<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://bakesecurityin.com/2023/05/04/what-do-passwords-and-star-wars-have-in-common/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/05/darth-vader-g56f0b9985_1280-1.jpg</image:loc><image:title>darth-vader-g56f0b9985_1280</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/05/darth-vader-cake-1.jpeg</image:loc><image:title>darth-vader-cake-1</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/05/darth-vader-cake.jpeg</image:loc><image:title>darth-vader-cake</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/05/darthvader-cake-before-decoration.jpeg</image:loc><image:title>darthvader-cake-before-decoration</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/05/darth-vader-cake-pan.jpeg</image:loc><image:title>darth-vader-cake-pan</image:title></image:image><lastmod>2023-05-04T14:08:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2023/04/08/easter-eggs-hidden-ingredients-in-software-and-cake/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/04/easter-egg-cake.jpeg</image:loc><image:title>easter-egg-cake</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/04/easter-egg-cake-on-table.jpg</image:loc><image:title>easter-egg-cake-on-table</image:title></image:image><lastmod>2023-04-08T07:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2023/01/23/cybersecurity-awareness-carrots-sticks-and-some-carrot-cake/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/01/carrotcake.jpeg</image:loc><image:title>carrotcake</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/01/gifts.jpg</image:loc><image:title>gifts</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2023/01/carrotcakeslice.jpeg</image:loc><image:title>carrotcakeslice</image:title></image:image><lastmod>2023-01-23T09:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2022/08/31/manage-security-debt-and-write-some-documentation/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2022/08/spinachfetapie-1.jpeg</image:loc><image:title>spinachfetapie-1</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2022/08/spinachfetapie.jpeg</image:loc><image:title>spinachfetapie</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2022/08/malware-g8da8ec9be_640.png</image:loc><image:title>malware-g8da8ec9be_640</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2022/08/spinachfetapie-piece.jpeg</image:loc><image:title>spinachfetapie-piece</image:title></image:image><lastmod>2022-08-31T15:56:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2022/03/30/backup-your-data-and-your-kitchen-cupboard/</loc><lastmod>2022-03-30T17:22:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2022/02/13/sour-phishing-and-sweet-pie-the-tastes-of-valentines-day/</loc><lastmod>2022-02-13T13:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/10/31/cybersecurity-is-not-scary/</loc><lastmod>2021-10-31T13:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/09/19/apple-pies-and-integer-overflows/</loc><lastmod>2021-09-19T17:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/08/15/you-should-monitor-logs-like-a-cake-in-the-oven/</loc><lastmod>2021-08-15T15:59:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/07/07/cream-and-strawberries-baking-security-into-the-internet-protocol-stack/</loc><lastmod>2021-07-07T14:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/06/14/threat-modeling-baking-when-bread-falls-on-the-buttered-side/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/06/cheery-baker.jpg</image:loc><image:title>A cheery baker</image:title></image:image><lastmod>2021-06-14T04:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/04/12/threats-related-to-multi-factor-authentication-and-some-multi-factor-baking/</loc><lastmod>2021-05-26T14:30:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/05/26/when-cybersecurity-goes-overboard-and-your-cake-too/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/05/overthetop-chocolatecake.jpg</image:loc><image:title>overthetop-chocolatecake</image:title></image:image><lastmod>2021-05-26T14:19:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/03/01/what-do-vulnerabilities-and-bread-rolls-have-in-common/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/03/breadrolls.png</image:loc><image:title>breadrolls</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/03/breadrolls.jpeg</image:loc><image:title>breadrolls</image:title></image:image><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/02/breadrolls.jpeg</image:loc><image:title>Home-made bread rolls</image:title></image:image><lastmod>2021-03-01T18:09:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/2021/03/01/introducing-bake-security-in/</loc><image:image><image:loc>https://bakesecurityin.com/wp-content/uploads/2021/03/bakesecurityin-withbackgroud.jpg</image:loc><image:title>bakesecurityin-withbackgroud</image:title></image:image><lastmod>2021-03-01T17:37:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bakesecurityin.com/about/</loc><lastmod>2021-03-01T17:13:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://bakesecurityin.com/blog/</loc><lastmod>2021-02-28T13:38:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://bakesecurityin.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-05-04T14:08:27+00:00</lastmod></url></urlset>
