<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>http://protelion.com/resources/blog/system-access-control/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/threats-and-vulnerabilities-of-information-systems/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/what-is-a-vpn/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/tunneling-protocols/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/nat-network-address-translation/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/firewall/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/acl-access-control-list/</loc><lastmod>2026-04-16T09:39:43+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/osi-model/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/tcp-ip-model/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/what-is-data-protection/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/intrusion-detection-system/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/intrusion-prevention-system-ips/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/what-is-a-sniffer/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/security-information-and-event-management-siem/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/hardware-security-module-hsm/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/scada-systems/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cloud-computing/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/endpoint-protection/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/gateway/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/threat-intelligence/</loc><lastmod>2026-04-16T09:39:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/reactive-security/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/active-defense/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/dlp-data-loss-prevention/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/failover/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/iam-identity-and-access-management/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/iot-internet-of-things/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/indicators-of-compromise/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/s-mime/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/the-cyberhall-of-fame-famous-faces-in-cybersecurity/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/digital-certificates/</loc><lastmod>2026-04-16T09:39:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-and-ai-time-for-a-new-engine/</loc><lastmod>2024-07-25T10:38:13+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/public-key-cryptography/</loc><lastmod>2024-07-30T11:39:01+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/the-future-of-passwords-are-they-becoming-outdated/</loc><lastmod>2024-08-13T14:16:08+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/secure-network-architecture/</loc><lastmod>2024-09-24T09:45:33+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/the-fundamentals-of-cybersecurity/</loc><lastmod>2024-09-24T09:56:20+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/switch-security/</loc><lastmod>2024-11-02T12:45:48+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/router-security/</loc><lastmod>2024-11-02T12:47:21+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/why-secure-mobile-communication-is-crucial-for-critical-infrastructure-and-defense-sectors/</loc><lastmod>2024-11-02T14:34:41+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-common-nouns-a-guide-for-learning-the-basics-part-1/</loc><lastmod>2024-11-20T14:53:27+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/wireless-connection-security-wifi/</loc><lastmod>2024-12-02T11:18:10+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/5-cybersecurity-myths-that-put-your-business-at-risk/</loc><lastmod>2025-01-14T11:11:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/dsl-technology/</loc><lastmod>2025-02-06T17:49:02+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-trends-shaping-2025-a-look-ahead/</loc><lastmod>2025-02-06T17:51:21+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/mpls-multiprotocol-label-switching/</loc><lastmod>2025-02-07T10:50:35+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/vlan-virtual-lan/</loc><lastmod>2025-03-03T16:50:50+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-common-nouns-a-guide-for-learning-the-basics-part-2/</loc><lastmod>2025-03-04T14:34:52+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/the-underworld-of-the-dark-web-economy-how-cybercrime-operates/</loc><lastmod>2025-04-02T11:16:29+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/proxy/</loc><lastmod>2025-04-02T13:38:06+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-careers-beyond-the-hacker-stereotype/</loc><lastmod>2025-04-30T16:08:20+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/industry-4-0/</loc><lastmod>2025-05-06T10:18:59+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/empowering-your-workforce-the-importance-of-cybersecurity-awareness-training-platforms/</loc><lastmod>2025-06-06T15:53:04+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/cybersecurity-in-industry-4-0/</loc><lastmod>2025-06-06T16:16:30+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/from-cyberbullying-to-data-leaks-why-kids-need-cyber-education-too/</loc><lastmod>2025-06-23T12:09:25+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/voip/</loc><lastmod>2025-06-23T16:00:55+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/public-wi-fi-risks-what-you-should-know-before-you-connect/</loc><lastmod>2025-07-30T11:01:15+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/voip-security/</loc><lastmod>2025-07-31T10:26:42+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/mdm-mobile-device-management/</loc><lastmod>2025-08-18T16:36:41+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/why-systems-are-vulnerable-and-why-it-matters-to-fix-them/</loc><lastmod>2025-08-18T17:41:45+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/snmp-simple-network-management-protocol/</loc><lastmod>2025-09-17T11:02:32+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/iot-security-how-smart-devices-open-doors-for-hackers/</loc><lastmod>2025-09-17T11:25:44+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/armoredmobile-team-reflections-on-pixnapping-attack/</loc><lastmod>2025-10-16T16:35:52+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/the-persistent-security-crisis-in-mobile-networks-old-vulnerabilities-keep-haunting-new-generations/</loc><lastmod>2025-10-22T09:36:10+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/snmp-security/</loc><lastmod>2025-10-22T13:00:12+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/privacy-vs-security-finding-the-balance-in-an-increasingly-connected-world/</loc><lastmod>2025-10-22T13:00:03+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/personal-data-protection-encryption/</loc><lastmod>2025-12-18T17:39:51+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/personal_protection-encryption/</loc><lastmod>2025-12-18T17:41:56+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/dmz-demilitarized-zone/</loc><lastmod>2026-02-19T17:19:11+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/fim-file-integrity-monitoring/</loc><lastmod>2026-02-19T17:19:23+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/iiot-industrial-internet-of-things/</loc><lastmod>2026-03-26T17:33:49+03:00</lastmod></url><url><loc>http://protelion.com/resources/blog/smart-city/</loc><lastmod>2026-03-27T10:26:42+03:00</lastmod></url></urlset>