<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://nielharper.com/2026/03/23/is-your-biggest-security-risk-already-inside-your-castle/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/03/4143393-0-50249300-1774249340-shutterstock_2081373397.webp</image:loc><image:title>4143393-0-50249300-1774249340-shutterstock_2081373397</image:title></image:image><lastmod>2026-03-25T08:51:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/career-highlights/</loc><lastmod>2026-03-24T11:17:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nielharper.com/2026/03/21/dns-is-the-first-line-of-defense-for-security-and-resilience/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/03/screenshot-2026-03-21-at-7.27.19-am.png</image:loc><image:title>Screenshot 2026-03-21 at 7.27.19 AM</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/03/screenshot-2026-03-21-at-7.23.45-am.png</image:loc><image:title>Screenshot 2026-03-21 at 7.23.45 AM</image:title></image:image><lastmod>2026-03-21T06:30:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/contact/</loc><lastmod>2026-02-20T18:33:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nielharper.com/2026/02/07/why-cisos-must-fight-back-against-scapegoating/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/02/ciso-scapegoat.jpeg</image:loc><image:title>CISO Scapegoat</image:title></image:image><lastmod>2026-02-08T14:38:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2026/02/05/cybersecurity-data-privacy-virtual-summit-2026/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/02/whatsapp-image-2026-02-05-at-15.59.37-1.jpeg</image:loc><image:title>WhatsApp Image 2026-02-05 at 15.59.37 (1)</image:title></image:image><lastmod>2026-02-08T08:49:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2026/02/01/the-dangers-of-relying-on-security-theater/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2026/02/security-theater-in-the-context-of-cloud-security.-the-image-shows-a-grand-theater-stage-framed-by-lush-red-velvet-cur.webp</image:loc><image:title>Security-Theater-in-the-context-of-cloud-security.-The-image-shows-a-grand-theater-stage-framed-by-lush-red-velvet-cur</image:title></image:image><lastmod>2026-02-01T17:59:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/12/04/agents-unleashed-can-we-control-what-weve-created/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/12/screenshot-2025-12-05-at-11.27.01-am.png</image:loc><image:title>Screenshot 2025-12-05 at 11.27.01 AM</image:title></image:image><lastmod>2025-12-05T10:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/12/03/ransomware-as-a-service-raas-from-code-to-cartel/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/12/gemini_generated_image_v14idzv14idzv14i.png</image:loc><image:title>Gemini_Generated_Image_v14idzv14idzv14i</image:title></image:image><lastmod>2025-12-05T10:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/10/04/why-the-current-debate-on-the-uk-digital-id-britcard-is-misleading/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/10/gettyimages-2213436340.max-1200x600-3196150854.jpg</image:loc><image:title>GettyImages-2213436340.max-1200x600-3196150854</image:title><image:caption>Supervisor scanning the ID of a warehouse worker at the door - people arriving to work concepts</image:caption></image:image><lastmod>2025-12-05T08:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/09/29/why-the-uk-governments-loan-guarantee-for-jlr-is-problematic/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/09/1759063272-fc5291a7f197282bf6bc6f6a00bb385d-1184532861.jpg</image:loc><image:title>1759063272-fc5291a7f197282bf6bc6f6a00bb385d-1184532861</image:title></image:image><lastmod>2025-09-30T04:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/07/29/auditboard-names-25-cisos-to-watch-in-2025/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/08/screenshot-2025-08-06-at-09.50.56.png</image:loc><image:title>Screenshot 2025-08-06 at 09.50.56</image:title></image:image><lastmod>2025-09-06T18:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/08/13/2142/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/08/screenshot-2024-08-13-at-12.28.40.png</image:loc><image:title>Screenshot 2024-08-13 at 12.28.40</image:title></image:image><lastmod>2025-06-06T06:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/04/23/security-leaders-shed-light-on-their-zero-trust-journeys/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/04/3965399-0-67692700-1745307112-shutterstock_583717516-100937158-orig.webp</image:loc><image:title>3965399-0-67692700-1745307112-shutterstock_583717516-100937158-orig</image:title></image:image><lastmod>2025-04-23T14:05:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/03/13/mismanagement-of-the-bra-breach-incompetence-is-expensive/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/03/860x394.jpg</image:loc><image:title>860x394</image:title></image:image><lastmod>2025-03-14T05:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/03/08/he-said-security-she-said-privacy-isaca-2025-state-of-privacy-survey-findings-podcast/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/03/screenshot-2025-03-08-at-09.14.50.png</image:loc><image:title>Screenshot 2025-03-08 at 09.14.50</image:title></image:image><lastmod>2025-03-08T08:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/03/03/2333/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/03/screenshot-2025-03-03-at-09.03.41.png</image:loc><image:title>Screenshot 2025-03-03 at 09.03.41</image:title></image:image><lastmod>2025-03-03T17:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/02/25/critical-infrastructure-ci-protection-are-we-ready/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/02/screenshot-2025-02-25-at-10.37.46.png</image:loc><image:title>Screenshot 2025-02-25 at 10.37.46</image:title></image:image><lastmod>2025-02-26T06:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/01/23/new-isaca-research-63-percent-of-privacy-professionals-find-their-jobs-more-stressful-now-than-five-years-ago/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2025/01/screenshot-2025-01-22-at-17.54.03.png</image:loc><image:title>Screenshot 2025-01-22 at 17.54.03</image:title></image:image><lastmod>2025-01-23T08:19:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2025/01/09/five-ways-security-professionals-can-start-the-new-year-strong/</loc><lastmod>2025-01-10T03:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/12/09/how-the-isaca-board-and-executive-management-address-cyber-risk/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/12/niel-h-1.png</image:loc><image:title>Niel-H-1</image:title></image:image><lastmod>2024-12-11T10:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/12/11/cybersecurity-a-dynamic-and-impactful-career-field/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/12/a1_main-image-888x500-1.jpg</image:loc><image:title>A1_Main-Image-888x500</image:title></image:image><lastmod>2024-12-11T06:17:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/10/30/ai-under-control-protecting-your-business-from-emerging-ai-risks/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/10/screenshot-2024-12-06-at-10.42.20.png</image:loc><image:title>Screenshot 2024-12-06 at 10.42.20</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/10/screenshot-2024-10-31-at-00.02.36.png</image:loc><image:title>Screenshot 2024-10-31 at 00.02.36</image:title></image:image><lastmod>2024-12-06T09:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/11/29/human-resources-and-cybersecurity-the-dynamic-duo/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/11/screenshot-2024-12-06-at-10.38.24.png</image:loc><image:title>Screenshot 2024-12-06 at 10.38.24</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/11/screenshot-2024-11-29-at-13.18.34.png</image:loc><image:title>Screenshot 2024-11-29 at 13.18.34</image:title></image:image><lastmod>2024-12-06T09:39:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/12/04/dispelling-the-myths-of-defense-grade-cybersecurity/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/12/screenshot-2024-12-05-at-13.21.28.png</image:loc><image:title>Screenshot 2024-12-05 at 13.21.28</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/12/screenshot-2024-12-04-at-12.52.40.png</image:loc><image:title>Screenshot 2024-12-04 at 12.52.40</image:title></image:image><lastmod>2024-12-06T09:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/10/24/the-caribbean-cybersecurity-pandemic-building-a-digital-trust-model/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/10/unnamed.png</image:loc><image:title>unnamed</image:title></image:image><lastmod>2024-10-25T09:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/10/01/navigating-cybersecurity-insights-and-tips-from-niel-harper-doodles-ciso/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/10/screenshot-2024-09-30-at-14.38.17.png</image:loc><image:title>Screenshot 2024-09-30 at 14.38.17</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/10/screenshot-2024-09-30-at-17.31.41.png</image:loc><image:title>Screenshot 2024-09-30 at 17.31.41</image:title></image:image><lastmod>2024-10-01T05:03:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/09/17/barbados-digital-aspirations-a-reality-check/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/09/digitaltransformationinthepublicsector2_1704299334.jpg</image:loc><image:title>DigitalTransformationinthePublicSector2_1704299334</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/09/screenshot-2024-09-17-at-06.40.12.png</image:loc><image:title>Screenshot 2024-09-17 at 06.40.12</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/09/screenshot-2024-09-17-at-06.37.51.png</image:loc><image:title>Screenshot 2024-09-17 at 06.37.51</image:title></image:image><lastmod>2024-09-17T11:02:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/09/14/2024-isc2-global-achievement-award/</loc><lastmod>2024-09-15T23:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/09/05/cyber-firms-need-to-centre-their-own-resilience/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/09/1579088121673.jpeg</image:loc><image:title>1579088121673</image:title></image:image><lastmod>2024-09-05T19:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/06/30/the-lacework-modern-ciso-network-board-book/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/06/1718370822129.jpeg</image:loc><image:title>1718370822129</image:title></image:image><lastmod>2024-06-30T15:38:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/09/23/ransomware-to-pay-or-not-to-pay-and-how-not-to-play/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/09/screenshot-2024-05-18-at-12.10.00.png</image:loc><image:title>Screenshot 2024-05-18 at 12.10.00</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/09/screenshot-2021-09-22-at-21.35.29.png</image:loc><image:title>Screenshot 2021-09-22 at 21.35.29</image:title></image:image><lastmod>2024-05-18T10:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/12/05/comments-on-the-cybercrime-bill-2023/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/12/cyber.webp</image:loc><image:title>cyber</image:title></image:image><lastmod>2024-05-15T11:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/03/07/digital-id-explained-what-are-the-pros-and-cons/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/03/digital-id-thumbprint-digital-access-online-services.jpg</image:loc><image:title>digital-id-thumbprint-digital-access-online-services</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/03/screenshot-2023-03-07-at-16.49.52.png</image:loc><image:title>Screenshot 2023-03-07 at 16.49.52</image:title></image:image><lastmod>2024-12-16T11:25:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2024/01/09/essential-skills-for-todays-threat-analysts/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/01/what_is_threat_intelligence.jpeg</image:loc><image:title>what_is_threat_intelligence</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2024/01/security-concept-166419812-5b2f131bfa6bcc00361b6de1-5be201e9c9e77c00518b6262.jpg</image:loc><image:title>security-concept-166419812-5b2f131bfa6bcc00361b6de1-5be201e9c9e77c00518b6262</image:title></image:image><lastmod>2024-01-09T12:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/03/23/comments-on-the-national-identity-management-systems-act-2021/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/03/860x394.jpeg</image:loc><image:title>860x394</image:title></image:image><lastmod>2023-12-14T11:13:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/07/20/how-municipalities-are-dealing-with-being-low-hanging-targets-for-hackers/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/07/blog-local-gov-ransomware-768x336-1.png</image:loc><image:title>blog-local-gov-ransomware-768x336</image:title></image:image><lastmod>2023-11-28T12:36:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/09/20/alumni-of-distinction-award-technology-algonquin-college/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/10/screenshot-2023-10-20-at-06.15.48.png</image:loc><image:title>Screenshot 2023-10-20 at 06.15.48</image:title></image:image><lastmod>2023-10-20T17:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/10/20/top-25-leaders-in-cyber-security/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/10/screenshot-2023-10-20-at-04.55.10.png</image:loc><image:title>Screenshot 2023-10-20 at 04.55.10</image:title></image:image><lastmod>2023-10-20T04:15:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/08/30/how-international-cybersecurity-frameworks-can-help-cisos/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/08/what-is-cyber-law.jpg</image:loc><image:title>what-is-cyber-law</image:title></image:image><lastmod>2023-08-30T08:14:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/06/24/caribbean-telecoms-operators-seeking-to-deepen-their-monopoly-strangleholds/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/06/6e4ab42b543ebdd4802f822200aebe59ecb29120.webp</image:loc><image:title>6e4ab42b543ebdd4802f822200aebe59ecb29120</image:title></image:image><lastmod>2023-08-06T10:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/05/19/no-we-dont-need-generative-ai-meddling-in-our-ci-cd-pipeline/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/05/chatgpt.jpeg</image:loc><image:title>chatgpt</image:title></image:image><lastmod>2023-05-20T07:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/05/20/isaca-board-director-niel-harper-secures-a-role-on-the-professional-standards-working-group-of-uk-cyber-security-council/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/05/screenshot-2023-05-20-at-09.22.18.png</image:loc><image:title>Screenshot 2023-05-20 at 09.22.18</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/05/screenshot-2023-05-20-at-09.20.02.png</image:loc><image:title>Screenshot 2023-05-20 at 09.20.02</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/05/uk-cyber-security-council-social-graphic.png</image:loc><image:title>uk-cyber-security-council-social-graphic</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/05/uk-cyber-security-council-social-graphic.jpg</image:loc><image:title>uk-cyber-security-council-social-graphic</image:title></image:image><lastmod>2023-05-21T17:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/04/09/regulating-ai-tech-is-no-longer-an-option-its-a-must/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/04/artificial-intelligence-warning-machines-harm-humans-ai-news-1321015.jpg</image:loc><image:title>Artificial-intelligence-warning-machines-harm-humans-AI-news-1321015</image:title></image:image><lastmod>2023-04-29T08:59:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/02/09/will-your-incident-response-team-fight-or-freeze-when-a-cyberattack-hits/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/02/fightflightfreeze551.png</image:loc><image:title>fightflightfreeze551</image:title></image:image><lastmod>2023-02-09T19:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2023/01/29/recent-tech-company-layoffs-seeing-through-the-dark-clouds/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2023/01/1674294954145.jpeg</image:loc><image:title>1674294954145</image:title></image:image><lastmod>2023-01-29T20:22:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/12/07/barbadians-to-train-work-in-cybersecurity-my-recommended-approach/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/12/cyber-workdorce.jpeg</image:loc><image:title>cyber workdorce</image:title></image:image><lastmod>2023-01-03T16:03:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/05/16/12-steps-to-building-a-top-notch-vulnerability-management-program/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/05/vulnerability_cycle_01.png</image:loc><image:title>Vulnerability_Cycle_01</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/05/images.png</image:loc><image:title>images</image:title></image:image><lastmod>2022-09-29T18:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/09/11/feature-article-in-seguridad-y-sociedad/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/09/file-mag.jpg</image:loc><image:title>file-mag</image:title></image:image><lastmod>2022-05-25T18:43:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/12/07/why-linux-is-the-most-popular-operating-system/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/12/linux-penguin.png</image:loc><image:title>linux-penguin</image:title></image:image><lastmod>2022-05-06T03:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/05/05/%f0%9d%97%97%f0%9d%97%bc%f0%9d%97%bb%f0%9d%98%81-%f0%9d%97%b4%f0%9d%97%b2%f0%9d%98%81-%f0%9d%98%86%f0%9d%97%bc%f0%9d%98%82%f0%9d%97%bf-%f0%9d%98%84%f0%9d%97%b6%f0%9d%97%bf%f0%9d%97%b2%f0%9d%98%80/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/05/screenshot-2022-05-05-at-12.24.22.png</image:loc><image:title>Screenshot 2022-05-05 at 12.24.22</image:title></image:image><lastmod>2022-05-06T02:40:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/03/31/why-domain-names-should-be-viewed-as-property-rights/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/03/domains.jpg</image:loc><image:title>domains</image:title></image:image><lastmod>2022-05-06T02:01:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/05/31/6-tips-for-protecting-against-ransomware/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/05/ransomware_logo-1.jpg</image:loc><image:title>Ransomware_logo-1</image:title></image:image><lastmod>2022-05-06T01:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/09/26/649/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/09/screen-shot-2017-09-26-at-3-50-16-pm.png</image:loc><image:title>Screen Shot 2017-09-26 at 3.50.16 PM</image:title></image:image><lastmod>2022-05-06T01:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/10/03/why-bitcoin-will-not-solve-the-caribbeans-financial-inclusion-woes/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/10/bitcoin.jpeg</image:loc><image:title>bitcoin</image:title></image:image><lastmod>2022-05-06T01:54:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2018/04/11/ict-pulse-cyber-threats-and-security-in-the-caribbean-2018-update-interview-with-niel-harper/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2018/04/cyber-security.jpg</image:loc><image:title>cyber security</image:title></image:image><lastmod>2022-05-06T01:53:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2019/03/07/what-the-government-of-barbados-needs-to-do-to-get-fintech-right/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2018/10/fintech-security1.jpeg</image:loc><image:title>fintech security</image:title></image:image><lastmod>2022-05-06T01:52:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/04/01/expert-insights-on-cyber-threats-and-security/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/05/screenshot-2020-05-21-at-10.35.33.png</image:loc><image:title>Screenshot 2020-05-21 at 10.35.33</image:title></image:image><lastmod>2022-05-06T01:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/03/06/too-many-unanswered-questions-the-barbados-national-digital-identification-did/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/03/did.jpeg</image:loc><image:title>DID</image:title></image:image><lastmod>2022-05-06T01:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/04/13/incoming-isaca-board-features-experienced-leaders-diverse-backgrounds/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/04/isaca-logo.jpeg</image:loc><image:title>ISACA-logo</image:title></image:image><lastmod>2022-05-06T01:48:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/09/13/8-pitfalls-that-undermine-security-program-success/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/banana-peel_slip_accident_mistake_fall_by-rapideye-getty-100787946-large.jpeg</image:loc><image:title>banana-peel_slip_accident_mistake_fall_by-rapideye-getty-100787946-large</image:title></image:image><lastmod>2022-05-06T01:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/09/14/caribbean-security-resilience-awards-winners-announced/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/09/screenshot-2021-09-14-at-11.43.22.png</image:loc><image:title>Screenshot 2021-09-14 at 11.43.22</image:title></image:image><lastmod>2022-05-06T01:46:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/31/12-ciso-resolutions-for-2022/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/newyeargoals-resolutions_210755-630x330.jpg.webp</image:loc><image:title>newyeargoals-resolutions_210755-630x330.jpg</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/one_glowing_blue_arrow_speeds_ahead_of_a_pack_of_black_arrows_leadership_competition_momentum_growth_by_gremlin_gettyimages-1050942106_2400x1600-100858617-large.webp</image:loc><image:title>one_glowing_blue_arrow_speeds_ahead_of_a_pack_of_black_arrows_leadership_competition_momentum_growth_by_gremlin_gettyimages-1050942106_2400x1600-100858617-large</image:title></image:image><lastmod>2022-05-06T01:43:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/03/22/ransomware-has-changed-the-game-of-cyber-insurance/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/05/tuesdaymarch2220221647947494.jpg</image:loc><image:title>TuesdayMarch2220221647947494</image:title></image:image><lastmod>2022-05-06T01:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/20/the-uk-seeks-to-enforce-tougher-standards-on-msps/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/critical-infrastructure-01-768x560-1.png</image:loc><image:title>critical-infrastructure-01-768x560</image:title></image:image><lastmod>2022-01-21T11:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/12/cloud-security-trends-what-is-cybersecurity-mesh/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/businesswoman-working-at-her-office-desk-630x330.jpeg.webp</image:loc><image:title>Businesswoman-working-at-her-office-desk-630x330.jpeg</image:title></image:image><lastmod>2022-01-17T18:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/17/why-the-humanitarian-sector-needs-to-make-cybersecurity-a-priority/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/v-p-ml-e-00299-1.jpeg</image:loc><image:title>V-P-ML-E-00299.JPG</image:title><image:caption>Mopti. Déplacement des populations de Djenné par le CICR, en raison des conflits intercommunautaires et des inondations.&#13;
Mopti. Displacement of the populations from Djenné by the ICRC, caused by conflicts between communities and flooding.</image:caption></image:image><lastmod>2022-01-17T17:57:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/12/16/the-uks-national-cyber-strategy-signals-a-more-proactive-approach-to-cyber-power/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/gchq-aerial-658x370-1.jpeg</image:loc><image:title>GCHQ at Cheltenham, Gloucestershire</image:title><image:caption>An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire.&#13;
&#13;
GCHQ is one of the three UK Intelligence Agencies and forms a crucial part of the UKs National Intelligence and Security machinery.&#13;
&#13;
The National Security Strategy sets out the challenges of a changing and uncertain world and places cyber attack in the top tier of risks, alongside international terrorism, a major industrial accident or natural disaster, and international military crisis. &#13;
&#13;
GCHQ, in concert with Security Service (also known as MI5) and the Secret Intelligence Service (also known as MI6) play a key role across all of these areas and more. Their work drives the UK Governments response to world events and enables strategic goals overseas.</image:caption></image:image><lastmod>2022-01-17T11:41:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/12/pandemic-democracy-covid-19-and-election-management/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/pandemic-democracy-covid-19-and-election-management-post-01-1.jpg</image:loc><image:title>Pandemic Democracy COVID-19 And Election Management Post-01 (1)</image:title></image:image><lastmod>2022-01-12T22:38:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2022/01/01/why-the-barbados-election-list-data-leak-is-problematic-and-how-it-could-have-been-prevented/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2022/01/data-breach.jpeg</image:loc><image:title>Sensitive data being stolen from digital document. Digital illustration.</image:title><image:caption>Sensitive data being stolen from digital document. Digital illustration.</image:caption></image:image><lastmod>2022-01-02T15:31:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/03/31/caricom-public-law-podcast-cybersecurity-and-digital-ids/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/05/41x4auzyqs._sl500_.jpg</image:loc><image:title>41x4a+uZYqS._SL500_</image:title></image:image><lastmod>2022-01-02T12:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/11/20/five-cybersecurity-takeaways-from-the-arin-48-keynote-and-panel/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/11/arin.jpeg</image:loc><image:title>ARIN</image:title></image:image><lastmod>2021-11-20T08:37:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/03/04/2021-isaca-technology-for-humanity-award/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/03/lg-global-achievements.png</image:loc></image:image><lastmod>2021-11-05T06:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/11/04/arin-48-evolving-cybersecurity-strategies-for-the-new-normal/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/11/screenshot-2021-11-04-at-21.56.18.png</image:loc><image:title>Screenshot 2021-11-04 at 21.56.18</image:title></image:image><lastmod>2021-11-04T22:02:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/04/13/feature-address-at-the-afralti-child-online-protection-cop-virtual-workshop/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/04/screenshot-2021-04-13-at-13.02.56.png</image:loc><image:title>Screenshot 2021-04-13 at 13.02.56</image:title></image:image><lastmod>2021-10-23T12:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/05/20/arin-caribnog-technical-community-forum/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/10/screenshot-2021-10-23-at-13.49.12.png</image:loc><image:title>Screenshot 2021-10-23 at 13.49.12</image:title></image:image><lastmod>2021-10-23T12:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2021/04/13/cloud-fundamentals-study-guide/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2021/09/screenshot-2021-09-16-at-18.19.01.png</image:loc><image:title>Screenshot 2021-09-16 at 18.19.01</image:title></image:image><lastmod>2021-09-16T22:23:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/12/18/blockchain-framework-and-guidance/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/12/screenshot-2020-12-18-at-10.54.40.png</image:loc><image:title>Screenshot 2020-12-18 at 10.54.40</image:title></image:image><lastmod>2020-12-18T10:07:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/05/09/is-bitcoin/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/05/bitcoin.jpg</image:loc><image:title>bitcoin</image:title></image:image><lastmod>2020-12-18T09:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/02/10/towards-the-single-telecoms-market-analyzing-the-performance-of-the-body-of-european-regulators-for-electronic-communications-berec/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/02/berec.jpg</image:loc><image:title>BEREC</image:title></image:image><lastmod>2020-12-18T09:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/04/15/ict-pulse-cyber-threats-and-security-in-the-caribbean-2016-update-qa-with-niel-harper/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/04/cyber-security.jpg</image:loc><image:title>cyber security</image:title></image:image><lastmod>2020-12-18T09:45:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/07/01/does-icanns-udrp-preserve-free-speech-and-allow-room-for-criticism/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/07/dot-sucks-600x400.jpg</image:loc><image:title>dot-sucks-600x400</image:title></image:image><lastmod>2020-12-18T09:43:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/04/05/expert-insights-1-cyber-threats-and-security-in-the-caribbean-2017-update/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/04/lock-2017.jpg</image:loc><image:title>lock-2017</image:title></image:image><lastmod>2020-12-18T09:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/05/11/8-reasons-why-cybersecurity-strategy-and-business-operations-are-inseparable/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/05/cyber_security_strategy.jpg</image:loc><image:title>cyber_security_strategy</image:title></image:image><lastmod>2020-12-18T09:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/07/21/internet-infrastructure-security-guidelines-for-africa/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/screenshot-2020-11-29-at-16.31.06.png</image:loc><image:title>Screenshot 2020-11-29 at 16.31.06</image:title></image:image><lastmod>2020-12-18T09:38:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/06/10/internet-infrastructure-security-in-africa/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/gaborone.jpeg</image:loc><image:title>gaborone</image:title></image:image><lastmod>2020-12-18T09:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2019/07/05/no-more-obscurity/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/wef-2019.jpeg</image:loc><image:title>WEF-2019</image:title></image:image><lastmod>2020-11-29T22:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/10/14/cybersecurity-risks-progress-and-the-way-forward-in-latin-america-the-caribbean/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/isoc-cyber-1.jpeg</image:loc><image:title>ISOC-Cyber</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/isoc-cyber-e1606661494542.jpeg</image:loc><image:title>ISOC-Cyber</image:title></image:image><lastmod>2020-11-29T17:53:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/11/03/the-roles-of-digital-currencies-and-cryptocurrencies-in-central-banks/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/11/uwi-crypto.jpeg</image:loc><image:title>UWI-Crypto</image:title></image:image><lastmod>2020-11-29T15:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/07/29/the-cost-of-1gb-of-mobile-data-why-it-matters/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/07/mobile-data.jpeg</image:loc><image:title>mobile data</image:title></image:image><lastmod>2020-07-29T06:07:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/04/20/what-do-great-airports-and-great-cybersecurity-have-in-common/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/04/hkg.jpg</image:loc><image:title>HKG</image:title></image:image><lastmod>2020-06-20T07:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2020/04/21/cybersecurity-pros-are-badly-in-need-of-mentors-and-heres-why/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2020/04/img_20200421_072509.jpg</image:loc><image:title>IMG_20200421_072509</image:title></image:image><lastmod>2025-01-21T18:41:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2019/08/19/facts-vs-fiction-whats-the-right-to-be-forgotten-really-about/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2019/08/erase-past.jpeg</image:loc><image:title>erase-past</image:title></image:image><lastmod>2019-08-19T09:04:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/02/19/should-we-fear-the-era-of-ubiquitous-computing/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/02/online-privacy-illustration.jpg</image:loc><image:title>Eye Looking Over Person On Computer</image:title></image:image><lastmod>2018-12-18T10:11:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2018/03/10/what-is-a-virtual-ciso-when-and-why-should-you-hire-one/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2018/03/virtual-ciso-250x250.jpg</image:loc><image:title>Cyber security concept on virtual screen,  consultant presentation</image:title><image:caption>Cyber security concept on virtual screen with a consultant doing presentation in the background</image:caption></image:image><lastmod>2018-10-27T02:12:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2018/06/26/the-impact-of-the-gdpr-on-the-hospitality-sector/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2018/07/gdpr-link.jpg</image:loc><image:title>gdpr-link</image:title></image:image><lastmod>2018-10-27T02:11:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2018/08/01/should-it-be-mandatory-for-cisos-to-be-part-of-the-board-of-directors/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2018/08/ciso.jpeg</image:loc><image:title>CISO</image:title></image:image><lastmod>2018-10-27T02:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2017/02/03/from-fragmentation-to-integration-to-harmonization-outlining-the-requirements-for-an-effective-cyber-crime-approach-across-caricom-states/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2017/02/internet-law.png</image:loc><image:title>internet-law</image:title></image:image><lastmod>2025-03-04T06:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/02/14/shifting-the-balance-of-power-in-the-personal-data-ecosystem/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/02/data-privacy.png</image:loc><image:title>data privacy</image:title></image:image><lastmod>2017-02-03T22:48:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/03/27/why-the-ietf-and-open-standards-matter/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/03/ietf90-plenary-450.jpg</image:loc><image:title>ietf90-plenary-450</image:title></image:image><lastmod>2017-02-03T22:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/11/02/can-traditional-policy-and-regulatory-frameworks-satisfactorily-address-the-internets-public-policy-issues/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/11/internet-law.jpeg</image:loc><image:title>Internet law</image:title></image:image><lastmod>2017-02-03T22:45:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/11/04/the-chilling-effects-of-pervasive-government-surveillance/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/11/freedom.jpeg</image:loc><image:title>freedom</image:title></image:image><lastmod>2017-02-03T22:44:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2015/11/21/multilateralism-vs-multistakeholderism-is-it-one-or-the-other/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2015/11/plenary.jpg</image:loc><image:title>Francois HOLLANDE - President of The French REPUBLIC Republic</image:title><image:caption>Official Visit of the President of France to the European Parliament in Strasbourg</image:caption></image:image><lastmod>2017-02-03T22:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/10/14/the-role-of-governments-in-ensuring-a-consistent-legal-framework-for-internet-governance/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/10/multi1.png</image:loc><image:title>multi</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/10/multi.png</image:loc><image:title>multi</image:title></image:image><lastmod>2017-02-03T22:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2016/06/30/2015-kpmg-banking-in-bermuda-magazine/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2016/06/screen-shot-2016-06-29-at-10-44-12-am.png</image:loc><image:title>Screen Shot 2016-06-29 at 10.44.12 AM</image:title></image:image><lastmod>2017-02-03T22:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/blog/</loc><lastmod>2016-05-27T18:35:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nielharper.com/2014/07/09/network-operators-and-the-profiteering-games-they-play/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/07/net-neutrality.jpg</image:loc><image:title>net-neutrality</image:title></image:image><lastmod>2015-06-09T00:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/11/24/nokia-corporation-planning-the-next-bounceback/</loc><lastmod>2015-04-14T11:04:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/11/22/how-secure-is-barbados-new-centralized-healthcare-information-system/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/11/health.jpg</image:loc><image:title>health</image:title></image:image><lastmod>2014-11-23T01:57:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/02/11/the-new-age-of-the-unregulated-algorithm/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/02/algorithm.jpg</image:loc><image:title>algorithm</image:title></image:image><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/02/images.jpeg</image:loc><image:title>images.jpeg</image:title></image:image><lastmod>2014-11-08T12:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/10/26/navigating-the-cloud-smes-and-cloud-services/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/10/cloud-computing-cap.jpg</image:loc><image:title>Cloud-Computing-cap</image:title></image:image><lastmod>2014-10-27T14:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/03/05/expert-insight-1-cyber-threats-and-security-in-the-caribbean-2014-update/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/03/network-security.jpg</image:loc><image:title>Lock background</image:title></image:image><lastmod>2014-07-10T03:04:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2014/04/25/the-narcissistic-entrepreneur/</loc><image:image><image:loc>https://nielharper.com/wp-content/uploads/2014/04/narcissism.jpg</image:loc><image:title>Narcissism</image:title></image:image><lastmod>2014-07-10T02:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/11/24/regulators-see-value-in-bitcoin-and-other-digital-currencies/</loc><lastmod>2013-11-24T15:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/11/24/how-somebody-forced-the-worlds-internet-traffic-through-belarus-and-iceland/</loc><lastmod>2013-11-24T15:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/10/30/the-real-privacy-problem/</loc><lastmod>2013-10-30T06:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/07/13/migration-to-ipv6-is-imperative-or-is-it/</loc><lastmod>2013-10-30T06:40:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/10/05/locked-up-for-linking-us-journalist-faces-prosecution/</loc><lastmod>2013-10-05T07:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/07/31/googles-apparent-u-turn-on-net-neutrality-raises-definition-issues-and-questions-about-content-filtering-and-consumer-freedoms/</loc><lastmod>2013-07-31T16:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/07/17/are-security-professionals-over-confident-in-defense-in-depth/</loc><lastmod>2013-07-17T00:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/06/29/solution-to-nsa-overreach-put-people-in-charge-of-their-own-data/</loc><lastmod>2013-06-29T10:38:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/06/28/snapchat-allows-you-to-send-messages-and-photos-that-quickly-disappear/</loc><lastmod>2013-06-28T10:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/06/28/the-social-media-wars-game-of-thrones-style/</loc><lastmod>2013-06-28T10:32:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/06/13/those-billionaires-were-pretty-slick-with-their-crude-lie-and-were-too-thick-to-notice/</loc><lastmod>2013-06-13T23:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/06/13/escape-your-search-engine-an-illustrative-definition-of-the-filter-bubble/</loc><lastmod>2013-06-13T23:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/05/22/class-of-2013-your-degree-doesnt-mean-squat/</loc><lastmod>2013-05-22T11:54:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com/2013/05/20/39/</loc><lastmod>2013-05-21T00:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nielharper.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-25T08:51:58+00:00</lastmod></url></urlset>
