<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://fyrmassociates.com/tags/application-security/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2020/10/29/breathmint-burp-parser/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/burp-suite/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/tools/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/vulnerability-management/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/vulnerability-management/</loc>
    <lastmod>2020-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/def-con/</loc>
    <lastmod>2019-10-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/def-con/</loc>
    <lastmod>2019-10-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2019/10/10/defcon-27-blue-team-village-badge-wrapup/</loc>
    <lastmod>2019-10-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/adaptive-capabilities-testing/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/adaptive-capabilities-testing-act-nistir-8011-devsecops/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/agile/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/agile/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/application-security/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/audit/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/compliance/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/compliance/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/devsecops/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2019/07/19/devsecops-audit-compliance/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/nistir-8011/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/risk-management/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/risk-management/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/soda/</loc>
    <lastmod>2019-07-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2019/06/08/defcon-27-blue-team-village-badge/</loc>
    <lastmod>2019-06-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2019/05/30/nepali-lightweight-nessus-parser/</loc>
    <lastmod>2019-05-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/nessus/</loc>
    <lastmod>2019-05-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2019/03/01/advanced-recon-part1/</loc>
    <lastmod>2019-03-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/penetration-testing/</loc>
    <lastmod>2019-03-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/penetration-testing/</loc>
    <lastmod>2019-03-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/recon/</loc>
    <lastmod>2019-03-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/reconnaissance/</loc>
    <lastmod>2019-03-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/apple/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/cve-2014-8832/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/exfiltration/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/exploit/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/exploit/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/macos/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2018/12/01/macos-spotlight-data-leak/</loc>
    <lastmod>2018-12-01T13:39:46+02:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/conference/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/conferences/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/defcon/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/07/06/getting-social-with-the-smart-grid-def-con-18/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/security/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/smart-grid/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/smart-grid/</loc>
    <lastmod>2010-07-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/apptrust/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/apptrust/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/devsecops/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/sdlc/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/sdlc/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/05/12/were-doing-it-wrong/</loc>
    <lastmod>2010-05-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/cloud-computing/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/gueststealer/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/03/01/gueststealer-wrapup/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/shmoocon/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/shmoocon/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/virtualization-security/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/vmware/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/vmware/</loc>
    <lastmod>2010-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/cloud-computing/</loc>
    <lastmod>2010-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/conferences/</loc>
    <lastmod>2010-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/presentations/</loc>
    <lastmod>2010-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/presentations/</loc>
    <lastmod>2010-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/02/20/shmoocon-2010-stealing-guests-slides-online/</loc>
    <lastmod>2010-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/02/18/gueststealer-1.1-and-pauldotcom-webcast/</loc>
    <lastmod>2010-02-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/tools/</loc>
    <lastmod>2010-01-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/01/27/xab-presentation-at-usf-whitehatters-club/</loc>
    <lastmod>2010-01-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/security-awareness/</loc>
    <lastmod>2010-01-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/01/24/security-awareness-for-fourth-graders/</loc>
    <lastmod>2010-01-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2010/01/24/shmoocon-2010-sponsor/</loc>
    <lastmod>2010-01-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/11/12/introducing-apptrust/</loc>
    <lastmod>2009-11-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/secure-sdlc/</loc>
    <lastmod>2009-11-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/secure-sdlc/</loc>
    <lastmod>2009-11-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/11/10/xab-cross-site-scripting-anonymous-browser-updated/</loc>
    <lastmod>2009-11-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/owasp/</loc>
    <lastmod>2009-08-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/owasp/</loc>
    <lastmod>2009-08-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/08/25/xab-presentation-at-owasp-dc-chapter-meeting-on-9-2/</loc>
    <lastmod>2009-08-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/08/20/owasp-appsec-dc-2009-sponsor/</loc>
    <lastmod>2009-08-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/bluetooth/</loc>
    <lastmod>2009-07-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/07/01/bluetooth-3-0-hs-compromising-your-security-at-4-mph/</loc>
    <lastmod>2009-07-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/wireless/</loc>
    <lastmod>2009-07-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/wireless-security/</loc>
    <lastmod>2009-07-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/black-hat/</loc>
    <lastmod>2009-05-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/black-hat/</loc>
    <lastmod>2009-05-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/05/19/cross-site-scripting-anonymous-browser-xab-proof-of-concept-released/</loc>
    <lastmod>2009-05-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/xab/</loc>
    <lastmod>2009-05-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/02/18/black-hat-defcon-2009-reception/</loc>
    <lastmod>2009-02-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2009/01/28/black-hat-dc-2009-presentation/</loc>
    <lastmod>2009-01-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/pci/</loc>
    <lastmod>2008-11-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/categories/pci/</loc>
    <lastmod>2008-11-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2008/11/20/the-new-pci-66/</loc>
    <lastmod>2008-11-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2008/11/06/application-security-industry-2008-report-card/</loc>
    <lastmod>2008-11-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/tags/vendors/</loc>
    <lastmod>2008-11-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/blog/2008/11/04/development-double-agent/</loc>
    <lastmod>2008-11-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://fyrmassociates.com/about/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/apptrust-training-and-certification/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/careers/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/compliance-and-risk/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/contact/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/securing-the-smart-grid-book/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/security-testing/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/smart-grid-social-networking-security-checklist/</loc>
  </url><url>
    <loc>https://fyrmassociates.com/tools/</loc>
  </url>
</urlset>
