<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 3:26 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://gilliamsecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Gilliam Security</title>
		<link><![CDATA[https://gilliamsecurity.com]]></link>
		<description><![CDATA[Gilliam Security]]></description>
		<lastBuildDate><![CDATA[Wed, 28 May 2025 15:24:34 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://gilliamsecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://gilliamsecurity.com/home-weakness-business-risk-how-poor-cybersecurity-at-home-can-compromise-your-organization/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/home-weakness-business-risk-how-poor-cybersecurity-at-home-can-compromise-your-organization/]]></link>
			<title>Home Weakness, Business Risk: How Poor Cybersecurity at Home Can Compromise Your Organization</title>
			<pubDate><![CDATA[Wed, 28 May 2025 15:24:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-nist-cybersecurity-framework-2-0-should-be-at-the-core-of-your-cybersecurity-strategy/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-nist-cybersecurity-framework-2-0-should-be-at-the-core-of-your-cybersecurity-strategy/]]></link>
			<title>Why NIST Cybersecurity Framework 2.0 Should Be at the Core of Your Cybersecurity Strategy</title>
			<pubDate><![CDATA[Tue, 27 May 2025 14:49:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/strengthening-cybersecurity-for-small-utilities-and-local-energy-providers/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/strengthening-cybersecurity-for-small-utilities-and-local-energy-providers/]]></link>
			<title>Strengthening Cybersecurity for Small Utilities and Local Energy Providers</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 15:21:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/daily-threat-briefing/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/daily-threat-briefing/]]></link>
			<title>Daily Threat Briefing</title>
			<pubDate><![CDATA[Tue, 14 Oct 2025 16:19:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/regulatory-compliance-and-security-risk-assessment/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/regulatory-compliance-and-security-risk-assessment/]]></link>
			<title>Regulatory Compliance and Security Risk Assessment</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 17:07:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/comprehensive-cybersecurity-leadership-and-consulting/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/comprehensive-cybersecurity-leadership-and-consulting/]]></link>
			<title>Proactive Cybersecurity Leadership and Consulting</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 17:05:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/2025-security-awareness-month/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/2025-security-awareness-month/]]></link>
			<title>2025 Security Awareness Month</title>
			<pubDate><![CDATA[Sat, 27 Sep 2025 03:01:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/2026-budget-planning-template/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/2026-budget-planning-template/]]></link>
			<title>2026 Budget Planning Template</title>
			<pubDate><![CDATA[Sat, 27 Sep 2025 02:53:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/cybersecurity-awareness-month-for-critical-infrastructure/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/cybersecurity-awareness-month-for-critical-infrastructure/]]></link>
			<title>Cybersecurity Awareness Month for Critical Infrastructure</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 22:29:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/private-page/patrice-smith-lowe/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/private-page/patrice-smith-lowe/]]></link>
			<title>Patrice Smith-Lowe</title>
			<pubDate><![CDATA[Wed, 30 Jul 2025 15:56:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/service-desk/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/service-desk/]]></link>
			<title>Service Desk</title>
			<pubDate><![CDATA[Thu, 24 Jul 2025 22:44:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/private-page/test-private-page/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/private-page/test-private-page/]]></link>
			<title>Test Private Page</title>
			<pubDate><![CDATA[Thu, 24 Jul 2025 22:37:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/ive-been-ransomed-what-do-i-do-now/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/ive-been-ransomed-what-do-i-do-now/]]></link>
			<title>I&#8217;ve been ransomed, what do I do now?</title>
			<pubDate><![CDATA[Thu, 05 Jun 2025 12:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/massive-data-breach-exposes-184-million-passwords-change-your-password-now/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/massive-data-breach-exposes-184-million-passwords-change-your-password-now/]]></link>
			<title>Massive Data Breach Exposes 184 Million Passwords.  CHANGE YOUR PASSWORD NOW!</title>
			<pubDate><![CDATA[Sun, 25 May 2025 19:37:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/cybersecurity-in-crisis-why-natural-disasters-demand-digital-vigilance/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/cybersecurity-in-crisis-why-natural-disasters-demand-digital-vigilance/]]></link>
			<title>Cybersecurity in Crisis: Why Natural Disasters Demand Digital Vigilance</title>
			<pubDate><![CDATA[Tue, 20 May 2025 14:35:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-information-security-is-critical-during-an-acquisition/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-information-security-is-critical-during-an-acquisition/]]></link>
			<title>Why Information Security is Critical During an Acquisition</title>
			<pubDate><![CDATA[Thu, 15 May 2025 13:15:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/how-cybersecurity-posture-management-facilitates-strategic-development/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/how-cybersecurity-posture-management-facilitates-strategic-development/]]></link>
			<title>How Cybersecurity Posture Management Facilitates Strategic Development</title>
			<pubDate><![CDATA[Wed, 14 May 2025 14:42:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-of-information-security-in-saas-why-it-matters-more-than-ever/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-of-information-security-in-saas-why-it-matters-more-than-ever/]]></link>
			<title>The Importance of Information Security in SaaS: Why It Matters More Than Ever</title>
			<pubDate><![CDATA[Mon, 19 May 2025 14:06:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-physical-security-matters-in-cybersecurity/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-physical-security-matters-in-cybersecurity/]]></link>
			<title>Why Physical Security Matters in Cybersecurity</title>
			<pubDate><![CDATA[Wed, 07 May 2025 12:40:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/what-is-data-protection-and-why-does-it-matter/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/what-is-data-protection-and-why-does-it-matter/]]></link>
			<title>What Is Data Protection and Why Does It Matter</title>
			<pubDate><![CDATA[Tue, 29 Apr 2025 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/how-information-security-shapes-the-future-of-ai-and-machine-learning/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/how-information-security-shapes-the-future-of-ai-and-machine-learning/]]></link>
			<title>How Information Security Shapes the Future of AI and Machine Learning</title>
			<pubDate><![CDATA[Wed, 23 Apr 2025 15:19:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/minimum-necessary-cybersecurity-program/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/minimum-necessary-cybersecurity-program/]]></link>
			<title>What is the Minimum Necessary Cybersecurity Program?</title>
			<pubDate><![CDATA[Tue, 22 Apr 2025 13:27:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/safeguarding-data-privacy-the-critical-role-of-information-security/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/safeguarding-data-privacy-the-critical-role-of-information-security/]]></link>
			<title>Safeguarding Data Privacy: The Critical Role of Information Security</title>
			<pubDate><![CDATA[Thu, 01 May 2025 12:59:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/how-poor-cybersecurity-at-home-impacts-the-workplace-and-what-you-can-do-about-it/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/how-poor-cybersecurity-at-home-impacts-the-workplace-and-what-you-can-do-about-it/]]></link>
			<title>How Poor Cybersecurity at Home Impacts the Workplace and What You Can Do About It</title>
			<pubDate><![CDATA[Wed, 30 Apr 2025 12:59:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/how-edr-is-different-from-traditional-anti-malware-anti-virus-software/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/how-edr-is-different-from-traditional-anti-malware-anti-virus-software/]]></link>
			<title>How EDR Is Different from Traditional Anti-Malware/Anti-Virus Software</title>
			<pubDate><![CDATA[Thu, 24 Apr 2025 13:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-of-cybersecurity-for-critical-infrastructure/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-of-cybersecurity-for-critical-infrastructure/]]></link>
			<title>The Importance of Cybersecurity for Critical Infrastructure</title>
			<pubDate><![CDATA[Mon, 28 Apr 2025 14:05:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-isacs-are-essential-for-effective-threat-intelligence/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-isacs-are-essential-for-effective-threat-intelligence/]]></link>
			<title>Why ISACs Are Essential for Effective Threat Intelligence</title>
			<pubDate><![CDATA[Mon, 21 Apr 2025 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/strengthening-cyber-defenses-through-cybersecurity-posture-management/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/strengthening-cyber-defenses-through-cybersecurity-posture-management/]]></link>
			<title>Strengthening Cyber Defenses Through Cybersecurity Program Performance Management</title>
			<pubDate><![CDATA[Fri, 18 Apr 2025 13:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-information-security-should-be-baked-in-from-day-one-not-bolted-on-later/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-information-security-should-be-baked-in-from-day-one-not-bolted-on-later/]]></link>
			<title>Why Information Security Should Be Baked In From Day One, Not Bolted On Later</title>
			<pubDate><![CDATA[Wed, 16 Apr 2025 15:52:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/free-security-posture-review/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/free-security-posture-review/]]></link>
			<title>FREE Security Posture Review</title>
			<pubDate><![CDATA[Thu, 05 Mar 2026 15:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/careers/information-security-engineer/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/careers/information-security-engineer/]]></link>
			<title>*HIRING* Information Security Engineer</title>
			<pubDate><![CDATA[Wed, 16 Apr 2025 15:32:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-most-common-causes-of-a-third-party-security-breach-and-how-to-prevent-them/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-most-common-causes-of-a-third-party-security-breach-and-how-to-prevent-them/]]></link>
			<title>The Most Common Causes of a Third-Party Security Breach and How to Prevent Them</title>
			<pubDate><![CDATA[Tue, 06 May 2025 12:49:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-your-organization-needs-an-annual-third-party-information-security-assessment/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-your-organization-needs-an-annual-third-party-information-security-assessment/]]></link>
			<title>Why Your Organization Needs an Annual Third-Party Information Security Assessment</title>
			<pubDate><![CDATA[Wed, 16 Apr 2025 12:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/phishing-and-business-email-compromise-the-converging-threat-to-your-organization/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/phishing-and-business-email-compromise-the-converging-threat-to-your-organization/]]></link>
			<title>Phishing and Business Email Compromise: The Converging Threat to Your Organization</title>
			<pubDate><![CDATA[Mon, 12 May 2025 13:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-using-a-search-firm-is-critical-for-filling-cybersecurity-roles/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-using-a-search-firm-is-critical-for-filling-cybersecurity-roles/]]></link>
			<title>Why Using a Search Firm is Critical for Filling Cybersecurity Roles</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:11:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-of-cybersecurity-performance-management-a-key-to-protecting-your-organization/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-of-cybersecurity-performance-management-a-key-to-protecting-your-organization/]]></link>
			<title>The Importance of Cybersecurity Performance Management: A Key to Protecting Your Organization</title>
			<pubDate><![CDATA[Wed, 09 Apr 2025 13:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/contact-us/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 06 May 2025 12:42:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/why-the-human-element-is-the-most-important-part-of-cybersecurity/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/why-the-human-element-is-the-most-important-part-of-cybersecurity/]]></link>
			<title>Why the Human Element is the Most Important Part of Cybersecurity</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 13:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-of-third-party-risk-management-in-the-cloud-navigating-the-shared-responsibility-model/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-of-third-party-risk-management-in-the-cloud-navigating-the-shared-responsibility-model/]]></link>
			<title>The Importance of Third-Party Risk Management in the Cloud: Navigating the Shared Responsibility Model</title>
			<pubDate><![CDATA[Mon, 14 Apr 2025 15:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-value-proposition-of-zero-trust-reducing-cybersecurity-risk-through-smarter-architecture/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-value-proposition-of-zero-trust-reducing-cybersecurity-risk-through-smarter-architecture/]]></link>
			<title>The Value Proposition of Zero Trust: Reducing Cybersecurity Risk Through Smarter Architecture</title>
			<pubDate><![CDATA[Fri, 11 Apr 2025 13:11:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/partners/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/partners/]]></link>
			<title>Partners</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 16:05:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/defining-reasonable-security-insights-from-the-2016-california-data-breach-report/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/defining-reasonable-security-insights-from-the-2016-california-data-breach-report/]]></link>
			<title>Defining &#8220;Reasonable&#8221; Security: Insights from the 2016 California Data Breach Report</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 11:26:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/keeping-your-business-secure/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/keeping-your-business-secure/]]></link>
			<title>Keeping Your Business Secure</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 02:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/understanding-the-difference-between-vulnerability-scans-and-vulnerability-assessments/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/understanding-the-difference-between-vulnerability-scans-and-vulnerability-assessments/]]></link>
			<title>Understanding the Difference Between Vulnerability Scans and Vulnerability Assessments</title>
			<pubDate><![CDATA[Mon, 07 Apr 2025 13:27:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/when-your-ciso-walks-out-why-business-resiliency-hinges-on-security-leadership-continuity/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/when-your-ciso-walks-out-why-business-resiliency-hinges-on-security-leadership-continuity/]]></link>
			<title>When Your CISO Walks Out: Why Business Resiliency Hinges on Security Leadership Continuity</title>
			<pubDate><![CDATA[Mon, 05 May 2025 12:59:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/understanding-the-difference-between-a-security-event-incident-and-breach/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/understanding-the-difference-between-a-security-event-incident-and-breach/]]></link>
			<title>Understanding the Difference Between a Security Event, Incident and Breach</title>
			<pubDate><![CDATA[Fri, 04 Apr 2025 13:19:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-and-advantages-of-creating-documentation-for-soc-2-compliance/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-and-advantages-of-creating-documentation-for-soc-2-compliance/]]></link>
			<title>The Importance and Advantages of Creating Documentation for SOC 2 Compliance</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 13:28:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/careers/manager-desktop-engineering-mobility/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/careers/manager-desktop-engineering-mobility/]]></link>
			<title>Manager &#8211; Desktop Engineering &amp; Mobility</title>
			<pubDate><![CDATA[Mon, 05 May 2025 00:45:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/the-importance-of-security-certifications-cissp-cism-and-crisc/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/the-importance-of-security-certifications-cissp-cism-and-crisc/]]></link>
			<title>The Importance of Security Certifications: CISSP, CISM, and CRISC</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 12:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://gilliamsecurity.com/active-country-security-threats/]]></guid>
			<link><![CDATA[https://gilliamsecurity.com/active-country-security-threats/]]></link>
			<title>Active Country Security Threats</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:13:50 +0000]]></pubDate>
		</item>
				</channel>
</rss>
