule-of-two-designing-safer-ai-agents-through-limitation/]]></link>
			<title>The “Agent Rule of Two” — Designing Safer AI Agents Through Limitation</title>
			<pubDate><![CDATA[Tue, 11 Nov 2025 21:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/shifting-from-reactive-to-proactive-security/]]></guid>
			<link><![CDATA[https://testudocyber.com/shifting-from-reactive-to-proactive-security/]]></link>
			<title>Shifting from Reactive to Proactive Security</title>
			<pubDate><![CDATA[Thu, 26 Jun 2025 22:59:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/why-grc-is-like-a-speed-limit-sign-before-a-sharp-turn/]]></guid>
			<link><![CDATA[https://testudocyber.com/why-grc-is-like-a-speed-limit-sign-before-a-sharp-turn/]]></link>
			<title>Why GRC is Like a Speed Limit Sign Before a Sharp Turn</title>
			<pubDate><![CDATA[Thu, 11 Sep 2025 20:01:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/training-can-be-the-best-bang-for-the-buck/]]></guid>
			<link><![CDATA[https://testudocyber.com/training-can-be-the-best-bang-for-the-buck/]]></link>
			<title>Training can be the best bang for the buck!</title>
			<pubDate><![CDATA[Sun, 22 Jun 2025 22:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/cybersecurity-metrics-measuring-what-really-matters/]]></guid>
			<link><![CDATA[https://testudocyber.com/cybersecurity-metrics-measuring-what-really-matters/]]></link>
			<title>Cybersecurity Metrics: Measuring What Really Matters</title>
			<pubDate><![CDATA[Sun, 22 Jun 2025 22:56:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/risk-assessments-for-beginners-simple-practical-and-actionable/]]></guid>
			<link><![CDATA[https://testudocyber.com/risk-assessments-for-beginners-simple-practical-and-actionable/]]></link>
			<title>Risk Assessments for Beginners: Simple, Practical, and Actionable</title>
			<pubDate><![CDATA[Sun, 18 May 2025 05:09:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/getting-the-basics-right-core-security-technologies-that-actually-matter/]]></guid>
			<link><![CDATA[https://testudocyber.com/getting-the-basics-right-core-security-technologies-that-actually-matter/]]></link>
			<title>Getting the Basics Right: Core Security Technologies That Actually Matter</title>
			<pubDate><![CDATA[Sun, 18 May 2025 05:09:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/privacy-policy/]]></guid>
			<link><![CDATA[https://testudocyber.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Sun, 11 May 2025 14:04:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/portfolio/]]></guid>
			<link><![CDATA[https://testudocyber.com/portfolio/]]></link>
			<title>Portfolio</title>
			<pubDate><![CDATA[Sat, 21 Jun 2025 23:09:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/grc-compliance-checkbox-or-decision-making-engine/]]></guid>
			<link><![CDATA[https://testudocyber.com/grc-compliance-checkbox-or-decision-making-engine/]]></link>
			<title>GRC: Compliance Checkbox or Decision-Making Engine?</title>
			<pubDate><![CDATA[Sat, 13 Sep 2025 23:39:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/contact-me/]]></guid>
			<link><![CDATA[https://testudocyber.com/contact-me/]]></link>
			<title>Contact Me</title>
			<pubDate><![CDATA[Sun, 11 May 2025 14:04:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/laying-the-first-bricks-setting-up-initial-reporting-lines-who-owns-security/]]></guid>
			<link><![CDATA[https://testudocyber.com/laying-the-first-bricks-setting-up-initial-reporting-lines-who-owns-security/]]></link>
			<title>Laying the First Bricks: Setting Up Initial Reporting Lines (Who Owns Security?)</title>
			<pubDate><![CDATA[Thu, 01 May 2025 01:22:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/about-me/]]></guid>
			<link><![CDATA[https://testudocyber.com/about-me/]]></link>
			<title>About Me</title>
			<pubDate><![CDATA[Sun, 11 May 2025 14:01:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/how-to-choose-the-right-cybersecurity-framework-without-losing-your-mind/]]></guid>
			<link><![CDATA[https://testudocyber.com/how-to-choose-the-right-cybersecurity-framework-without-losing-your-mind/]]></link>
			<title>How to Choose the Right Cybersecurity Framework (Without Losing Your Mind)</title>
			<pubDate><![CDATA[Sun, 11 May 2025 13:48:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/building-a-cybersecurity-from-scratch-the-first-critical-hires-and-partnerships/]]></guid>
			<link><![CDATA[https://testudocyber.com/building-a-cybersecurity-from-scratch-the-first-critical-hires-and-partnerships/]]></link>
			<title>Building a Cybersecurity from Scratch: The First Critical Hires and Partnerships</title>
			<pubDate><![CDATA[Sun, 11 May 2025 13:48:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/start-simple-the-policies-you-cant-skip-when-building-a-cybersecurity-program/]]></guid>
			<link><![CDATA[https://testudocyber.com/start-simple-the-policies-you-cant-skip-when-building-a-cybersecurity-program/]]></link>
			<title>Start Simple: The Policies You Can’t Skip When Building a Cybersecurity Program</title>
			<pubDate><![CDATA[Sun, 11 May 2025 13:48:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/laying-the-first-bricks-define-your-crown-jewels-focus-where-it-matters-most/]]></guid>
			<link><![CDATA[https://testudocyber.com/laying-the-first-bricks-define-your-crown-jewels-focus-where-it-matters-most/]]></link>
			<title>Laying the First Bricks: Define Your Crown Jewels: Focus Where It Matters Most</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:44:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/establish-executive-sponsorship-early-and-how-to-keep-them-engaged/]]></guid>
			<link><![CDATA[https://testudocyber.com/establish-executive-sponsorship-early-and-how-to-keep-them-engaged/]]></link>
			<title>Laying the First Bricks: Establish Executive Sponsorship Early (And How to Keep Them Engaged)</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:40:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/understand-the-business-context-mission-goals-and-critical-assets/]]></guid>
			<link><![CDATA[https://testudocyber.com/understand-the-business-context-mission-goals-and-critical-assets/]]></link>
			<title>Laying the First Bricks: Understand the Business Context: Mission, Goals, and Critical Assets</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:39:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/laying-the-first-bricks-why-cybersecurity-programs-fail-without-a-strong-foundation/]]></guid>
			<link><![CDATA[https://testudocyber.com/laying-the-first-bricks-why-cybersecurity-programs-fail-without-a-strong-foundation/]]></link>
			<title>Laying the First Bricks: Why Cybersecurity Programs Fail Without a Strong Foundation</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:37:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/building-a-cybersecurity-program-from-scratch-your-guide-to-security-that-lasts/]]></guid>
			<link><![CDATA[https://testudocyber.com/building-a-cybersecurity-program-from-scratch-your-guide-to-security-that-lasts/]]></link>
			<title>Building a Cybersecurity Program from Scratch: Your Guide to Security That Works</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:36:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://testudocyber.com/how-curiosity-and-a-few-late-nights-pulled-me-into-cybersecurity/]]></guid>
			<link><![CDATA[https://testudocyber.com/how-curiosity-and-a-few-late-nights-pulled-me-into-cybersecurity/]]></link>
			<title>How Curiosity (and a Few Late Nights) Pulled Me into Cybersecurity</title>
			<pubDate><![CDATA[Sat, 26 Apr 2025 23:35:37 +0000]]></pubDate>
		</item>
				</channel>
</rss>
