<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.nistify.energy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/our-story</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/news</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/contact</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/awareness</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/our-solutions</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/readiness</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/compliance</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/glossary</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/impressum</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/archived/untitled</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/1-000-instantel-industrial-monitoring-devices-possibly-exposed-to-hacking</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/10-emerging-cyber-threats-in-2026-how-to-spot-them-mitigate-risks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/10-npm-packages-caught-stealing-developer-credentials-on-windows-macos-and-linux</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/2025-ieee-power-energy-society-summit-achieving-a-more-reliable-and-resilient-energy-future</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/2025-q2-vulnerability-forecast</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/2025-q4-vulnerability-publication-forecast</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/2025-vulnerability-year-end-review</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/25-000-ips-scanned-cisco-asa-devices----new-vulnerability-potentially-incoming</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/25-years-3-lessons</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/3-threat-groups-started-targeting-ics-ot-in-2025-dragos</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/35-000-solar-power-systems-exposed-to-internet</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/7-practical-steps-to-secure-multi-ai-deployments-for-iot-and-ics-scada</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/7-practical-steps-to-secure-multi-ai-deployments-for-iot-and-ics-scada-2</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/9-scada-system-vulnerabilities-and-how-to-secure-them</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/a-cultural-chasm-bridging-the-gap-between-engineering-and-network-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/a-new-era-of-agents-a-new-era-of-posture</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/after-more-than-18-years-aurora-is-still-an-existential-threat-to-critical-infrastructures</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ai-assisted-credential-attacks-on-fortigate-devices-could-expose-ot-networks-to-ransomware-staging</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ai-powered-threats-cyber-workforce-gaps-policy-crisis-undermine-global-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/aisuru-botnet-shifts-from-ddos-to-residential-proxies</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/all-sides-accept-some-level-of-compromise-of-critical-infrastructure-for-reconnaissance-and-pre-positioning</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/alliance-for-critical-infrastructure-launches-to-strengthen-national-resilience-through-industry-collaboration</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/anecdotes-are-not-data</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/announcing-a-new-strategic-collaboration-to-bring-clarity-to-threat-actor-naming</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/apt37-hackers-use-new-malware-to-breach-air-gapped-networks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/as-ai-redraws-threat-landscape-cybersecurity-training-faces-reality-check-on-what-future-defenders-truly-need</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/at-london-summit-energy-sector-leaders-usher-in-a-new-era-of-energy-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/atos-to-strengthen-eu-cybersecurity-capabilities-with-eu326-million-technical-operations-services-contract</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/attribution-with-a-pinch-of-salt-typhoon</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/australias-cisc-opens-expressions-of-interest-for-resilience-expert-advisory-group-membership</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/axa-xl-joins-isasecure-to-boost-cybersecurity-risk-prevention-by-adopting-isa-iec-62443-cybersecurity-standards</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/baby-tigers-bite----the-hidden-risks-of-scaling-ai-too-fast</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/battery-storage-comes-of-age-from-grid-accessory-to-essential-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/bev-conference-focused-on-developing-a-secure-and-sustainable-battery-materials-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/build-more-robust-ot-security-with-the-nist-framework</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/building-resilience-through-reporting</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/bw-ess-and-ibersun-sign-joint-venture-to-develop-2-2gw-bess-in-spain</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/canada-flags-urgent-threat-from-nation-state-and-criminal-groups-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/capacity-is-critical-in-riskier-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ccn-reports-cybersecurity-maturity-becoming-prerequisite-in-critical-infrastructure-industrial-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cert-polska-details-coordinated-cyber-attacks-on-30-wind-and-solar-farms</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cert-ua-reports-cyberattacks-targeting-ukrainian-state-systems-with-wrecksteel-malware</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/china-aligned-ta415-escalates-cyberattacks-on-taiwanese-semiconductor-manufacturing-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/china-charges-ahead-in-global-battery-race</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/china-linked-salt-typhoon-exploits-critical-cisco-vulnerability-to-target-canadian-telecom</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/chinese-apt-hacking-routers-to-build-espionage-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/chinese-volt-typhoon-hackers-infiltrated-us-electric-utility-for-nearly-a-year</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-adds-six-known-exploited-vulnerabilities-to-catalog</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-cyber-hygiene-guidance-for-ot</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-fbi-epa-doe-issue-joint-alert-on-rising-cyber-threats-to-critical-infrastructure-ot-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-fema-announce-over-100-million-in-fy2025-cybersecurity-grants-to-help-states-tribes-local-governments-boost-defenses</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-issues-emergency-directive-requiring-federal-agencies-to-mitigate-critical-cisco-asa-zero-day-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-nsa-and-canadian-cyber-centre-update-brickstorm-analysis-with-new-rust-based-variants</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-open-sources-thorium-platform-for-malware-forensic-analysis</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-publishes-initial-list-of-hardware-and-software-categories-supporting-post-quantum-cryptography-to-guide-adoption</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-releases-2025-sbom-minimum-elements-outlining-minimum-requirements-for-software-transparency</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-releases-five-industrial-control-systems-advisories</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-releases-uas-detection-guides-to-help-critical-infrastructure-counter-drone-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-says-critical-vmware-rce-flaw-now-actively-exploited</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-tags-windows-cisco-vulnerabilities-as-actively-exploited</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-warns-of-exploited-delmia-factory-software-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisa-warns-of-scadabr-vulnerability-after-hacktivist-ics-attack</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisas-updated-cpg-2-0-framework-guides-it-and-ot-environments-targets-foundational-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cisos-in-a-pinch-a-security-analysis-of-openclaw</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/claroty-survey-finds-growing-cps-risks-amid-economic-geopolitical-supply-chain-changes</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/claude-code-flaws-exposed-developer-devices-to-silent-hacking</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/control-system-cyber-incidents-and-network-breaches-are-apples-and-oranges</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/control-system-cyber-incidents-the-hidden-threat-to-grid-stability</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/copilot-quietly-grabs-your-data-from-other-microsoft-products-now---heres-how-to-opt-out</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/crazyhunter-campaign-targets-taiwanese-critical-sectors</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/critical-flaw-allows-remote-hacking-of-automationdirect-industrial-gateway</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/critical-infrastructure-under-siege-ot-security-still-lags</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cve-2025-59287-microsoft-fixes-critical-wsus-flaw-under-active-attack</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cyber-insights-2026-the-ongoing-fight-to-secure-industrial-control-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cyber-security-incident-response-playbook-top-10-must-have-elements</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cyber-tabletop-exercises-2025-top-tips-for-an-effective-cyber-drill</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cyber-vulnerable-battery-systems-are-catching-fire-and-communicate-directly-to-china</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cybersecurity-challenges-in-the-energy-and-utilities-sector</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cybersecurity-predictions-2026-an-ai-arms-race-and-malware-autonomy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cybersecurity-regulations-assume-a-security-posture-for-level-0-devices-that-do-not-exist</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/cydome-flags-mirai-variant-broadside-targets-maritime-logistics-through-tbk-dvr-devices</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/danske-commodities-inks-ten-year-uk-battery-optimisation-deal</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/darktrace-annual-threat-report-2026-finds-shift-from-exploit-driven-breaches-to-faster-ai-enabled-credential-abuse</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/data-optimization-in-security-a-splunk-architects-perspective</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ddos-protection-faces-fresh-challenges-as-bot-traffic-reaches-new-peak</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/default-ics-credentials-exploited-in-destructive-attack-on-polish-energy-facilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/defending-against-adversarial-ai-attacks-on-machine-vision-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/delivering-the-energy-transition-will-come-down-to-the-wires</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/delmia-factory-software-vulnerability-exploited-in-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/detecting-ai-generated-phishing-attacks-targeting-industrial-control-system-operators</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/digital-fraud-at-industrial-scale-2025-wasnt-great</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/disconnected-manufacturing-and-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/doe-publishes-5-year-energy-security-plan</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/does-anyone-tell-the-truth-anymore</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/does-cie-conflict-with-iec-61511</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/does-cyfers-summit-unites-40-states-to-tackle-energy-sector-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/dows-zt-for-ot-activities-and-outcomes-document-sets-foundation-for-zero-trust-across-defense-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/dragos-details-lelwds-fight-against-voltzite-cyberattack-following-300-day-ot-network-breach</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/dragos-industrial-ransomware-analysis-q1-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/dragos-industrial-ransomware-analysis-q2-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/dragos-tracks-three-new-ot-threat-groups-as-industrial-adversaries-move-toward-real-world-disruption</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/eatons-factories-as-a-grid-approach-helps-manufacturing-companies-advance-energy-security-for-more-affordable-resilient-power</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/emera-nova-scotia-power-respond-to-cybersecurity-breach-incident-response-teams-mobilized</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/emerging-threats-from-2006</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/empowering-the-ecosystem-misps-2025-progress-and-the-open-source-future</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/energy-summit-hopes-for-green-renewal-despite-energy-security-risks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/engaging-cisco-talos-incident-response-is-just-the-beginning</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisa-2025-threat-landscape-report-highlights-eu-faces-escalating-hacktivist-attacks-and-state-aligned-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisa-nis360-is-europe-protecting-the-right-sectors</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisa-publishes-cyber-hygiene-handbook-to-help-healthcare-providers-manage-risks-protect-data-build-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisa-to-operate-the-eu-cybersecurity-reserve-with-eur-36-million</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisa-updates-ncss-interactive-map-to-track-eu-cybersecurity-progress-build-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/enisas-international-strategy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/epa-publishes-cyber-response-templates-and-checklists-to-strengthen-water-infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/eu-greenlights-eu5bn-danish-state-aid-for-offshore-wind-energy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/eu-parliamentarians-call-for-europes-grids-modernisation</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/eu-strategies-to-tap-into-mediterranean-to-redefine-europes-energy-landscape</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/europe-needs-an-energy-security-strategy-based-on-clean-electrification</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/fake-lastpass-maintenance-emails-target-users</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/fbi-reports-cyber-threats-to-critical-infrastructure-intensify-as-us-cybercrime-losses-hit-21-billion-exposes-risk</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/fcc-reverses-course-on-calea-as-national-security-risks-drive-tougher-cyber-expectations-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ferc-and-nerc-discussions-to-include-process-sensors-as-nerc-cip-cyber-assets</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ferc-nerc-cip-and-the-isa-iec-62443-series-of-standards</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/fifteen-years-after-stuxnet-house-subcommittee-to-hear-from-ot-security-experts-on-infrastructure-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/finite-state-expands-into-emea-to-support-compliance-with-emerging-cyber-regulations-amid-rising-demand</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/first-nozomi-now-armis</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/flowintel-3-0-0-released-and-misp-integration</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/forescout-leverages-vedere-labs-research-in-new-e-isac-partnership-to-support-utilities-and-government-leaders</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/forescout-reports-ot-threat-landscape-shift-as-hacktivists-nation-state-actors-target-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/forescouts-2025-report-reveals-surge-in-device-vulnerabilities-across-it-iot-ot-and-iomt</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/four-priorities-for-ai-powered-identity-and-network-access-security-in-2026</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/french-foreign-ministry-blames-russian-gru-linked-apt28-for-cyberattacks-on-national-entities-urges-global-action</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/frenos-is-continuous-and-autonomous-ot-assessment-a-sustainable-product-category</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/frenos-warns-ot-sector-of-critical-erlang-vulnerability-enabling-remote-code-execution-affecting-millions-of-devices</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/from-runtime-risk-to-real-time-defense-securing-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/global-cyber-agencies-issue-ai-security-guidance-for-critical-infrastructure-ot</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/government-officials-need-to-recognize-the-importance-of-control-system-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/greenyellow-plans-to-expand-its-portfolio-with-energy-efficiency-and-storage-in-poland</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/hackers-shellter-various-stealers-in-red-team-tool-to-evade-detection</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/hacking-the-hackers-when-bad-guys-let-their-guard-down</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/half-of-2025-ransomware-attacks-hit-critical-sectors-as-manufacturing-healthcare-and-energy-top-global-targets</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/hardware-vulnerabilities-in-hitachi-energy-abb-b-r-ics-devices-pose-critical-infrastructure-threat</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/have-you-seen-my-domain-controller</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/hijacked-satellites-and-orbiting-space-weapons-in-the-21st-century-space-is-the-new-battlefield</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-biogas-is-solving-data-centers-clean-energy-challenge</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-cvss-v4-0-works-characterizing-and-scoring-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-employee-extensions-become-entry-points-for-security-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-leading-companies-are-redefining-secure-remote-work-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-private-is-your-vpn</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-swiss-regulation-enhances-digital-banking-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-to-secure-digital-twins-in-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-to-understand-and-avoid-advanced-persistent-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/how-vulnerable-to-cyber-attacks-are-battery-energy-storage-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ibm-infrastructure-continuous-risk-compliance</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ibm-x-force-reports-44-surge-in-exploitation-of-public-facing-applications-as-supply-chain-and-identity-attacks-intensify</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ics-otno-patches-for-vulnerabilities-allowing-cognex-industrial-camera-hacking</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ics-system-hardening-balances-security-resilience-and-operational-continuity-across-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/implementing-cyber-deception-in-industrial-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/implementing-cyber-deception-in-industrial-cybersecurity-2</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/industrial-cisos-redefine-influence-in-2026-as-production-risk-budget-control-and-boardroom-trust-collide</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/industrial-cybersecurity-in-2025-insights-from-a-live-game-show-style-panel</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/industrial-sector-faces-tougher-cyber-insurance-landscape-with-escalating-premiums-coverage-gaps</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ingerslev-a-solar-plant-in-denmark-begins-production</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/inotiv-cyberattack-disrupts-operations-after-systems-encrypted-in-ransomware-style-breach</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/inside-a-dark-adtech-empire-fed-by-fake-captchas</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/integrating-ai-and-ml-technologies-across-ot-ics-environments-to-enhance-anomaly-detection-and-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/inverter-setting-mismatch-triggers-1gw-hvdc-outage-between-estonia-and-finland</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/iran-linked-hackers-disrupt-us-critical-infrastructure-via-plc-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/iranian-hackers-preferred-ics-targets-left-open-amid-fresh-us-attack-warning</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/iranian-threat-actors-disrupt-us-critical-infrastructure-via-exposed-plcs</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/is-eu-cybersecurity-regulation-effective</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/is-your-android-tv-streaming-box-part-of-a-botnet</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/isa-annual-report-2025-spotlights-surge-in-automation-skills-ai-knowledge-tools-industrial-cybersecurity-standards</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/isa-iec-62443-cited-in-cisa-ot-cybersecurity-guidance</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/isa-issues-ansi-isa-112-standard-to-guide-functional-architecture-models-standardize-scada-lifecycle-architecture</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/isaca-takes-lead-in-cmmc-assessor-and-instructor-certification-shaping-defense-cybersecurity-standards</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/it-wont-work-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/jaguar-land-rover-shows-cyberattacks-mean-bad-business</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/june-ics-scada-cybersecurity-symposium-to-address-unique-control-system-cyber-security-issues</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/keeper-security-puts-atlassian-williams-f1-team-in-pole-position-on-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/killsec-ransomware-hits-brazilian-healthcare-software-provider</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/kimwolf-botnet-lurking-in-corporate-govt-networks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/kimwolf-botnet-swamps-anonymity-network-i2p</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/krebsonsecurity-in-new-most-wanted-hbo-max-series</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/lazarus-targets-european-defense-firms-in-uav-themed-operation-dreamjob</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/lessons-from-the-frontline-this-is-what-ai-does-in-the-industrial-world</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/listen-a-cisos-guide-to-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/making-data-centers-grid-friendly---preventing-the-next-blackout-by-improving-the-grids-stability-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/managing-shadow-ai-and-it-in-industrial-settings</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/manipulating-ai-memory-for-profit-the-rise-of-ai-recommendation-poisoning</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/many-attacks-aimed-at-eu-targeted-ot-says-cybersecurity-agency</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/medical-device-control-system-cyber-incidents-have-injured-and-killed-people</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/microsoft-and-cloudflare-disrupt-massive-raccoono365-phishing-service</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/microsoft-details-void-blizzard-as-russian-cyber-threat-targeting-global-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/microsoft-fix-targets-attacks-on-sharepoint-zero-day</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/microsoft-security-success-stories-why-integrated-security-is-the-foundation-of-ai-transformation</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misguided-response-to-the-norwegian-dam-and-oldsmar-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-2-4-213-2-5-15-released---a-double-dose-of-security-search-and-stability</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-2-5-22-released-with-improvements-and-bugs-fixes</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-architecture-choices</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-as-supporting-platform-for-sharing-information-following-iso-iec-27010-2015</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-performance-tuning</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-v2-5-18-released-with-new-on-demand-correlation-engine-a-new-improved-task-scheduling-system-and-many-more-updates</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-v2-5-27---released-with-new-features-and-various-fixes</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/misp-workbench-v1-0-beta-released</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mitre-appoints-brian-abrahamson-as-coo-to-drive-operational-excellence-support-government-missions</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mitre-launches-new-security-framework-for-embedded-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mitre-sounds-alarm-on-cyber-war-threats-to-critical-infrastructure-presents-five-step-playbook</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mitre-warns-that-funding-for-critical-cve-program-expires-today</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mitsubishi-electric-to-acquire-nozomi-networks-to-boost-industrial-cybersecurity-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/more-than-half-of-former-uk-employees-still-have-access-to-company-spreadsheets-study-finds</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/most-inspiring-women-in-cyber-2026-meet-the-judges</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/mounting-ot-cyber-risks-demand-stronger-cyber-physical-security-to-protect-legacy-systems-and-operational-continuity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/my-ot-security-vendor-was-aquired-what-should-i-do</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nato-allies-boost-cyber-defense-coordination-focus-on-improving-critical-infrastructure-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ncsc-warns-uk-critical-systems-face-rising-threats-from-ai-driven-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nerc-cip-015-1-is-approved--heres-what-asset-owners-need-to-do</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/net-one-partners-brings-xage-securitys-zero-trust-platform-to-manufacturing-and-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/netfoundry-raises-12-million-to-scale-secure-networking-across-it-iot-ot-replace-legacy-wan-and-sase-architectures</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/netscout-warns-of-ai-driven-ddos-attacks-threatening-critical-infrastructure-and-amplifying-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/network-tabletop-exercises-dont-include-engineering-and-plant-operations</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-challanges</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-cri-guidance-calls-on-organizations-to-tighten-cyber-hygiene-risk-assessments-across-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-guidance-calls-on-ot-operators-to-create-continually-updated-system-inventory</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-hybridpetya-ransomware-bypasses-uefi-secure-boot-with-cve-2024-7344-exploit</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-iacs-ot-oriented-and-evidence-based-effort-underway-for-improving-incident-management</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-nozomi-arc-release-strengthens-ot-endpoint-security-while-preserving-uptime</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-resource-comparison-of-isa-iec-62443-4-1-and-nist-sp-800-218-secure-software-development-framework</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-resources-exploring-isa-iec-62443-iso-iec-27001-and-iso-iec-27002</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/new-sans-giac-study-finds-cybersecurity-skills-gap-not-talent-shortage-at-core-of-workforce-crisis</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ngsoti-building-an-integrated-threat-intelligence-and-information-sharing-ecosystem-for-the-next-generation-of-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ninja-squirrels-continue-plaguing-electric-utilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-begins-overhaul-of-sp-800-82-to-strengthen-ot-cybersecurity-guidance-align-with-updated-nist-frameworks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-flags-rising-cybersecurity-challenges-as-it-and-ot-systems-increasingly-converge-through-iot-integration</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-mitre-invest-20-million-in-ai-centers-to-counter-cyberthreats-boost-us-manufacturing-competitiveness</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-publication-warns-that-usb-devices-pose-serious-cybersecurity-threats-to-ics-offers-guidance-for-mitigation</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-publishes-guide-for-protecting-ics-against-usb-borne-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nist-sp-1331-draft-guide-expands-csf-2-0-for-managing-emerging-and-emergent-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nsa-issues-guidance-to-help-organizations-manage-uefi-secure-boot-configuration</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nsa-targets-ot-cyber-risks-with-new-smart-controller-security-standards-for-national-security-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/nucor-reports-cybersecurity-incident-pauses-operations-shuts-down-production-sites-temporarily</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/number-of-cyber-incidents-with-a-physical-impact-down-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/oauth-redirection-abuse-enables-phishing-and-malware-delivery</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/operation-secure-trend-micros-threat-intelligence-fuels-interpols-infostealer-infrastructure-takedown</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/operation-zero-disco-attackers-exploit-cisco-snmp-vulnerability-to-deploy-rootkits</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/opswat-threat-report-finds-127-spike-in-malware-complexity-warns-of-failing-legacy-defenses</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/oregon-man-charged-in-rapper-bot-ddos-service</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ot-and-engineering-are-not-the-same-and-are-creating-dangerous-conditions</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ot-cybersecurity-best-practices-for-smbs-how-to-disconnect-your-it-dmz-and-ot-from-each-other-what-to-consider</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ot-cybersecurity-culture-gap-widens-as-organizations-struggle-to-keep-pace-with-emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ot-is-the-venice-of-security-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/over-10k-fortinet-firewalls-exposed-to-actively-exploited-2fa-bypass</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/over-370-organizations-take-part-in-gridex-viii-grid-security-exercise</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/overcoming-5-challenges-in-industrial-edge-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/part-of-eus-new-eu1-3-billion-investment-going-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/patch-tuesday-october-2025-end-of-10-edition</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/phishing-3-0-ai-and-deepfake-driven-social-engineering-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/please-dont-feed-the-scattered-lapsus-shinyhunters</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/poland-faces-record-wave-of-russian-cyber-sabotage-sets-eu1-billion-defense-budget</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/practical-guide-to-different-types-of-cyber-tabletop-exercises-in-2026</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/premature-consensus-in-ot-security-made-worse-with-ai</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/prodaft-detects-high-severity-flaws-in-myscada-mypro-manager-warns-of-industrial-network-breaches</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/proxy-services-feast-on-ukraines-ip-address-exodus</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/public-consultation-on-cyber-attack-classification-scale-methodology</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/qilin-ransomware-escalates-rapidly-in-2025-targeting-critical-sectors-with-700-attacks-amid-ransomhub-shutdown</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/qr-codes-in-cybersecurity-convenience-meets-caution</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/quantum-cryptography-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/radware-reports-hybrid-warfare-as-cyberattacks-disinformation-escalate-in-2025-israel-iran-conflict</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/rafts-of-security-bugs-could-rain-out-solar-grids-2</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ransomware-data-theft-strike-telecoms-in-uk-and-australia-raising-concerns-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ransomware-surge-intensifies-across-industrial-sectors-with-manufacturing-accounting-for-72-of-q3-cases</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/real-cyber-incident-data-first-half-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/reasons-to-prioritize-the-2025-isa-ot-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/recollections-from-9-11</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/redefining-workspace-prisma-browser-secures-leadership-in-frost-radar</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/reducing-risk-exposure-to-ransomware-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/regulatory-changes-new</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/researchers-uncover-46-critical-flaws-in-solar-inverters-from-sungrow-growatt-and-sma</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/resecurity-warns-of-increased-cyber-threats-to-energy-and-nuclear-facilities-from-hacktivists-and-nation-states</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/resurgence-of-a-multi-stage-aitm-phishing-and-bec-campaign-abusing-sharepoint</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/romanian-water-authority-energy-producer-hit-by-cyber-attacks-in-apparent-coordinated-holiday-campaign</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/rsa-2025-forescout-and-nvidia-team-up-to-scale-network-monitoring-across-complex-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/rsa-2025-levelblue-2025-futures-report-highlights-growing-cyber-threats-and-business-resilience-gaps</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/russia-hacked-routers-to-steal-microsoft-office-tokens</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/russia-linked-apt28-uses-prismex-to-infiltrate-ukraine-and-allied-infrastructure-with-advanced-tactics</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/russian-fsb-center-16-exploits-cisco-flaw-in-cyber-espionage-campaign-to-target-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/russias-forest-blizzard-nabs-rafts-of-logins-via-soho-routers</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sam-houston-state-university-paper---the-need-for-interdisciplinary-programs-for-control-system-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sandworm-blamed-for-wiper-attack-on-poland-power-grid</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/secomeas-state-of-industrial-remote-access-2026-reveals-vendor-sprawl-and-weak-credentials-undermining-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/securityweek-to-host-2025-ics-cybersecurity-conference-october-27-30-in-atlanta</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/self-replicating-worm-hits-180-software-packages</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sept-2025-biggest-cyber-attacks-ransomware-attacks-and-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/servicenow-in-talks-to-buy-armis-signaling-deeper-push-into-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/servicenow-set-to-acquire-armis-for-7-75-billion-expanding-cyber-exposure-and-ot-security-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/shai-hulud-2-0-supply-chain-attack-25k-repos-exposing-secrets</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/should-they-we-have-known-better</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/siemens-notifies-customers-of-microsoft-defender-antivirus-issue</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sim-swapper-scattered-spider-hacker-gets-10-years</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/small-components-big-consequences-how-component-level-insights-reduce-catastrophic-grid-risks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sms-phishers-pivot-to-points-taxes-fake-retailers</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sold-out-elcc-ready-to-challenge-and-inform</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/soma-energy-raises-7m-to-use-ai-to-unlock-grid-capacity-for-data-centres</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/stepping-up-our-role-in-vulnerability-management-enisa-becomes-cve-root</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/stuxnet-lessons-yet-to-be-learned-after-15-years</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/sunken-ships-will-orgs-learn-from-ivanti-epmm-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/svenska-kraftnat-investigates-data-breach-linked-to-everest-ransomware-group</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/techmatrix-adopts-tenable-one-as-cyber-incidents-reshape-risk-thinking-among-system-integrators</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-big-picture-infographic-blackouts-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-biggest-cybersecurity-and-cyberattack-stories-of-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-challenges-of-mfa-adoption-in-a-legacy-ot-environment</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-cloudflare-outage-may-be-a-security-roadmap</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-european-union-agency-for-cybersecuritys-first-nis360-report-identifies-areas-for-improvement-and-tracking-of-progress-across-nis2-directive-sectors</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-eus-cybersecurity-blueprint-and-the-future-of-cyber-crisis-management</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-five-layers-of-ai-safeguarding-the-utility-industry</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-importance-of-cybersecurity-training-for-executives-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-kimwolf-botnet-is-stalking-your-local-network</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-need-for-appropriate-purdue-reference-model-level-0-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-next-wave-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-ot-cyber-incident-and-threat-dichotomy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-overlooked-threat-to-sustainability-cybersecurity-in-the-age-of-smart-systems</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-pressure-is-on-electrical-utilities-to-prepare-for-the-grid-of-tomorrow</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-ransomware-ground-game-how-a-christmas-scanning-campaign-will-fuel-2026-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-rise-of-adaptive-security-cyber-defense-in-an-intelligent-age</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-rsa-cybersecurity-conference-is-not-relevant-to-control-systems---whats-missing-is-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-truth-about-ot-data-and-what-it-costs</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/the-unaddressed-cyber-frontier-level-0-sensor-measurement-integrity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/there-have-been-many-publicly-documented-control-system-cyberattacks-that-caused-physical-damage</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/threat-actors-actively-targeting-llms</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/threat-modeling-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/threat-predictions-for-industrial-enterprises-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/three-benefits-of-segmentation</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/three-ways-that-silicones-improve-solar-panel-reliability</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/time-to-kick-out-human-error</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/top-cyber-security-tabletop-exercise-examples-scenarios</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/transmission-lines-will-determine-americas-power-future</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/trendai-insight-new-u-s-national-cyber-strategy</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/tso-dso-challenges-opportunities-for-the-digital-eu-electricity-system</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/two-ot-security-debates</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/two-us-cybersecurity-pros-plead-guilty-over-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/txone-foxguard-partner-to-boost-ot-cybersecurity-safeguard-ics-across-energy-and-high-risk-sectors</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/u-s-cisa-adds-an-openplc-scadabr-flaw-to-its-known-exploited-vulnerabilities-catalog</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/u-s-electric-companies-projected-to-invest-more-than-1-1-trillion-over-the-next-five-years</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/u-s-sanctions-cloud-provider-funnull-as-top-source-of-pig-butchering-scams</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/ufp-technologies-discloses-cyberattack-disrupting-billing-systems-and-exposing-company-data</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/uk-ncsc-says-apt28-exploits-routers-for-dns-hijacking-enabling-large-scale-traffic-interception</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/uks-ncsc-publishes-caf-v4-0-to-boost-critical-infrastructure-defenses-raise-cyber-risk-management-standards</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/understanding-the-dark-webs-role-in-industrial-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/understanding-the-relationship-between-semi-e187-and-isa-iec-62443-in-equipment-security-implementation</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/unify-it-asset-management-and-network-security-in-real-time-cisco-ise-and-servicenow-are-redefining-asset-aware-access</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/unpatched-vulnerabilities-expose-novakon-hmis-to-remote-hacking</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/up-to-25-of-internet-exposed-ics-are-honeypots-researchers</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/us-cisa-extends-mitre-cve-cwe-programs-with-last-minute-contract-extension-prevents-shutdown</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/us-government-reset-on-ot-security-is-an-opportunity</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/us-israeli-campaign-triggers-iranian-counteroffensive-targeting-gulf-energy-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/us-lawmakers-propose-legislation-to-expand-cyber-threat-coordination-across-energy-sector</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/us-offers-10-million-for-intel-on-iran-linked-hacker-in-ics-malware-campaign-against-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/using-ai-in-professional-engineering</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/utah-groups-look-at-nuclear-options-to-power-worlds-largest-data-center-site</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/utility-basics-weather-data-in-utility-operations</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/vulncheck-finds-ransomware-operators-increasingly-relying-on-zero-days-raising-risk-in-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/vulncheck-joins-ot-cybersecurity-coalition-to-bolster-industrial-exploit-intelligence-boost-vulnerability-prioritization</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/vulnerabilities-addressed-by-schneider-electric-siemens</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/vulnerability-forecast-2026-the-year-ahead</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/vulnerability-management-in-ot-why-is-patching-devices-in-the-power-grid-so-difficult</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/water-treatment-honeynet-incident-analysis</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/wazuh-and-misp-integration</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/we-won-we-lost-part-1</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/we-won-we-lost-part-2</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/wef-warns-of-growing-cyber-threats-to-energy-infrastructure-following-iberian-blackout</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-are-polyglot-files-and-what-is-their-ot-security-risk</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-are-the-benefits-of-a-cyber-tabletop-exercise-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-have-we-learned-since-stuxnet-when-it-comes-to-control-system-cybersecurity-not-much</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-is-the-true-level-of-ot-cyber-incidents</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-problem-are-you-solving</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/what-we-know---stuxnet-15-years-later</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/whats-next-for-dhs-cisa-in-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/who-benefited-from-the-aisuru-and-kimwolf-botnets</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/who-decides-when-security-levels-are-enough</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/who-got-arrested-in-the-raid-on-the-xss-crime-forum</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/who-is-the-kimwolf-botmaster-dort</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/who-operates-the-badbox-2-0-botnet</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/why-do-cybersecurity-organizations-refuse-to-identify-control-system-cyber-incidents</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/why-incident-response-playbooks-fail-building-real-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/why-little-secure-coding-interest-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/why-no-small-business-is-too-small-for-hackers---and-8-security-best-practices-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/why-wont-nerc-identify-control-system-incidents-as-being-cyber-related</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/www-nistify-energy-post-regulatory-changes-new</loc>
    </url>
    <url>
        <loc>https://www.nistify.energy/post/zetter-details-how-stuxnet-marked-a-turning-point-in-cyberwarfare-by-enabling-physical-sabotage-through-code</loc>
    </url>
</urlset>