<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://innoculator.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://innoculator.com/why-legacy/</loc><lastmod>2024-02-01T19:50:59+11:00</lastmod></url><url><loc>https://innoculator.com/we-need-to-talk-about-log4j/</loc><lastmod>2024-02-13T08:53:16+11:00</lastmod></url><url><loc>https://innoculator.com/too-many-jvms-the-java-security-challange/</loc><lastmod>2024-02-28T10:43:23+11:00</lastmod></url><url><loc>https://innoculator.com/thoughts-on-healthcare-and-legacy-systems/</loc><lastmod>2024-03-12T09:15:43+11:00</lastmod></url><url><loc>https://innoculator.com/accepting-the-risk/</loc><lastmod>2024-03-26T09:26:14+11:00</lastmod></url><url><loc>https://innoculator.com/know-your-signatures/</loc><lastmod>2024-04-09T10:10:36+10:00</lastmod></url><url><loc>https://innoculator.com/mind-the-patch-gap/</loc><lastmod>2024-04-23T08:04:58+10:00</lastmod></url><url><loc>https://innoculator.com/the-impact-of-java-applications-lessons-from-high-profile-breaches/</loc><lastmod>2024-05-07T03:04:32+10:00</lastmod></url><url><loc>https://innoculator.com/the-joys-of-honeypotting/</loc><lastmod>2024-05-21T11:21:38+10:00</lastmod></url><url><loc>https://innoculator.com/who-to-blame-pr-and-a-cyber-breach-blame-evolution/</loc><lastmod>2024-06-04T07:58:02+10:00</lastmod></url><url><loc>https://innoculator.com/navigating-the-rapid-exploitation-of-poc-code-and-lotl-living-off-the-land-techniques/</loc><lastmod>2024-06-18T11:27:17+10:00</lastmod></url><url><loc>https://innoculator.com/recent-events-the-patch-gap/</loc><lastmod>2024-07-30T09:28:12+10:00</lastmod></url><url><loc>https://innoculator.com/the-conundrum-of-legacy-applications/</loc><lastmod>2024-10-08T13:44:19+11:00</lastmod></url><url><loc>https://innoculator.com/the-challenges-of-securing-acquired-environments-post-ma/</loc><lastmod>2024-10-21T14:59:30+11:00</lastmod></url><url><loc>https://innoculator.com/the-illusion-of-security-how-rules-of-engagement-can-mislead/</loc><lastmod>2024-11-05T10:47:13+11:00</lastmod></url><url><loc>https://innoculator.com/is-vulnerability-management-broken/</loc><lastmod>2024-11-26T08:12:23+11:00</lastmod></url><url><loc>https://innoculator.com/we-still-need-to-talk-about-log4j/</loc><lastmod>2025-01-07T08:15:59+11:00</lastmod></url><url><loc>https://innoculator.com/legacy-software-breaches-a-couple-of-lessons-from-history/</loc><lastmod>2025-02-04T07:59:16+11:00</lastmod></url><url><loc>https://innoculator.com/innoculator-version-1-0-released/</loc><lastmod>2025-02-19T08:05:34+11:00</lastmod></url><url><loc>https://innoculator.com/2024-the-curious-case-of-the-10-0-cvss-score/</loc><lastmod>2025-03-05T10:08:00+11:00</lastmod></url><url><loc>https://innoculator.com/the-importance-of-lateral-movement-in-defence-plans/</loc><lastmod>2025-04-01T08:07:49+11:00</lastmod></url><url><loc>https://innoculator.com/how-to-protect-cve-2021-44228-log4shell-using-innoculator/</loc><lastmod>2025-04-29T08:09:20+10:00</lastmod></url><url><loc>https://innoculator.com/eternalblue-tell-me-what-can-i-do/</loc><lastmod>2025-05-26T20:28:14+10:00</lastmod></url><url><loc>https://innoculator.com/log4j-the-broken-record-edition/</loc><lastmod>2025-06-19T15:36:47+10:00</lastmod></url><url><loc>https://innoculator.com/beyond-cvss-how-attackers-really-exploit-cves-and-what-that-means-for-patch-prioritisation/</loc><lastmod>2025-07-21T17:15:23+10:00</lastmod></url><url><loc>https://innoculator.com/rethinking-cybersecurity-pricing-introducing-innoculator-pricing/</loc><lastmod>2025-08-18T14:54:41+10:00</lastmod></url><url><loc>https://innoculator.com/bridge-over-the-patch-gap-how-innoculator-helps-australian-companies-achieve-essential-eight-compliance/</loc><lastmod>2025-09-08T15:37:09+10:00</lastmod></url><url><loc>https://innoculator.com/cve-2025-49844-and-the-clouds-redis-problem-risk-urgency-and-how-modern-defenses-bridge-the-patch-gap/</loc><lastmod>2025-10-07T15:39:19+11:00</lastmod></url><url><loc>https://innoculator.com/o-inspector-where-art-thou/</loc><lastmod>2025-10-13T16:13:00+11:00</lastmod></url><url><loc>https://innoculator.com/the-criticality-collapse-is-upon-us/</loc><lastmod>2025-10-27T15:52:40+11:00</lastmod></url><url><loc>https://innoculator.com/the-true-cost-of-the-criticality-collapse/</loc><lastmod>2025-11-10T16:02:33+11:00</lastmod></url><url><loc>https://innoculator.com/dependency-cascades-criticality-collapse-and-the-open-source-multiplier/</loc><lastmod>2025-11-24T15:51:19+11:00</lastmod></url><url><loc>https://innoculator.com/react2shell-isnt-just-another-cve/</loc><lastmod>2025-12-08T15:33:08+11:00</lastmod></url><url><loc>https://innoculator.com/how-ai%e2%80%91driven-virtual-patching-actually-fits-into-your-vulnerability-management-program-and-how-to-measure-success/</loc><lastmod>2026-01-05T14:52:20+11:00</lastmod></url><url><loc>https://innoculator.com/reporting-to-the-board/</loc><lastmod>2026-01-19T15:30:47+11:00</lastmod></url><url><loc>https://innoculator.com/the-curious-case-of-the-10-0-cvss-the-2025-edition/</loc><lastmod>2026-02-02T12:54:29+11:00</lastmod></url><url><loc>https://innoculator.com/ai-has-changed-the-tempo-of-exploitation/</loc><lastmod>2026-03-28T14:27:22+11:00</lastmod></url><url><loc>https://innoculator.com/ai-has-broken-the-patch-cycle/</loc><lastmod>2026-04-13T16:55:59+10:00</lastmod></url></urlset>
