<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.trout.software</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.trout.software/pricing</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.trout.software/product/access-gate-one</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.trout.software/product/access-gate-enterprise</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/cmmc-compliance</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/nis2-compliance</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/zero-trust-access-control</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/remote-access</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/industrial-dmz</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/network-visibility</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/solutions/asset-inventory</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.trout.software/industry/defense</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.trout.software/industry/transportation</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.trout.software/industry/manufacturing</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.trout.software/industry/utilities</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.trout.software/industry/defense/naval</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/defense/ground-forces</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/defense/police</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/transportation/airport</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/transportation/rail</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/transportation/port-maritime</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/manufacturing/legacy-ot</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/manufacturing/remote-maintenance</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/manufacturing/cmmc-compliance</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/utilities/power-grid</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/utilities/water-wastewater</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/industry/utilities/oil-gas</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/architecture</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.trout.software/architecture/one-gateway</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/architecture/two-gateway-layers</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/architecture/multi-site</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/blog</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.trout.software/glossary</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.trout.software/events</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.trout.software/about</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/contact</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/use-cases</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/partner-program</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/find-a-partner</loc>
<lastmod>2026-03-28T19:00:01.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/tag-datasheet-2026</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.trout.software/resources/beyond-purdue</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/what-is-overlay-networking</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/webinars</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/whitepapers</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/capability-statement</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/dod-zero-trust-ot-alignment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/industrial-dmz-design-patterns</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/securing-modbus</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.trout.software/resources/access-gate-datasheet</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.65</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ai-powered-attacks-on-industrial-networks-what-ot-teams-should-prepare-for</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/air-gapped-but-not-safe-misconceptions-in-legacy-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/air-gapped-vs-layered-security-architectures</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/aligning-factory-networks-with-dod-requirements</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/alternatives-to-zscaler-for-securing-on-premise-and-industrial-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/automating-compliance-monitoring-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/badge-vs-password-why-physical-identity-matters-for-ot-cybersecurity</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/balancing-security-and-uptime-in-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/best-practices-for-designing-a-secure-ics-network</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/best-tools-for-monitoring-industrial-protocol-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/beyond-the-acronym-how-plcs-became-the-backbone-of-modern-industrial-automation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/breaking-down-broadcast-storms-how-layer-3-segmentation-saves-your-network</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/breaking-down-data-silos-how-to-extract-maximum-value-from-your-plc-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/bridging-it-and-ot-a-step-by-step-integration-guide</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/bridging-legacy-protocols-and-cloud-architectures</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/bringing-two-factor-authentication-to-the-factory-floor-constraints-and-practical-methods</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/building-a-soc-for-ot-tools-and-tips</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/building-fault-tolerant-network-paths-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/building-for-scalability-in-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/building-the-business-case-for-ot-network-segmentation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/c3pao-bottleneck-how-to-prepare-when-there-arent-enough-assessors</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/centralized-audit-logging-for-multi-site-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/change-management-for-industrial-network-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/change-management-in-ics-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/checklist-for-nerc-cip-compliance-in-power-utilities</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/choosing-between-star-and-ring-topologies-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/claroty-vs-access-gate-monitoring-vs-enforcement-for-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-2-0-what-manufacturers-need-to-know</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-compliance-for-defense-suppliers-practical-guide</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-level-2-requirements-for-ot-specialized-assets</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-october-2026-what-defense-manufacturers-must-do-now</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-secure-specialized-assets</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cmmc-vs-nis2-one-compliance-architecture-for-both-frameworks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-attack-vectors-in-legacy-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-language-how-it-and-ot-teams-can-align</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-mfa-mistakes-and-how-to-avoid-them</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-pitfalls-in-achieving-iso-27001-for-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-root-causes-of-ot-downtime</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/common-segmentation-mistakes-in-ics-projects</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/compliance-audit-readiness-for-critical-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/compliant-remote-access-solutions-for-manufacturers</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/continuous-verification-in-24-7-manufacturing-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/control-loop-mapping-how-attackers-learn-to-manipulate-physical-processes</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/creating-standard-operating-procedures-for-ot-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cui-enclave-architecture-on-premise-alternatives-to-gcc-high</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cybersecurity-for-naval-shipboard-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/cybersecurity-for-police-evidence-systems-sovereign-auditable-on-premise</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/daily-maintenance-tasks-for-ot-cybersecurity</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/data-diodes-vs-firewalls-for-it-ot-separation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/dealing-with-firmware-limitations-in-legacy-equipment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/deep-packet-inspection-vs-flow-based-monitoring-what-s-best-for-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/defense-contractor-facility-security-beyond-the-perimeter</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/deploying-firewalls-without-breaking-ics-traffic</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/design-patterns-for-converged-it-ot-monitoring</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/designing-for-predictable-network-behavior-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/designing-redundant-communication-paths-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/detecting-and-responding-to-ics-attacks-in-real-time</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/detecting-anomalies-in-industrial-protocols</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/device-authentication-for-legacy-industrial-equipment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/device-identity-in-zero-trust-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/dnp3-security-implementation-in-scada-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/documenting-security-controls-for-industrial-assessments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/dragos-2026-report-what-three-new-ot-threat-groups-mean-for-your-factory</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/endpoint-visibility-in-it-ot-convergence</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ethernet-ip-vulnerability-assessment-and-mitigation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/failover-strategies-for-mission-critical-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/failure-modes-in-scada-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/fido2-and-passkeys-the-future-of-mfa-for-critical-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/firewall-placement-strategies-for-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/flat-vs-segmented-networks-security-trade-offs-in-industrial-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-collision-to-precision-how-layer-3-routing-eliminates-network-bottlenecks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-control-room-to-field-device-adapting-two-factor-authentication-to-industrial-reality</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-door-to-data-how-badge-access-enhances-cybersecurity-in-industrial-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-factory-floor-to-cloud-building-robust-data-pipelines-from-plc-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-saas-security-to-factory-floor-security-the-two-faces-of-zero-trust</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/from-unboxing-to-zero-trust-in-4-hours-what-deployment-actually-looks-like</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/gdpr-and-ot-what-data-privacy-means-for-industrial-control-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/high-availability-nac-deployment-for-continuous-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/hmi-network-isolation-strategies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-compliance-can-drive-better-ot-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-network-changes-affect-plc-performance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-network-segmentation-accelerates-compliance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-network-traffic-logs-help-you-comply-with-cmmc-and-iec-62443</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-ski-resorts-and-distributed-infrastructure-operators-deploy-zero-trust</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-add-visibility-to-dark-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-audit-industrial-protocol-traffic-effectively</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-benchmark-ics-network-performance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-build-a-resilient-ot-backbone</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-build-a-zero-trust-architecture-for-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-build-an-incident-response-plan-for-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-build-an-ot-cybersecurity-roadmap-for-your-factory</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-comply-with-iec-62443-in-practice</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-conduct-a-post-incident-analysis-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-connect-sites-without-increasing-risk</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-correlate-network-traffic-and-device-behavior-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-create-secure-zones-in-scada-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-design-an-ics-network-for-high-availability</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-design-vlans-for-ics-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-detect-anomalies-in-modbus-and-dnp3-traffic</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-enforce-east-west-traffic-isolation-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-evaluate-ot-security-vendors-a-buyers-checklist-for-2026</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-implement-least-privilege-access-in-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-implement-mfa-in-legacy-ot-environments-without-breaking-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-integrate-zero-trust-with-existing-ics-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-leverage-it-tooling-in-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-manage-passwords-on-hundreds-of-ics-devices</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-monitor-latency-in-ics-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-monitor-scada-network-traffic-without-disrupting-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-perform-a-risk-assessment-on-your-ot-environment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-roll-out-mfa-without-frustrating-your-team</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-roll-out-new-ot-security-tech-with-minimal-downtime</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-safely-route-business-data-from-ics-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-secure-20-year-old-plcs-in-modern-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-secure-legacy-ot-systems-without-breaking-them</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-secure-modbus-tcp-best-practices-for-modern-ics-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-secure-shared-infrastructure-between-it-and-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-segment-control-and-safety-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-spot-malicious-lateral-movement-in-ot-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-train-operators-on-ot-security-best-practices</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-use-mitre-att-ck-for-ics-threat-detection</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/how-to-use-netflow-for-industrial-network-visibility</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ics-honeypots-revealing-real-world-attacks-on-industrial-protocols</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ics-network-design-mistakes-to-avoid</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ics-protocol-deep-packet-inspection-tools-and-techniques</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ics-vs-scada-security-what-you-need-to-know</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/iec-62443-zone-implementation-with-network-access-control</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/iec-62443-zones-and-conduits-explained</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/implementing-network-traffic-analysis-without-slowing-down-production</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/implementing-zero-trust-in-air-gapped-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/indicators-of-compromise-in-scada-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/industrial-dmz-design-and-access-control</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/industrial-malware-network-based-detection-strategies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/industrial-network-topology-discovery-and-mapping</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/industry-4-0-data-architecture-why-your-plc-strategy-determines-digital-transformation-success</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/insider-threat-detection-in-manufacturing-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/integrating-badge-access-with-windows-login-and-remote-sessions</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/integrating-serial-devices-into-ip-networks-securely</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/integrating-sysmon-and-ot-logging-a-unified-view</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/inventory-and-asset-management-in-ics-operations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/isa-iec-62443-asset-identification-and-documentation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/key-metrics-to-track-zero-trust-adoption-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/latency-requirements-in-industrial-control-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/lateral-movement-detection-in-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/layer-2-vs-layer-3-why-your-network-s-broadcast-domains-are-killing-performance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/legacy-device-inventory-where-to-start</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/legacy-ot-systems-risks-and-modern-mitigations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/lessons-learned-from-the-triton-malware-attack</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/maintenance-window-planning-for-security-updates</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/managing-mixed-it-ot-device-inventories</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/mapping-ot-controls-to-nist-sp-800-53</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/mfa-for-remote-access-securing-vpns-rdp-and-cloud-portals</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/mfa-for-service-accounts-and-industrial-devices-is-it-possible</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/microsegmentation-for-manufacturing-networks-a-technical-guide</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/microsegmentation-in-industrial-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/microsegmentation-in-ot-practical-steps-to-get-started</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/multi-site-ot-security-how-to-scale-zero-trust-across-50-plus-locations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nerc-cip-compliance-network-security-monitoring-requirements</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/network-access-control-nac-for-scada-and-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/network-security-impact-on-real-time-control-loops</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/network-traffic-baselines-why-they-re-critical-in-industrial-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/network-visibility-across-purdue-model-levels</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/network-visibility-you-cant-protect-what-you-cant-see</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-asset-inventory-requirements-what-you-need-to-track-and-how-to-do-it-on-premise</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-compliance-a-practical-guide-to-meeting-article-21-security-obligations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-compliance-for-manufacturing-securing-ot-legacy-machines-and-on-premise-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-directive-explained-requirements-scope-and-who-must-comply-in-2026</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-enforcement-is-live-what-changed-and-what-to-do-first</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-management-liability-why-executives-are-personally-on-the-hook</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nis2-operational-technology-what-manufacturers-need-to-know</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nist-cybersecurity-framework-for-manufacturing-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/nozomi-vs-access-gate-when-visibility-alone-isnt-enough</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/oil-gas-pipeline-security-protecting-distributed-scada-across-geographies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/on-premise-vs-cloud-enclave-cui-protection</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/opc-ua-authentication-in-air-gapped-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/opc-ua-security-what-every-ot-engineer-should-know</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ot-and-legacy-systems-impact-on-nis2</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ot-patch-management-challenges-and-strategies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ot-specific-ids-what-to-look-for</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ot-vs-it-cmmc-controls</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/overlay-networking-vs-vlans-a-practical-comparison-for-ot-segmentation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/overlay-networks-for-industrial-security-technical-deep-dive</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/passive-vs-active-traffic-monitoring-in-ics-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/patch-management-in-operational-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/phased-nac-deployment-in-live-manufacturing-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/plc-data-security-protecting-critical-infrastructure-in-connected-factories</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/plc-explained-what-every-manufacturing-professional-should-know-about-programmable-logic-controllers</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/plc-vs-scada-vs-dcs-understanding-industrial-control-system-hierarchies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/plug-and-play-nis2-compliance-achieving-coverage-without-agents-or-cloud-dependency</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/port-maritime-ot-security-protecting-crane-control-and-terminal-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/power-grid-substation-security-zero-trust-for-distributed-energy-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/preparing-for-cmmc-2-compliance-deadline</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/protocol-aware-firewalls-for-industrial-control-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/protocol-gateways-the-good-the-bad-and-the-ugly</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/protocol-whitelisting-how-to-reduce-attack-surface-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/proxy-based-security-for-ot-why-proxies-succeed-where-agents-fail</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/purdue-model-limitations-and-alternatives-for-modern-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/rail-signaling-cybersecurity-protecting-safety-certified-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ransomware-in-manufacturing-lessons-from-recent-attacks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/ransomware-targeting-manufacturing-2026-a-49-percent-increase</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/real-time-plc-data-streaming-opc-ua-modbus-and-modern-integration-patterns</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/real-world-ics-breaches-and-what-we-can-learn</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/red-team-vs-blue-team-exercises-for-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/redundant-link-design-for-ot-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/redundant-network-design-with-integrated-security-controls</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/reference-architectures-for-ics-network-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/remote-access-biggest-attack-vector-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/remote-access-security-for-industrial-maintenance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/remote-site-deployment-best-practices</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/retrofitting-security-controls-in-brownfield-installations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/roi-of-network-segmentation-the-business-case-for-layer-3-migration</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/role-of-qos-in-ics-communications</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/routed-vs-switched-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/scheduling-maintenance-windows-in-24-7-plants</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/secure-commissioning-of-new-ics-equipment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/secure-remote-access-for-legacy-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/secure-workarounds-for-unsupported-protocols</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-20-year-old-plcs-non-intrusive-approaches</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-airport-baggage-handling-systems-without-requalification</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-industrial-ethernet-ip-a-practical-guide</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-legacy-manufacturing-equipment</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-modbus-tcp-networks-beyond-basic-firewall-rules</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-the-it-ot-boundary-technical-architecture-patterns</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/securing-uav-ground-stations-mavlink-vulnerabilities</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/security-implications-of-using-profinet-in-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/security-policies-that-work-across-it-and-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/security-risks-of-uncontrolled-it-ot-interfaces</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/segmenting-legacy-scada-systems-without-network-redesign</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/serial-to-ethernet-gateway-security-considerations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/session-recording-for-ot-compliance-meeting-cmmc-and-nis2-audit-requirements</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/simulating-cyberattacks-on-plcs-safe-testing-techniques</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/software-defined-perimeter-in-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/speed-vs-security-why-layer-3-networks-win-at-both</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/strategies-for-enabling-logging-in-old-ics-devices</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/supply-chain-attacks-on-ot-the-pyroxene-campaign-and-lessons-for-operators</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/supply-chain-attacks-targeting-industrial-control-systems</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-case-for-out-of-band-management-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-complete-guide-to-migrating-from-switched-to-routed-network-architecture</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-difference-between-it-and-ot-cybersecurity-explained</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-difference-between-secure-modbus-and-modbus-tcp</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-difference-between-technical-and-administrative-controls-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-future-of-hybrid-it-ot-teams</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-hidden-security-risks-of-flat-switched-networks-and-how-layer-3-routing-fixes-them</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-impact-of-broadcast-storms-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-reliability-impact-of-cybersecurity-controls</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-emulators-in-ics-legacy-integration</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-l3-routing-in-ot-segmentation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-layer-2-and-layer-3-segmentation-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-mfa-in-cmmc-nis2-and-iec-62443-compliance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-multi-factor-authentication-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-network-segmentation-in-ot-cyber-defense</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-siems-in-ot-it-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-syslog-in-meeting-cmmc-logging-requirements</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-role-of-tls-in-securing-opc-ua</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/the-true-cost-of-ot-security-tco-comparison-of-appliance-vs-cloud-solutions</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/tips-for-upgrading-factory-network-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-10-audit-ready-controls-for-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-10-ot-cybersecurity-threats-facing-manufacturers-in-2025</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-5-benefits-of-using-badge-access-for-ics-and-scada-terminals</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-5-metrics-to-monitor-in-industrial-network-traffic</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-5-mfa-methods-compared-sms-totp-biometrics-hardware-keys-and-push-notifications</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-frameworks-for-ot-cybersecurity-iec-62443-nist-and-more</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-mistakes-during-it-ot-network-mergers</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-ot-cyber-threats-in-2025-what-to-watch</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/top-vulnerabilities-in-dnp3-and-how-to-mitigate-them</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/topology-design-for-monitoring-and-visibility</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/training-operations-staff-on-network-security-tools</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/training-ot-operators-on-network-hygiene</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/troubleshooting-ics-performance-with-netflow</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/trout-software-carahsoft-partnership</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/understanding-nis2-requirements-for-ics-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/understanding-scada-protocol-behavior-for-better-defenses</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/understanding-the-costs-of-multi-factor-authentication</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/user-identity-and-access-in-air-gapped-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-demilitarized-lans-to-isolate-ot-assets</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-netflow-and-logs-for-ics-threat-hunting</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-overlay-networks-for-secure-ot-access</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-snmp-effectively-in-ot-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-software-defined-networking-sdn-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/using-traffic-analysis-for-incident-response-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/vendor-access-controls-during-field-maintenance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/vendor-access-risks-in-ot-and-how-to-control-them</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/water-utility-cybersecurity-securing-scada-from-treatment-plant-to-tap</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/what-is-badge-access-for-digital-systems-a-beginner-s-guide-for-it-and-ot-teams</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/what-is-mfa-and-why-every-organization-needs-it-in-2025</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/what-is-network-traffic-analysis-a-guide-for-ot-engineers</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/what-is-ot-cybersecurity-a-beginner-s-guide-for-industrial-teams</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/what-ot-security-teams-can-learn-from-it-breach-reports</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/when-flat-networks-fail-5-warning-signs-it-s-time-to-move-to-layer-3</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/when-never-trust-always-verify-meets-legacy-plcs</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/where-the-packets-roam</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-air-gaps-are-no-longer-enough-in-ot-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-early-detection-is-key-in-ot-security</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-it-ot-convergence-fails-without-governance</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-jitter-matters-in-real-time-ot-traffic</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-legacy-protocols-pose-a-risk-in-modern-ot-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-microsegmentation-is-critical-for-zero-trust-in-ics</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-on-premise-ot-security-beats-cloud-routed-solutions</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-patching-isn-t-always-an-option-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-routed-networks-scale-better-the-math-behind-layer-3-performance-gains</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-zero-trust-matters-for-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/why-ztna-in-ot-isn-t-the-same-as-in-it</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/windows-xp-in-industrial-networks-containment-strategies</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/wireless-design-considerations-for-industrial-zones</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/yubikeys-in-manufacturing-hands-on-mfa-for-shared-workstations</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-downtime-deployment-techniques-for-industrial-networks</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-for-industrial-networks-using-overlay-networks-for-secure-ot-access</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-in-ot-how-to-get-started</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-in-ot-why-the-perimeter-is-dead</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-ot-gateways-what-they-are-and-how-they-work</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-policy-framework-for-critical-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-principles-applied-to-plc-communications</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-readiness-checklist-for-industrial-environments</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-starts-at-layer-3-how-routed-networks-enable-micro-segmentation</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zero-trust-vs-traditional-firewalling-what-s-more-effective-in-ot</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zone-and-conduit-architecture-with-modern-nac-solutions</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/blog/zone-based-firewalling-for-ics-best-practices</loc>
<lastmod>2026-03-28T19:00:01.159Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/access-control-list</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/access-control</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/admin-dashboard</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/advanced-cyber-hygiene</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/air-gapped-network</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/antivirus</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/asset-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/authentication-methods</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/azure-government</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/backup-and-restore</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/biometric-authentication</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/business-continuity-planning</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/buy-american-act</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cage-code</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/capability-statement</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/certifications</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/change-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cloud-backup</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cloud-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cloud-storage</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cmmc-enduring-exception</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cmmc-level-1</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cmmc-level-2</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cmmc</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/commerce-control-list</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/compliance-auditing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/compliance-framework</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/compliance-software</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/configuration-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/continuous-improvement</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/contract-number</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/contractor-evaluation</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/controlled-unclassified-information</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/credential-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/critical-infrastructure-protection</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cross-site-scripting</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cui-enclave</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/customer-portal</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/customer-reference</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cyber-attack</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cyber-box</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cyber-physical-systems</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cybersecurity-awareness-training</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cybersecurity-frameworks</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cybersecurity-incident</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/cybersecurity-maturity</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-breach</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-center</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-encryption</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-integrity</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-loss-prevention</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-redundancy</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/data-retention-policies</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/defense-contract</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/defense-contracting</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/defense-federal-acquisition-regulation-supplement</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/defense-industrial-base</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/delivery-schedule</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/device-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/digital-forensics</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/digital-transformation-in-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/disadvantaged-business-enterprise-program</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/disaster-recovery</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/dod-contracts</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/domestic-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/domestic-sourcing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/ear</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/edge-computing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/email-archive</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/email-filter</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/employee-training</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/encrypted-email</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/encryption</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/endpoint-protection</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/ethernet</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/export-control-classification-number</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/factory-wi-fi</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/fiber-optic-cables</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/firewall-configuration</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/firewall</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/flowdown</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/gcc-high</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/google-workspace</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/governance-risk-and-compliance-software</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/government-buyers</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/government-procurement</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/identity-and-access-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/identity-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/iec-62443</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/incident-response</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/industrial-control-systems-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/industrial-cybersecurity-standards</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/industrial-dmz</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/industrial-networking</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/information-governance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/information-technology-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/insider-threat</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/internet-protocol</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/intrusion-detection-system</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/intrusion-prevention-system</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/inventory-management-system</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/inventory-software</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/invoice-tracking</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/iot-in-manufacturing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/iot-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/iso-9001-compliance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/iso-iec-27001</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/it-infrastructure-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/it-support</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/it-troubleshooting</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/itar</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/job-ticket</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/lead-time</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/least-privilege-principle</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/login-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/logistics-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/lollipop-architecture</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/machine-network</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/made-in-usa</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/maintenance-schedule</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/malware</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/manufacturing-execution-systems</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/manufacturing-readiness</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/microsoft-365</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/mobile-access</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/multi-factor-authentication</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/naics-code</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/nerc-cip</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/network-access-control</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/network-and-information-systems-directive</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/network-diagnostics</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/network-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/network-segmentation</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/nist-sp-800-171</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/off-site-backup</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/on-site-backup</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/online-forms</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/operational-efficiency</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/operational-technology-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/ot-it-convergence</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/overlay-networking-ot</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/password-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/password-policy</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/past-performance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/patch-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/patch-update</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/payment-terms</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/pc-login</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/phishing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/physical-security-information-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/physical-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/po-number</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/preventive-maintenance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/prime-contractor</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/printer-access</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/product-specs</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/production-order</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/production-readiness</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/programmable-logic-controllers</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/public-key-infrastructure</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/purdue-model</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/quality-assurance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/quality-control</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/ransomware</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/registration</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/remote-access</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/remote-desktop-protocol</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/request-for-information</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/rfid</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/rfp</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/rfq</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/risk-assessment</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/risk-management-framework</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/risk-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/role-based-access-control</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/root-cause-analysis</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/ruggedized-devices</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/sam-gov</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/sam-registration</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-access-gateway</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-communications</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-email</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-file-sharing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-network</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/secure-sockets-layer-and-transport-layer-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-audit</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-checklist</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-configuration</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-information-and-event-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-patching</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-policy</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/security-tokens</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/server-room</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/set-aside-contracts</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/shared-drive</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/shop-computer</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/shop-floor</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/single-sign-on</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/small-business-set-aside</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/social-engineering</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/spear-phishing</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/sql-injection</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/standard-operating-procedures</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/statistical-process-control</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/strong-password</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/subcontractor-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/subcontractor</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/supervisory-control-and-data-acquisition</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/supplier-portal</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/supply-chain-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/supply-chain-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/system-backup</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/system-for-award-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/system-maintenance</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/system-restart</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/team-collaboration</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/third-party-risk-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/threat-intelligence</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/time-clock</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/tool-tracking</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/total-quality-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/transmission-control-protocol</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/transport-layer-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/two-factor-authentication</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/two-factor-login</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/udp-user-datagram-protocol</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/user-access-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/user-authentication</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/user-permissions</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/vendor-assessment</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/vendor-list</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/vpn</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/vulnerability-assessment</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/vulnerability-management</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/wi-fi-password</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/wireless-encryption-standards</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/work-instructions</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/work-order</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/workstation</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/zero-day-exploit</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/zero-trust-architecture</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/zero-trust-network-access</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/glossary/zero-trust-security</loc>
<lastmod>2026-03-28T19:00:01.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/cmmc-ne-summit-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/in-cyber-europe-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/global-industry-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/sea-air-space-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/modern-day-marine-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/cyber-onboard-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/eurosatory-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/inaval-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/riams-recif-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/european-cyber-week-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.trout.software/events/exera-2026</loc>
<lastmod>2026-03-28T19:00:01.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
