<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://enaxy.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://enaxy.com/2026/01/myths-of-ot-cybersecurity-debunking-the-dangerous-assumptions/</loc><lastmod>2025-10-06T22:18:40+00:00</lastmod></url><url><loc>https://enaxy.com/2026/01/myth-ot-systems-are-isolated-and-immune-from-cyberattacks/</loc><lastmod>2026-01-27T18:54:08+00:00</lastmod></url><url><loc>https://enaxy.com/2026/02/myth-my-small-ot-network-wont-be-targeted/</loc><lastmod>2026-02-24T23:48:27+00:00</lastmod></url><url><loc>https://enaxy.com/2026/01/is-ot-cybersecurity-repeating-the-mistakes-of-it-cybersecurity/</loc><lastmod>2026-01-20T22:01:01+00:00</lastmod></url><url><loc>https://enaxy.com/2026/02/industry-specific-standards-tsa-security-directive/</loc><lastmod>2026-02-11T00:35:22+00:00</lastmod></url><url><loc>https://enaxy.com/2026/03/implementing-api-1164-cybersecurity-guidelines-in-the-pipeline-industry/</loc><lastmod>2026-03-03T23:38:56+00:00</lastmod></url><url><loc>https://enaxy.com/2026/02/navigating-cybersecurity-in-maritime-a-guide-to-bimcos-cybersecurity-guidance/</loc><lastmod>2026-02-17T20:00:25+00:00</lastmod></url><url><loc>https://enaxy.com/2026/02/an-introduction-to-the-nerc-cip-standards/</loc><lastmod>2026-02-03T23:02:47+00:00</lastmod></url><url><loc>https://enaxy.com/2026/03/ot-ics-penetration-tests-are-worth-it-but-only-if-youre-ready/</loc><lastmod>2026-03-10T21:12:32+00:00</lastmod></url><url><loc>https://enaxy.com/2026/03/is-ot-software-defined-networking-sdn-a-real-thing-or-a-pipe-dream/</loc><lastmod>2026-03-17T21:43:31+00:00</lastmod></url><url><loc>https://enaxy.com/2026/03/myth-antivirus-and-firewalls-are-enough-the-dangerous-shortcut-in-cybersecurity/</loc><lastmod>2026-03-17T22:14:38+00:00</lastmod></url><url><loc>https://enaxy.com/2026/04/when-cybersecurity-stops-the-assembly-line-lessons-from-the-jaguar-land-rover-production-shutdown/</loc><lastmod>2026-03-31T22:15:18+00:00</lastmod></url><url><loc>https://enaxy.com/2026/04/managing-cybersecurity-risk-in-large-scale-cellular-modem-deployments-for-ot-networks/</loc><lastmod>2026-04-07T22:48:58+00:00</lastmod></url><url><loc>https://enaxy.com/2026/04/making-cybersecurity-operational/</loc><lastmod>2026-04-07T22:22:45+00:00</lastmod></url><url><loc>https://enaxy.com/2026/04/what-should-we-call-the-ics-nsm-market/</loc><lastmod>2026-04-07T22:37:13+00:00</lastmod></url><url><loc>https://enaxy.com/2026/01/securing-mqtt-in-operational-technologybest-practices-to-protect-critical-systems/</loc><lastmod>2026-01-13T19:21:35+00:00</lastmod></url><url><loc>https://enaxy.com/2026/01/what-is-a-virtual-plc/</loc><lastmod>2025-10-14T16:41:22+00:00</lastmod></url><url><loc>https://enaxy.com/2025/12/should-we-have-two-triads-in-ot-ics-cybersecurity-cia-vs-srp/</loc><lastmod>2025-10-14T16:38:13+00:00</lastmod></url><url><loc>https://enaxy.com/2025/12/navigating-network-monitoring-real-world-case-studies-from-the-field/</loc><lastmod>2025-10-14T16:40:05+00:00</lastmod></url><url><loc>https://enaxy.com/2025/12/navigating-network-monitoring-choosing-the-right-tool-for-the-job/</loc><lastmod>2025-10-14T16:39:44+00:00</lastmod></url><url><loc>https://enaxy.com/2025/11/navigating-network-monitoring-span-vs-tap-in-industrial-environments/</loc><lastmod>2025-10-14T16:39:20+00:00</lastmod></url><url><loc>https://enaxy.com/2025/11/navigating-network-monitoring-an-introduction/</loc><lastmod>2025-10-14T16:38:51+00:00</lastmod></url><url><loc>https://enaxy.com/2025/11/the-state-of-cybersecurity-in-canada-2025-awareness-is-high-execution-is-low/</loc><lastmod>2025-11-12T17:03:00+00:00</lastmod></url><url><loc>https://enaxy.com/2025/10/new-joint-guide-on-creating-definitive-view-of-ot-architecture-why-it-matters-whats-strong-and-how-to-put-it-to-work/</loc><lastmod>2025-10-28T19:14:49+00:00</lastmod></url><url><loc>https://enaxy.com/2025/10/empowering-operators-the-key-role-of-cybersecurity-awareness-in-ot/</loc><lastmod>2025-10-06T22:22:47+00:00</lastmod></url><url><loc>https://enaxy.com/2025/10/is-there-a-right-cybersecurity-standard-conclusion/</loc><lastmod>2025-09-30T16:31:54+00:00</lastmod></url><url><loc>https://enaxy.com/2025/10/is-nist-sp-800-82-right-for-your-ot-ics-environment/</loc><lastmod>2025-09-29T22:33:54+00:00</lastmod></url><url><loc>https://enaxy.com/2025/10/are-the-cisa-cybersecurity-performance-goals-right-for-your-ot-ics-environment/</loc><lastmod>2025-09-29T18:21:38+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/cisas-new-ot-asset-inventory-guidance-why-it-matters-what-it-changes-and-how-to-put-it-to-work/</loc><lastmod>2025-09-24T14:34:29+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/are-the-cis-critical-security-controls-right-for-your-ot-ics-environment/</loc><lastmod>2025-09-16T18:51:35+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/is-the-isa-62443-standard-right-for-you/</loc><lastmod>2025-09-09T21:57:53+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/is-the-nist-cybersecurity-framework-nist-csf-right-for-you/</loc><lastmod>2025-09-02T23:27:37+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/is-there-a-right-cybersecurity-standard-for-the-industry/</loc><lastmod>2025-09-02T23:21:49+00:00</lastmod></url><url><loc>https://enaxy.com/2025/09/introducing-enaxy-and-our-new-blog-insights-at-the-intersection-of-cybersecurity-and-industrial-operations/</loc><lastmod>2025-09-02T15:34:44+00:00</lastmod></url></urlset>
