<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.interconnectedsecurity.com/intro/security-left-behind/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/intro/ai-has-entered-the-chat/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/intro/the-scope-has-changed/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/intro/the-shift-to-behavior-based-security/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/intro/building-a-new-security-model/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/interconnected/a-common-language/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/interconnected/ai-broke-the-org-chart/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/interconnected/security-isnt-linear/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/interconnected/roles-over-titles/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/knowledge-work/from-shadow-it-to-shadow-ai/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/knowledge-work/your-data-has-left-the-building/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/knowledge-work/dual-identities/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/knowledge-work/hacking-with-words/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/knowledge-work/ai-governance-is-stifling-innovation/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/the-no-code-blind-spot/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/who-is-driving-this-workflow/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/trusted-by-default/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/the-smallest-key/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/no-one-is-home/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/built-on-sand/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/when-the-model-is-wrong/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/automation-in-the-dark/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/the-approval-paradox/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/wired-in/nobodys-security-team/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/the-ide-is-the-new-attack-surface/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/local-hosted-and-completely-ungoverned/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/trusting-the-tool-that-runs-your-code/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/when-the-harness-becomes-the-threat/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/the-agentic-workspace/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/securing-ai-code-at-the-source/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/attribution-and-auditability/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/intelligent-remediation/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/governing-at-the-speed-of-commits/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/handling-issues-effectively/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/the-war-on-false-positives/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/agentic-development/governing-agentic-remediation/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/the-language-of-applications/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/some-assembly-required/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/the-sprawl-of-assets/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/who-owns-this-things/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/building-an-application-graph/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/traditional-code-security/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/feeding-the-model-securely/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/hunting-for-ai-components/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/adding-in-model-security/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/laying-a-secure-foundation/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/isolating-apps-and-agents/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/ephemeral-security/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/the-neighbors-yard/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/secure-by-design/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/policy-through-natural-language/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/self-building-audit-trails/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/governing-ai-components/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/live-fire-against-apps-and-apis/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/breaking-ai/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/ai-systems-and-agents/continuous-adversarial-testing/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/deployment-is-not-the-finish-line/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/pulling-out-the-rug/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/after-the-handshake/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/the-code-you-dont-own/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/failure-to-observe/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/when-the-model-goes-rogue/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/attacked-by-ai-models/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/deployed/shutdown/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/appendix/compounding-context-the-missing-layer-in-sca/</loc>
<lastmod>2026-05-11T14:50:46+00:00</lastmod>
</url>
<url>
<loc>https://www.interconnectedsecurity.com/</loc>
</url>
</urlset>
