<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 9:05 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://themikewylie.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Michael Wylie | The Mike Wylie</title>
		<link><![CDATA[https://themikewylie.com]]></link>
		<description><![CDATA[Michael Wylie | The Mike Wylie]]></description>
		<lastBuildDate><![CDATA[Wed, 22 May 2019 03:15:16 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://themikewylie.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://themikewylie.com/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/]]></guid>
			<link><![CDATA[https://themikewylie.com/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/]]></link>
			<title>Intuit  Lacerte Vulnerability and Data Exposure CVE-2018-11338 &#038; CVE-2018-14833</title>
			<pubDate><![CDATA[Wed, 22 May 2019 03:15:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/blog/]]></guid>
			<link><![CDATA[https://themikewylie.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 05 Feb 2020 15:11:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/etendo-exposure-of-sensitive-data-in-cleartext-via-url/]]></guid>
			<link><![CDATA[https://themikewylie.com/etendo-exposure-of-sensitive-data-in-cleartext-via-url/]]></link>
			<title>Etendo Exposure of Sensitive Data in Cleartext via URL</title>
			<pubDate><![CDATA[Wed, 28 May 2025 23:50:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/ultratax-cs-data-exposure-vulnerability-cve-2018-14608-cve-2018-14607/]]></guid>
			<link><![CDATA[https://themikewylie.com/ultratax-cs-data-exposure-vulnerability-cve-2018-14608-cve-2018-14607/]]></link>
			<title>UltraTax CS Data Exposure Vulnerability CVE-2018-14608 &#038; CVE-2018-14607</title>
			<pubDate><![CDATA[Wed, 22 May 2019 03:17:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/]]></guid>
			<link><![CDATA[https://themikewylie.com/]]></link>
			<title>About Mike Wylie</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 21:55:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/past-talks-publications/]]></guid>
			<link><![CDATA[https://themikewylie.com/past-talks-publications/]]></link>
			<title>Past Talks &amp; Publications</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 21:16:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/courses-training/]]></guid>
			<link><![CDATA[https://themikewylie.com/courses-training/]]></link>
			<title>Courses &amp; Training</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 20:58:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/insider-threat-training-program-development/]]></guid>
			<link><![CDATA[https://themikewylie.com/insider-threat-training-program-development/]]></link>
			<title>Insider Threat Training &#038; Program Development</title>
			<pubDate><![CDATA[Thu, 27 Feb 2025 14:41:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/hunting-punycode-idns-using-carbon-black-edr/]]></guid>
			<link><![CDATA[https://themikewylie.com/hunting-punycode-idns-using-carbon-black-edr/]]></link>
			<title>Hunting Punycode IDNs Using Carbon Black EDR</title>
			<pubDate><![CDATA[Thu, 17 Sep 2020 18:39:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/infosec-reading-list/]]></guid>
			<link><![CDATA[https://themikewylie.com/infosec-reading-list/]]></link>
			<title>InfoSec Reading List</title>
			<pubDate><![CDATA[Sun, 12 Jan 2020 20:53:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/the-responds-threat-hunting-framework/]]></guid>
			<link><![CDATA[https://themikewylie.com/the-responds-threat-hunting-framework/]]></link>
			<title>The RESPONDS Threat Hunting Framework</title>
			<pubDate><![CDATA[Sun, 11 May 2025 23:16:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/learn-threat-hunting/]]></guid>
			<link><![CDATA[https://themikewylie.com/learn-threat-hunting/]]></link>
			<title>Learn Threat Hunting</title>
			<pubDate><![CDATA[Sun, 11 May 2025 22:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/bsideslv-2019/]]></guid>
			<link><![CDATA[https://themikewylie.com/bsideslv-2019/]]></link>
			<title>BSidesLV 2019</title>
			<pubDate><![CDATA[Mon, 05 Aug 2019 18:17:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/acquiring-a-triage-image-using-kape-and-carbon-black-go-live/]]></guid>
			<link><![CDATA[https://themikewylie.com/acquiring-a-triage-image-using-kape-and-carbon-black-go-live/]]></link>
			<title>Acquiring a Triage Image Using KAPE and Carbon Black Go Live</title>
			<pubDate><![CDATA[Fri, 27 Mar 2020 19:56:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/insider-threat-hunting-preceed-framework/]]></guid>
			<link><![CDATA[https://themikewylie.com/insider-threat-hunting-preceed-framework/]]></link>
			<title>Insider Threat Hunting PRECEED Framework</title>
			<pubDate><![CDATA[Fri, 15 Nov 2024 06:02:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/threat-hunting-hypothesis-chaining/]]></guid>
			<link><![CDATA[https://themikewylie.com/threat-hunting-hypothesis-chaining/]]></link>
			<title>Threat Hunting: Hypothesis Chaining</title>
			<pubDate><![CDATA[Fri, 11 Oct 2024 16:46:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://themikewylie.com/books-every-cybersecurity-leader-needs-to-read/]]></guid>
			<link><![CDATA[https://themikewylie.com/books-every-cybersecurity-leader-needs-to-read/]]></link>
			<title>Books Every Cybersecurity Leader Needs to Read</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 17:15:10 +0000]]></pubDate>
		</item>
				</channel>
</rss>
