<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://ctovswild.com/2026/02/17/why-i-archive-my-enterprise-custom-gpts-and-why-you-probably-should-too/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2026/02/8381eb59-cc7b-4fcc-a00f-dff4d1410f7e.png</image:loc><image:title>8381eb59-cc7b-4fcc-a00f-dff4d1410f7e</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-20T15:16:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2026/02/01/why-i-systematically-track-the-time-ai-saves-me/</loc><lastmod>2026-02-17T16:54:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/about/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2017/02/cropped-l3zx1-62sjxvi_sofiam_small.jpg</image:loc><image:title>cropped-l3zx1-62sjxvi_sofiam_small</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/06/simon_hunt2.jpg</image:loc><image:title>Simon Hunt</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/06/shunt.jpg</image:loc><image:title>Simon Hunt</image:title><image:caption>Simon Hunt</image:caption></image:image><lastmod>2026-02-17T16:39:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2019/12/23/mastercard-acquires-riskrecon/</loc><lastmod>2020-04-09T18:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2018/05/24/im-joining-mastercard/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2018/05/mastercard_logo.0.jpg</image:loc><image:title>Mastercard_logo.0</image:title></image:image><lastmod>2020-04-09T17:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2020/04/07/bringing-cyber-risk-analytics-to-28-million-usa-small-businesses/</loc><lastmod>2020-04-09T16:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2017/12/17/how-not-to-implement-smarthome-security-connected-a-c/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2017/12/screen-shot-2017-12-17-at-10-39-09-am.png</image:loc><image:title>Honeywell Redlink</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2017/12/screen-shot-2017-12-17-at-10-23-24-am.png</image:loc><image:title>Screen Shot 2017-12-17 at 10.23.24 AM</image:title><image:caption>Installer Pin</image:caption></image:image><lastmod>2017-12-17T16:22:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/11/10/buying-or-selling-a-smarthome-watch-out-for-amnesia/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/11/5puj4j5qeqzpsiz36qkxxwuwwug.jpg</image:loc><image:title>Moving, 1988 - Richard Prior</image:title></image:image><lastmod>2016-11-10T20:14:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/09/19/it-be-that-time-o-year-again-19th-september-international-talk-like-a-pirate-day/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/09/2000px-flag_of_edward_england-svg.png</image:loc><image:title>2000px-flag_of_edward_england-svg</image:title></image:image><lastmod>2016-09-19T16:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/07/25/safeskies-tsa-master-key-reverse-engineered/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/07/color-cable-ties1.gif</image:loc><image:title>color-cable-ties1</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/07/tsa-master_keys-travelsentry_xmas-2-100673378-large-idge.jpg</image:loc><image:title>tsa-master_keys-travelsentry_xmas-2-100673378-large-idge</image:title></image:image><lastmod>2016-07-25T16:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/07/19/realtors-define-smart-home-but-theres-a-catch/</loc><lastmod>2017-02-09T18:24:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/09/08/innovate-or-die/</loc><lastmod>2016-07-19T09:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/07/17/ny-state-vs-microsoft-part-5/</loc><lastmod>2016-07-17T10:19:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/03/31/smarthome-survey-shows-safety-is-no-1-concern/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/03/screen-shot-2016-03-31-at-10-30-011.png</image:loc><image:title>Screen Shot 2016-03-31 at 10.30.01</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/03/screen-shot-2016-03-31-at-10-30-01.png</image:loc><image:title>Smart Home Survey</image:title></image:image><lastmod>2016-03-31T14:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/02/17/how-could-apple-help-bypass-an-iphone-pin/</loc><lastmod>2016-02-18T15:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2016/02/09/elective-age-ratings-breaking-down-age-label/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2016/02/age-de-xml_age-label-de_startbild_282x297.jpg</image:loc><image:title>age-de-xml_age-label-de_startbild_282x297</image:title></image:image><lastmod>2016-02-09T15:03:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/11/22/smarthome-101-plumbing/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/pex-safe_fhb-blog.jpg</image:loc><image:title>PEX-safe_fhb-blog</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/010920760.jpg</image:loc><image:title>010920760</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/okply.jpg</image:loc><image:title>Okply</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/fbbc5b72-28e4-4b52-9a18-de3eacf070a2_400.jpg</image:loc><image:title>fbbc5b72-28e4-4b52-9a18-de3eacf070a2_400</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/washlet-c100-5x7.jpg</image:loc><image:title>Washlet-C100-5x7</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/h180-pex-02.jpg</image:loc><image:title>h180-pex-02</image:title></image:image><lastmod>2020-11-06T17:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/11/26/smarthome-102-electrical/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/61gbkzhcvyl-_sl1500_.jpg</image:loc><image:title>61gBkZhcVYL._SL1500_</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/61qhzmm0o-l-_sl1079_.jpg</image:loc><image:title>61qhZMM0O-L._SL1079_</image:title></image:image><lastmod>2015-11-26T23:05:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/11/17/one-more-thing-you-dont-want-to-know-about-bitlocker/</loc><lastmod>2015-11-17T15:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/28/10-things-you-dont-want-to-know-about-bitlocker/</loc><lastmod>2015-11-17T15:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/10/26/1155/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/mobilitylive.jpeg</image:loc><image:title>mobilitylive</image:title></image:image><lastmod>2015-11-10T15:58:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/11/10/cio-review-iot-special-edition-november-2015/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/cioreview.jpeg</image:loc><image:title>cioreview</image:title></image:image><lastmod>2015-11-10T15:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/11/05/smart-home-or-dumb-homesmart-cloud/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/11/q400d.jpg</image:loc><image:title>q400d</image:title></image:image><lastmod>2015-11-05T16:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/09/25/ny-state-vs-microsoft-customer-data-disclosure-update-4/</loc><lastmod>2015-09-25T16:32:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/09/22/why-i-want-all-my-lights-to-be-smart/</loc><lastmod>2015-09-22T20:37:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/09/10/smarthome-2015-80s-computing-throwback/</loc><lastmod>2015-09-10T17:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/07/16/adventures-in-vbscript-including-code-from-other-files/</loc><lastmod>2017-02-10T18:38:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/05/14/microsoft-vs-ny-state-still-going-on/</loc><lastmod>2015-05-14T20:22:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/01/04/speaking-at-ces-6-9-jan-las-vegas/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/05/ceslogoblog.png</image:loc><image:title>CES 2015</image:title></image:image><lastmod>2015-05-13T18:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/speaking-engagements/</loc><lastmod>2015-05-13T18:09:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2015/05/04/speaking-at-intx-2015-chicago-may-5-7/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2015/05/intx_logo2015_color_online.png</image:loc><image:title>INTX 2015</image:title></image:image><lastmod>2015-05-13T18:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/01/20/understanding-internet-of-things-for-the-home/</loc><lastmod>2015-01-19T17:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2015/01/16/ces2015-a-festival-of-insecure-unmanaged-iot-devices/</loc><lastmod>2015-01-16T16:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/12/10/cio-review-article-on-the-internet-of-things/</loc><lastmod>2014-12-10T19:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/10/10/there-has-to-be-a-back-door-seriously/</loc><lastmod>2014-10-10T16:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/09/26/ios8-security-apple-take-the-high-road/</loc><lastmod>2014-09-26T15:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/09/11/apple-watch-fanboys-delight/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2014/09/watches.jpg</image:loc><image:title>watches</image:title></image:image><lastmod>2014-09-11T19:24:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/07/31/microsoft-vs-ny-courts-data-request-a-turning-point-for-privacy/</loc><lastmod>2014-09-11T17:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2014/09/08/microsoft-vs-ny-state-stalemate-or-fiasco-continues/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2014/09/microsoft.jpeg</image:loc><image:title>microsoft</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2014/09/ny-court.gif</image:loc><image:title>ny court</image:title></image:image><lastmod>2014-09-11T17:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2013/05/28/test-post/</loc><lastmod>2013-05-28T19:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2012/12/21/decrypt-full-disk-encryption-products-for-299-well-it-got-cheaper-at-least/</loc><lastmod>2012-12-21T17:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2012/11/06/the-connected-home-introducing-the-mcafee-little-red-box/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2012/11/usi_marvell-wi-fi-plug_20091224_300dpi_burgundy-540x455.jpg</image:loc><image:title>McAfee Little Red Box Prototype</image:title></image:image><lastmod>2013-02-06T13:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/24/elite-turns-25-or-how-i-met-david-braben/</loc><lastmod>2012-10-07T03:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/18/your-bank-we-may-have-lost-your-data/</loc><lastmod>2012-10-07T03:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/25/disaster-recovery-wintech-and-pe3/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/08/wintech1.jpg</image:loc><image:title>WinTech</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/08/wintech.jpg</image:loc><image:title>WinTech</image:title></image:image><lastmod>2013-04-24T17:40:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2012/05/10/speaking-at-evanta-ciso-los-angeles-on-14th-may-2012/</loc><lastmod>2012-05-10T15:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2012/05/10/isaca-orlando-event-thanks-to-those-who-attended/</loc><lastmod>2012-05-10T15:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/12/16/evil-twitter-finding-malware-amongst-the-maelstrom/</loc><lastmod>2011-12-16T16:54:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/13/guy-kawasaki-sums-up-innovation/</loc><lastmod>2011-09-14T15:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/09/14/speaking-at-asis-international-orlando-20th-september/</loc><lastmod>2011-09-14T15:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/09/07/piggybacking-wifi-at-60mph/</loc><lastmod>2011-09-07T18:37:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/06/17/take-two-of-these-pills-and-call-support-in-the-morning/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2011/06/pills.jpg</image:loc><image:title>pills</image:title></image:image><lastmod>2011-06-17T17:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/06/14/autodomain-5-50/</loc><lastmod>2011-07-09T22:46:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/autodomain-endpoint-encryption-deployment-script-for-safeboot/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/06/autodomain.png</image:loc><image:title>AutoDomain asking a user for their password</image:title></image:image><lastmod>2011-06-14T19:39:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2011/06/09/mobile-device-or-not-that-is-the-question/</loc><lastmod>2011-06-09T15:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/01/01/updates/</loc><lastmod>2011-04-15T15:08:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/03/28/underground-economies-the-rise-of-intellectual-capital-theft/</loc><lastmod>2011-03-28T19:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/03/28/toastcache-for-eepceem-v5/</loc><lastmod>2011-03-28T14:29:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/03/09/improving-security-on-solid-state-drives/</loc><lastmod>2012-03-06T20:31:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/02/09/two-london-uk-councils-fined-100000-each-for-lost-laptops/</loc><lastmod>2011-02-09T21:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/02/02/eu-close-on-intel-mcafee-deal/</loc><lastmod>2011-10-24T19:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/01/19/two-charged-with-data-theft-from-june-10s-att-hack/</loc><lastmod>2011-01-19T21:57:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/01/19/excellent-blog-on-security-and-privacy-matters/</loc><lastmod>2011-01-19T16:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2011/01/14/decrypting-messages-147-years-late/</loc><lastmod>2011-02-10T07:24:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/12/13/airmen-to-stop-using-removable-media-in-wake-of-wikileaks-incident/</loc><lastmod>2010-12-13T17:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/12/07/speaking-at-the-29th-annual-government-it-symposium-st-paul-mn/</loc><lastmod>2010-12-07T23:42:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/11/30/got-wikileaks-call-a-mcafee-dlplumber/</loc><lastmod>2010-12-01T14:55:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/12/01/speaking-at-mcafee-focus-2010-paris/</loc><lastmod>2010-12-01T14:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/11/05/5-steps-to-data-protection-nirvana/</loc><lastmod>2010-11-05T13:41:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/10/07/more-than-spam-baloney/</loc><lastmod>2010-10-21T13:51:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/09/21/mcaf-ee-launched/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/09/mcaf-ee.jpg</image:loc><image:title>McAf.ee Secure Short URL service</image:title></image:image><lastmod>2010-09-22T03:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/08/25/zurich-insurance-hit-with-3-5m-fine/</loc><lastmod>2010-08-30T16:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/08/10/speaking-at-the-mcafee-houston-community-user-group-september-2nd/</loc><lastmod>2010-09-03T17:16:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/08/04/speaking-on-celebrations-seattle-on-26th-august/</loc><lastmod>2010-08-04T18:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/08/04/speaking-at-the-security-standard-conference-ny-on-13th-september/</loc><lastmod>2010-08-04T18:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/08/02/two-gulf-states-to-ban-some-blackberry-functions/</loc><lastmod>2010-08-02T20:38:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/07/28/details-of-100000000-facebook-users-aggregated-for-download/</loc><lastmod>2010-07-29T00:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/07/22/100000-israelis-data-hacked-by-turks-via-pizza-hut/</loc><lastmod>2010-07-22T17:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/07/22/mexico-passes-data-leak-prevention-law/</loc><lastmod>2010-07-22T16:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/07/09/the-influence-project/</loc><lastmod>2010-07-09T19:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/s-m-a-r-t-or-not-so-smart/</loc><lastmod>2010-07-09T16:05:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2010/07/08/speaking-at-hitrust-in-ashburn-va-20th-july/</loc><lastmod>2010-07-08T16:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/06/28/european-commission-requests-the-uk-to-strengthen-data-protection-regulation/</loc><lastmod>2010-06-28T21:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/06/25/and-the-audience-says-feedback-from-the-amsterdam-executive-summit/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/06/2010-risks.png</image:loc><image:title>2010 Significant Risks</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/06/top-5-priorities.png</image:loc><image:title>Top 5 Priorities of Benelux Attendees </image:title></image:image><lastmod>2010-06-25T18:24:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/06/02/4-mechanical-ways-to-destroy-your-data/</loc><lastmod>2010-06-02T15:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/05/17/speaking-at-the-isms-forum-spain-re-innovation/</loc><lastmod>2010-05-17T15:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/05/09/countrywide-additional-600m-class-action/</loc><lastmod>2010-05-09T09:58:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/05/05/new-china-encryption-rules-wont-pose-headaches-for-u-s-vendors/</loc><lastmod>2010-05-05T20:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/28/data-protection-projects-%e2%80%93-where-to-start/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/04/cats3.jpg</image:loc><image:title>Herding Cats</image:title></image:image><lastmod>2010-04-28T17:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/28/copiers-give-up-secrets/</loc><lastmod>2010-04-28T16:22:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/27/i-got-a-virus-in-my-email-me/</loc><lastmod>2010-04-27T15:35:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/14/countrywide-financials-data-loss-leads-to-20m-class-action-suite/</loc><lastmod>2013-01-21T01:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/13/i-just-won-e650000-in-the-spanish-lotto/</loc><lastmod>2010-04-18T15:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/13/speaking-at-cio-peer-forum-toronto-canada/</loc><lastmod>2010-04-13T15:41:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/04/05/passware-release-bitlockertruecrypt-decryption-tool/</loc><lastmod>2010-04-06T14:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/12/hta-login-box-and-questionanswer-for-eepc5/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/02/logonbox1.png</image:loc><image:title>logonbox</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/02/getquestionanswer.png</image:loc><image:title>getquestionanswer</image:title></image:image><lastmod>2010-04-01T15:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/03/29/tjx-hacker-gets-20-years/</loc><lastmod>2010-03-29T19:41:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/03/29/smart-power-meters-easily-hacked/</loc><lastmod>2010-03-29T19:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/03/29/french-internet-piracy-law-ineffective/</loc><lastmod>2010-03-29T19:24:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/localisation-in-mcafee-endpoint-encryption-for-pcs-safeboot-device-encryption-for-pcs/</loc><lastmod>2010-03-25T12:45:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2010/03/19/threat-of-hacker-obtained-tax-information-yields-137m-revenue/</loc><lastmod>2010-03-19T19:10:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/03/10/cso-executive-seminar-series-on-data-protection-and-encryption/</loc><lastmod>2010-03-11T01:09:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/25/hitech-name-and-shame-goes-up-a-gear/</loc><lastmod>2010-02-25T20:46:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/26/nist-800-111-practical-advice-for-data-protection-projects/</loc><lastmod>2010-03-02T17:33:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/17/livelog-interactive-near-real-time-log-monitor/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/02/livelog1.jpg</image:loc><image:title>livelog</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/02/livelog.jpg</image:loc><image:title>LiveLog</image:title></image:image><lastmod>2010-05-25T15:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/17/epe-log-reader-for-mcafee-endpoint-encryption-v6/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2010/02/epelogreader1-11.jpg</image:loc><image:title>EPE LogReader</image:title></image:image><lastmod>2010-02-17T18:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/16/packing-code-within-code-a-hta-exercise-in-string-manipulation/</loc><lastmod>2010-02-16T21:16:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/16/tpm-undressed/</loc><lastmod>2010-02-18T17:42:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/16/speaking-at-the-security-the-new-business-imperative-event/</loc><lastmod>2010-02-16T18:42:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/16/shell-oils-170000-personnel-list-leaked-to-activists-2/</loc><lastmod>2010-02-16T15:26:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/02/shortest-scam-ever-and-worth-1600000/</loc><lastmod>2010-02-02T21:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/02/ma-201-cmr-17-revisited/</loc><lastmod>2010-02-02T21:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/02/bank-sues-customer-for-200000-of-unrecovered-cybercrime-losses/</loc><lastmod>2010-02-02T17:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/01/14/83000-toronto-health-users-phi-exposed/</loc><lastmod>2010-02-02T17:02:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/02/offer-of-5-5m-from-a-very-shouty-nigerian/</loc><lastmod>2010-02-02T16:17:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/02/02/scam-of-the-week-10-8m-from-barclays/</loc><lastmod>2011-04-20T15:17:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/01/08/eugene-school-leaks-potential-26000-records-could-be-none/</loc><lastmod>2010-01-08T19:39:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/01/07/ghana-takes-first-steps-towards-data-protection-legislation/</loc><lastmod>2010-01-07T21:54:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2010/01/06/cheap-secure-usb-sticks-you-get-what-you-pay-for/</loc><lastmod>2010-03-16T07:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/12/08/personal-data-breach-compensation-suit-thrown-out-in-missouri/</loc><lastmod>2010-01-06T22:04:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/11/17/evil-maid-another-nefarious-trojan-attack/</loc><lastmod>2011-06-19T18:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/12/20/jamaica-passes-cybercrime-bill/</loc><lastmod>2009-12-21T01:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/12/15/notable-breaches-of-phi-in-2009/</loc><lastmod>2009-12-15T21:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/12/14/identity-theft-bad-for-your-health-or-even-fatal/</loc><lastmod>2009-12-14T22:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/12/14/630/</loc><lastmod>2009-12-14T19:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/11/16/are-yoose-responsible-for-bleeding-anti-virus-2010/</loc><lastmod>2009-11-17T02:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/11/16/european-data-protection-law-a-possibility/</loc><lastmod>2009-11-16T21:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/11/03/mwa-ha-ha-crack-your-10-char-password-for-under-3000/</loc><lastmod>2009-11-03T18:04:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/11/03/mcafee-launches-new-community-portal/</loc><lastmod>2009-11-03T16:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/10/22/choicepoint-fined-an-additional-275000-for-failures-to-have-an-effective-security-policy/</loc><lastmod>2009-10-22T18:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/28/speaking-at-focus-2009-vegas-on-october-7th/</loc><lastmod>2009-10-06T19:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/10/06/hacking-exposed-son-of-scoop-pl/</loc><lastmod>2009-10-06T19:35:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/14/firewire-attacks-revisited/</loc><lastmod>2009-10-02T19:57:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/16/one-year-on-cold-boot-attacks-revisited-again/</loc><lastmod>2009-10-02T19:56:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/03/is-encryption-enough-why-just-encrypting-data-doesn%e2%80%99t-solve-today%e2%80%99s-information-security-concerns/</loc><lastmod>2017-07-24T19:33:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/30/h-r-2221-the-federal-data-accountability-and-trust-act/</loc><lastmod>2009-10-02T19:53:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/10/01/repeat-data-loss-offenders/</loc><lastmod>2009-10-02T19:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/30/updates-to-the-map-of-crypto-law/</loc><lastmod>2009-09-30T17:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/25/think-like-a-spy/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/09/phishing.jpg</image:loc><image:title>Phishing</image:title></image:image><lastmod>2009-09-25T13:14:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/21/missouris-new-data-protection-disclosure-law/</loc><lastmod>2009-09-21T17:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/04/truecrypt-vs-peter-kleissner-or-stoned-bootkit-revisited/</loc><lastmod>2010-10-19T19:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/15/privacy-by-design-madrid-2009/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/09/logo-pbd_web_low-res.jpg</image:loc><image:title>Privacy By Design</image:title><image:caption>Privacy By Design</image:caption></image:image><lastmod>2009-09-16T14:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/16/speaking-at-gtc-east-the-new-york-digital-government-summit/</loc><lastmod>2009-09-16T14:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/14/mcafee-data-protection-hippa-hitech-and-breach-notification/</loc><lastmod>2009-09-14T17:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/09/03/bitmask-searches-in-ldap/</loc><lastmod>2016-02-04T12:36:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2008/10/07/data-theft-for-political-gain-no-way/</loc><lastmod>2009-09-03T18:05:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/07/about-bindings-in-mcafee-endpoint-encryption-safeboot/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/08/untitled1.jpg</image:loc><image:title>Connector Bindings in EEM</image:title></image:image><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/08/untitled.jpg</image:loc><image:title>Connector Bindings in EEM</image:title></image:image><lastmod>2013-03-21T15:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/21/new-s-m-a-r-t-monitor-tool/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/08/smartinfo.png</image:loc><image:title>Simon's SmartInfo Monitor</image:title><image:caption>Simon's SmartInfo Monitor</image:caption></image:image><lastmod>2017-03-08T08:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/</loc><lastmod>2009-08-24T15:19:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2009/07/06/founder-and-ceo-of-ebank-steals-200bn-to-fund-a-downpayment-on-a-house/</loc><lastmod>2009-08-06T17:39:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/23/fsa-fines-hsbc-companies-7500000-for-data-security-issues/</loc><lastmod>2009-08-06T17:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/27/iphone-3gs-and-blackberry-insecurities/</loc><lastmod>2009-08-06T17:36:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/08/06/army-national-guard-shows-how-much-it-cares-about-131000-identities/</loc><lastmod>2009-08-06T17:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2008/09/25/how-to-spend-your-data-protection-dollars/</loc><lastmod>2009-07-27T22:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/20/about-language-and-keyboard-settings-in-safeboot/</loc><lastmod>2009-07-27T22:01:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/09/google-chromeos-browser-wars-spill-over-into-the-os-world/</loc><lastmod>2009-07-27T20:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/15/evesdropping-in-airports/</loc><lastmod>2009-07-22T15:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/21/aes-256-and-reputational-risk/</loc><lastmod>2009-07-21T21:46:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/02/china-takes-steps-to-criminalize-gold-farming/</loc><lastmod>2009-07-21T00:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/08/changes-to-pii-and-pci-regulations-in-nevada/</loc><lastmod>2009-07-08T18:09:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/07/02/228/</loc><lastmod>2009-07-02T15:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/30/s-m-a-r-t-data-and-hard-disk-encryption/</loc><lastmod>2009-06-30T17:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/29/new-article-on-vbs-classes/</loc><lastmod>2009-06-30T17:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/vbscript-classes-part-1-why/</loc><lastmod>2009-06-30T15:35:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/programming/vbscript-classes-pt2-properties/</loc><lastmod>2009-07-11T11:15:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2009/06/29/uk-has-cyber-attack-capability/</loc><lastmod>2009-06-29T19:36:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/24/tjx-t-j-maxx-reaches-settlement-with-states-on-data-loss/</loc><lastmod>2009-06-24T20:23:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/24/cornell-university-looses-45000-records/</loc><lastmod>2009-06-24T16:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2008/10/17/quantum-cryptography-a-reality/</loc><lastmod>2009-06-24T14:27:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2008/10/29/focus-ing-on-data-protection/</loc><lastmod>2009-06-24T14:26:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2008/12/03/faking-face-recognition/</loc><lastmod>2009-06-24T14:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/03/10/hard-disk-encryption-needs-management/</loc><lastmod>2009-07-06T22:16:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/12/hackers-criminals-pirates-politicians/</loc><lastmod>2009-06-24T14:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/16/lose-one-customers-data-tell-every-customer/</loc><lastmod>2009-06-24T14:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2009/06/24/something-is-rotten-in-the-state-of-data/</loc><lastmod>2009-06-24T14:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/programming/calculating-pi/</loc><image:image><image:loc>https://ctovswild.com/wp-content/uploads/2009/06/pi4.png</image:loc><image:title>pi</image:title></image:image><lastmod>2009-06-22T20:38:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ctovswild.com/2008/10/08/bitmap-discovery-exploits/</loc><lastmod>2009-06-22T02:37:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com/2007/11/17/mcafee-acquires-safeboot/</loc><lastmod>2009-06-21T19:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ctovswild.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-20T15:16:45+00:00</lastmod></url></urlset>
