<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://security-storm.com/playbook</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2019-07-08</lastmod>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2019/7/7/aws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1562539274834-JIKENUPCHDWATC8M9F1V/networkRecon_code.jpg</image:loc>
      <image:title>Playbook - Detecting Recon and Scanning Activity in AWS: A Crash Course</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1562545892470-TYUQZE62KVXUM7QNHDDC/userRecon_pic.PNG</image:loc>
      <image:title>Playbook - Detecting Recon and Scanning Activity in AWS: A Crash Course</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1562551308656-NQCRCLY1JJTN8DE0FMD3/high+connect+results.png</image:loc>
      <image:title>Playbook - Detecting Recon and Scanning Activity in AWS: A Crash Course</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1562547590178-L5KX2VJGRTC73SB8J1N5/high+connect.png</image:loc>
      <image:title>Playbook - Detecting Recon and Scanning Activity in AWS: A Crash Course</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2019/5/3/automating-firedrill-adsim-configuration-with-infernoauger</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913322488-1SCUMAVDYSJDN6W9BBF4/Capture3.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913513998-1LF2WKR461Q68SZFTHXO/Capture5.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913672660-EOHMOL5UBU5S1IU0HJIN/Capture8.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913119558-F3CNA9GIHLZ15GUMM0G5/Capture1.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
      <image:caption>Screenshot of the FireDrill API Portal</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913811259-D14X0RQHA1NQILL00IWA/Capture11.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913450718-9VU8SCUM9BBA3PDE3CDZ/Capture4.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913725200-7U5NRH1S8CWBM5RG9IWX/Capture9.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913890869-67U0NAYIHYWAIPTSBET0/Capture13.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913776041-SFRHXQNESBBE68O5Y4WJ/Capture10.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913247940-1UCBZKFAJEB5SYGRQCCZ/Capture2.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913613035-NZV7Y8RFVAF69JJOEEDQ/Capture7.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913558595-D2STXGWY9R286STUTVCO/Capture6.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1556913854078-8JSV69QYNA13O92ERVZ7/Capture12.png</image:loc>
      <image:title>Playbook - Automating FireDrill AdSim Configuration with InfernoAuger</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2018/11/9/risk-gifts-an-early-present</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-18</lastmod>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2018/4/5/searching-the-searches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1522984729800-JY3VHY8EGX6OL945ZYU7/search_searches1.PNG</image:loc>
      <image:title>Playbook - Searching the Searches</image:title>
      <image:caption>Search Term Search Results</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2018/3/5/detecting-rdp-brute-force-with-one-hand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1520258691419-9X0DOPJXK1W9SKVQ5MY2/suspect_rdp_attack.PNG</image:loc>
      <image:title>Playbook - Detecting RDP Brute Force with One Hand</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/10/2/potential-malicious-user-agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-03</lastmod>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/25/curing-alert-fatigue-through-suppression-and-fidelity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506372723332-VYIPOXBU6PUN9G92W7YD/Auto-Populated.PNG</image:loc>
      <image:title>Playbook - Curing Alert Fatigue Through Suppression and Fidelity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506371965912-G6WGT4BP6SOE8VXXNO23/image-asset.png</image:loc>
      <image:title>Playbook - Curing Alert Fatigue Through Suppression and Fidelity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506371637189-93FQ7ZRMLXK880RS3G5B/image-asset.png</image:loc>
      <image:title>Playbook - Curing Alert Fatigue Through Suppression and Fidelity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506371547766-ZVYE2T98KM6VN48YRDFB/Whitelist_Dashboard.PNG</image:loc>
      <image:title>Playbook - Curing Alert Fatigue Through Suppression and Fidelity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506371572647-1H7DEMJT3NDPAGLNRLP6/Workflow_Action.PNG</image:loc>
      <image:title>Playbook - Curing Alert Fatigue Through Suppression and Fidelity</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/23/ivbs56hotnxa2ewygoltxhran240xf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506198908442-NGSQXSMKYR0UMDAC22CQ/firedrill-scenarios.PNG</image:loc>
      <image:title>Playbook - KNOWING YOUR BATTLE SPACE - PART 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506198851586-9DK68XZZWNETRRK2LYLY/df-tactic-scenario.png</image:loc>
      <image:title>Playbook - KNOWING YOUR BATTLE SPACE - PART 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506198942508-Q1IRIKN9M2PEZVVMVKTE/firedrill-tests.PNG</image:loc>
      <image:title>Playbook - KNOWING YOUR BATTLE SPACE - PART 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506198450378-0BU6J278VVX5DK7GP9VV/falcon_v2_wide-whitebg.png</image:loc>
      <image:title>Playbook - KNOWING YOUR BATTLE SPACE - PART 3</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/23/knowing-your-battle-space-part-5</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197779762-AKWKHNXX8R0ZP2ID50FJ/Tomorrow+Modeling.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
      <image:caption>DarkFalcon Tomorrow Model Concept</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197120794-EYQGTFANSB1J4LS364JT/df-poc-menu.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
      <image:caption>DarkFalcon Proof of Concept Modeling Menu</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197205923-TSO3HC8JL38NQ1XZE9HH/df-poc-reset.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
      <image:caption>DarkFalcon POC Reset</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197893356-1U6IS3R7Q5YXM3WYMYB7/df-tomorrow-model.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
      <image:caption>DarkFalcon Tomorrow Model in Splunk</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197858390-6LSQW0FPQ2XGXU2PVZTB/df-tomorrow-menu.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1506197300689-E2ME2WZQXKDRLH0V4H9H/df-poc-posture.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 5</image:title>
      <image:caption>DarkFalcon POC Security Posture</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/21/knowing-your-battle-space-part-4</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1505908717398-2TUHD83ULZVTVKXZDNI6/df_attack_entry.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
      <image:caption>DarkFalcon Attack Profile Entry</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504638467088-0LWTQT5OEHK35ZPZ71M1/falcon_v2_wide-whitebg.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1505908799564-IGV1XZR7DC1Q2FRLOOAJ/df_attack_profile.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
      <image:caption>DarkFalcon Profiled Attack Detail</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1505908033520-23LNYNZ3LMTY3DCPN2XG/df_threat_external.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
      <image:caption>DarkFalcon External Attack Path, click to see the entire image</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1505908393706-2Q3A7FUSGEXB1C7584HV/df_threat_internal.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
      <image:caption>DarkFalcon Internal Attack Path, click to view entire image</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1505907870635-SKYGWY3V5F4P3YH92P07/1475685085721.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 4</image:title>
      <image:caption>Lockheed Martin Cyber Kill Chain</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/15/controlling-the-chaos-of-your-battle-space-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504722182877-TJ1SLSYA9L4P796ZRWFC/Slide1.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 1/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504719460839-53JMKWP3BRV7A43D85XX/df-control-details.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Adding Security Controls within DarkFalcon</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504719949233-694AVRSM3NK6VMD0RZQ3/df-control-wordcloud.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Word cloud of sample Security Controls based on the number of ATT&amp;CK Tactics that are linked to them</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504722234639-EIY803JTY286CD2JRKUS/Slide3.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 3/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504727374772-MAF8R3Q39U0PQGDQZVP4/Slide8.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 8/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504722217402-3VR99ZADEWV0K8YF4B72/Slide2.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 2/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504727349230-PWJWI6G7OYOG0VGOIRH8/Slide7.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 7/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504722255463-QMDD3456ZWTNTFTCEHPK/Slide4.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 4/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504727323001-Z5R8TEO68W92O0KW1RVN/Slide6.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 6/8</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504719719830-YGBGJU60NOC44A6L5AS2/df-control-mostleast.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>The most and least frequently used Security Controls with ATT&amp;CK Tactics</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504638467088-0LWTQT5OEHK35ZPZ71M1/falcon_v2_wide-whitebg.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504637112570-2Z3P0DH5R7X6JIHD5GTI/df-tactic-scoring.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Scoring a MITRE ATT&amp;CK Tactic in DarkFalcon</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504637273346-D26ULOSIGVHGXHSQJLJX/df-tactic-details.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Details of a MITRE ATT&amp;CK Tactic in DarkFalcon</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504719539704-8PCUDQY5F0BFNU7GISBC/df-control-tactic-link.png</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Linking Security Controls to ATT&amp;CK Tactics</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504727299539-WVWY8M9WENMXL51YG5ES/Slide5.PNG</image:loc>
      <image:title>Playbook - Knowing Your Battle Space - Part 2</image:title>
      <image:caption>Slide 5/8</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/14/knowing-your-battle-space-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-15</lastmod>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/9/6/blastin-and-castin-part-4</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-09-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725599475-DIBYD0C0TXH1Z78X1D9E/Phishing_Indicator_Action_Menu_2.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504726019781-0O2DZVQRGLIFRIU0UAZ2/Phishing_Indicator_Phishing_Signature_Action.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725756505-SCO9X21T3WQSBWDQ0HMI/image-asset.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725680694-CJNG78H9XP5V79ZCSI3D/image-asset.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725735269-N1BX4HUDE89HNX9B6401/Phish_Indicator_Results.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725815219-TWUA00TMEDW0M4W73GGP/Phish_Indicator_Delete_Command.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725661426-HE2VWIHGHJ4AV9VOAOUP/Phish_Indicator_CSV.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725521082-6537P732AEA8M2BCIYTZ/Phish_Indicator_Email_Searcher.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725993864-VIXCBXEPKP5LQCBMFBMM/Phish_Indicator_Phishing_Signature.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725929267-6PLHHGB59FJ8E70M7WVA/image-asset.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725902352-P31NNRWKEA2FXQZ927U0/image-asset.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725575881-LI1FB2RPPY9XP88B8KKF/Phishing_Indicator_Action_Menu.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725637626-062FKTKYL9TM20NX6RAA/image-asset.png</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1504725436588-A409N24FL9Q907I766DN/Phish_Indicator_Dashboard.PNG</image:loc>
      <image:title>Playbook - BLASTIN AND CASTIN - PART 4</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/8/21/blastin-and-castin-part-3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1503333121763-8EQ75LC6896VRDR9NNNJ/8mbZ_4yhynnh5EIJVwRTj3Nr-xPU86tWGc5AnBC-A6BIaMN0lB7z_3cqks8nx1P6uUxl%3Dh900.png</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 3</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/8/10/blastin-and-castin-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502414911285-T31VLT0USA9S87TFND80/Phishing_Metrics_Dashboard</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 2</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502414690165-M1ON8WG10H1XWWBIMZ50/phishing_whitelist</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 2</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502414845561-EW44X0BSR7X2MDAJDKHY/Signatured_Events</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 2</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502414777706-DAEM0CR2MIFYKKEOFD3V/Phishing_signature_Dashboard</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 2</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/2017/8/1/blastin-and-castin-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502247876654-2V692EP0IP6J7N7C74Q1/Summarized+ESA+Event.png</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 1</image:title>
      <image:caption>Figure 1. summary_esa event with all of the compacted fields.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1501641207336-YFR1KDVJXJWRIZY2ZEJV/image-asset.jpeg</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1502247981853-L62XWMJ2LVUT9H69BGP8/image-asset.png</image:loc>
      <image:title>Playbook - Blastin and Castin - Part 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/category/Threat+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/category/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/category/Detection+and+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/category/Situational+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/tag/Blue+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/tag/Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/tag/Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/tag/AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/playbook/tag/Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://security-storm.com/mission</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-08-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5877f45d725e25e5946bf59a/1501640390430-N37RE4A48BQ3GSP89NMT/image-asset.jpeg</image:loc>
      <image:title>Mission</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://security-storm.com/quotes</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-04-06</lastmod>
  </url>
  <url>
    <loc>https://security-storm.com/our-mission-foster</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5794fb301b631bb13257714c/1475094647199-BTSXAL89DIEEN8PUE5EJ/foster-juice-our-roots-v2.jpg</image:loc>
      <image:title>Our Mission</image:title>
    </image:image>
  </url>
</urlset>

