<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:42 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.wyantcybersecuritybrief.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Wyant Cybersecurity Brief</title>
		<link><![CDATA[https://www.wyantcybersecuritybrief.com]]></link>
		<description><![CDATA[The Wyant Cybersecurity Brief]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Mar 2026 06:13:56 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.wyantcybersecuritybrief.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/security-operations-centers-socs-saving-you-big-bucks-and-lots-of-sleep-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/security-operations-centers-socs-saving-you-big-bucks-and-lots-of-sleep-tom-wyant/]]></link>
			<title>Security Operations Centers (SOCs): Saving You Big Bucks and Lots of Sleep</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 06:13:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/multi-factor-authentication-how-it-works-and-protects-you-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/multi-factor-authentication-how-it-works-and-protects-you-tom-wyant/]]></link>
			<title>Multi-Factor Authentication: How It Works and Protects You</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/password-managers-how-they-protect-you-and-your-business-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/password-managers-how-they-protect-you-and-your-business-tom-wyant/]]></link>
			<title>Password Managers: How They Protect You and Your Business</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/zero-trust-yes-you-can-have-the-software-you-need-hassle-free-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/zero-trust-yes-you-can-have-the-software-you-need-hassle-free-tom-wyant/]]></link>
			<title>Zero Trust: Yes, You Can Have The Software You Need Without Hassle</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/it-policies-protect-your-time-and-money-time-is-money-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/it-policies-protect-your-time-and-money-time-is-money-tom-wyant/]]></link>
			<title>IT Policies: Protect Your Time and Money (and Time is Money)</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/shadow-it-subtle-stealth-way-to-protect-your-network-and-your-budget-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/shadow-it-subtle-stealth-way-to-protect-your-network-and-your-budget-tom-wyant/]]></link>
			<title>Shadow IT: A Subtle, Stealth Way to Protect Your Network (And Your Budget)</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/secure-access-service-edge-sase-cybersecurity-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/secure-access-service-edge-sase-cybersecurity-tom-wyant/]]></link>
			<title>Secure Access Service Edge (SASE): Not Sassy, But Smart for Your Cybersecurity</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/security-awareness-training-yes-cybersecurity-can-be-fun-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/security-awareness-training-yes-cybersecurity-can-be-fun-tom-wyant/]]></link>
			<title>Security Awareness Training: Yes, Cybersecurity CAN Be Fun!</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/security-incident-event-managers-siems-protecting-the-seams-in-your-proverbial-pants-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/security-incident-event-managers-siems-protecting-the-seams-in-your-proverbial-pants-tom-wyant/]]></link>
			<title>Security Incident Event Managers (SIEMs): Protecting the Seams in Your Proverbial Pants</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/encryption-strategies-keeping-hackers-in-the-dark-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/encryption-strategies-keeping-hackers-in-the-dark-tom-wyant/]]></link>
			<title>Encryption Strategies: Keeping Hackers In The Dark (And Your Lights On)</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/minutes/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/minutes/]]></link>
			<title>Want The Latest News on Cybersecurity, As Developments Happen?</title>
			<pubDate><![CDATA[Wed, 01 May 2024 04:44:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/third-party-spam-filtering-a-rarely-discussed-reason-why-you-need-it-tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/third-party-spam-filtering-a-rarely-discussed-reason-why-you-need-it-tom-wyant/]]></link>
			<title>Third-Party Spam Filtering: A Rarely-Discussed Reason Why You Need It</title>
			<pubDate><![CDATA[Sat, 28 Jun 2025 15:17:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/tom-wyant/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/tom-wyant/]]></link>
			<title>Tom Wyant, Host of The Wyant Cybersecurity Brief</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:52:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/recd-bookingrequest/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/recd-bookingrequest/]]></link>
			<title>Thank You &#8211; We Have Received Your Request!</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:51:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/booktom/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/booktom/]]></link>
			<title>Book Tom Wyant as Your Next Great Speaker, Trainer, or Interview Guest</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:50:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/subscribe/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/subscribe/]]></link>
			<title>Subscribe to The Wyant Cybersecurity Brief with Tom Wyant</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:14:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/schedule/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/schedule/]]></link>
			<title>Schedule Your Interview on The Wyant Cybersecurity Brief</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:13:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/instructions/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/instructions/]]></link>
			<title>Get Ready for Your Amazing Interview on The Wyant Cybersecurity Brief!</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:12:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/contact/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/contact/]]></link>
			<title>Contact The Wyant Cybersecurity Brief and Tom Wyant Today!</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:11:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/min-confirmed/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/min-confirmed/]]></link>
			<title>Congratulations – Let’s Get You The “Security Minutes” You Need!</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:10:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/application/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/application/]]></link>
			<title>Apply to Be a Guest on The Wyant Cybersecurity Brief</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:09:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/recd-application/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/recd-application/]]></link>
			<title>Application Received &#8211; The Wyant Cybersecurity Brief</title>
			<pubDate><![CDATA[Wed, 01 May 2024 02:09:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/]]></link>
			<title>The Wyant Cybersecurity Brief with Tom Wyant</title>
			<pubDate><![CDATA[Mon, 25 Sep 2023 19:18:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/episodes-final/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/episodes-final/]]></link>
			<title>Tune into the Wyant Cybersecurity Brief with Tom Wyant!</title>
			<pubDate><![CDATA[Mon, 25 Sep 2023 19:11:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/insights/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/insights/]]></link>
			<title>Insights About Cybersecurity by Tom Wyant</title>
			<pubDate><![CDATA[Mon, 25 Sep 2023 19:08:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/induction/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/induction/]]></link>
			<title>Guest Induction</title>
			<pubDate><![CDATA[Mon, 25 Sep 2023 19:01:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.wyantcybersecuritybrief.com/about/]]></guid>
			<link><![CDATA[https://www.wyantcybersecuritybrief.com/about/]]></link>
			<title>About The Wyant Cybersecurity Brief with Tom Wyant</title>
			<pubDate><![CDATA[Mon, 25 Sep 2023 18:57:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
