<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyber.dukecityconsulting.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/</loc>
		<lastmod>2026-04-07T02:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/desktop-agent/</loc>
		<lastmod>2026-04-07T02:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/context/</loc>
		<lastmod>2026-04-07T02:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/attack-surface/</loc>
		<lastmod>2026-04-07T02:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/exfiltrate/</loc>
		<lastmod>2026-04-07T02:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/scale/</loc>
		<lastmod>2026-04-07T02:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.dukecityconsulting.com/glossary/sandbox/</loc>
		<lastmod>2026-04-07T02:52:15+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->