<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://aerissecure.com/blog/heartbleed-hanging-on/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/cyber-attacks-emergency-preparedness/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/weekly-wrap-up-oct-10-2014/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/get-started/</loc></url><url><loc>https://aerissecure.com/blog/data-breach-statistics/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/challenges-of-pci-compliant-multi-factor-authentication/</loc><lastmod>2023-10-04</lastmod></url><url><loc>https://aerissecure.com/blog/pci-policy-documentation/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/toss-c3-interview-cyber-securit-and-compliance-for-smbs/</loc><lastmod>2017-05-30</lastmod></url><url><loc>https://aerissecure.com/resources/presentations/</loc></url><url><loc>https://aerissecure.com/contact/</loc></url><url><loc>https://aerissecure.com/resources/</loc></url><url><loc>https://aerissecure.com/blog/web-application-session-auditing-part-1-intro/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/web-application-session-auditing-part-2-recon/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/resources/presentations/issa-compliance-tools/</loc></url><url><loc>https://aerissecure.com/resources/presentations/pci-101/</loc></url><url><loc>https://aerissecure.com/blog/heartbleed-0-day-vuln-in-openssl/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/pci-saq-forms-explained/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/shellshock-bash-vulnerability/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/about/</loc></url><url><loc>https://aerissecure.com/blog/AV-Dead/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/my-software-is-end-of-support-who-cares/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/texas-health-provider-suffers-ransomware-attack/</loc><lastmod>2017-04-11</lastmod></url><url><loc>https://aerissecure.com/blog/pci-task-calendar/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/smb-data-breach-fallout/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/mastercard-requires-qsa-or-isa-for-level-two-merchants/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/i-have-vulnerabilities-on-my-lan-so-what/</loc><lastmod>2015-11-13</lastmod></url><url><loc>https://aerissecure.com/blog/the-rising-cyber-threat-to-small-business-lunch-learn/</loc><lastmod>2015-11-11</lastmod></url><url><loc>https://aerissecure.com/blog/SAQ-B-Explained/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/weekly-wrap-up-10-3-2014/</loc><lastmod>2015-11-11</lastmod></url><url><loc>https://aerissecure.com/</loc></url><url><loc>https://aerissecure.com/blog/seattle-office/</loc><lastmod>2017-05-30</lastmod></url><url><loc>https://aerissecure.com/services/pci-compliance/</loc></url><url><loc>https://aerissecure.com/blog/forbes-interview-how-can-small-business-protect-themselves-from-a-cyber-attack/</loc><lastmod>2017-04-11</lastmod></url><url><loc>https://aerissecure.com/blog/pci-compliance-without-cardholder-data/</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://aerissecure.com/blog/it-risk-assessment/</loc><lastmod>2017-04-03</lastmod></url><url><loc>https://aerissecure.com/blog/pci-terminology/</loc><lastmod>2020-03-23</lastmod></url><url><loc>https://aerissecure.com/careers/</loc></url><url><loc>https://aerissecure.com/services/</loc></url><url><loc>https://aerissecure.com/blog/web-application-session-auditing/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/everyday-cybercrime-and-what-you-can-do/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/cmmc-assessment/</loc></url><url><loc>https://aerissecure.com/blog/one-more-week-to-qed/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/services/soc-reporting/</loc></url><url><loc>https://aerissecure.com/blog/pci-frequently-asked-questions-faq/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/SAQ-A-Explained/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/navigating-pci-compliance-with-ace/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/wi-fi-for-smb-things-to-consider/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/passwords-underpants/</loc><lastmod>2015-11-13</lastmod></url><url><loc>https://aerissecure.com/blog/survey-says/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/bus-factor/</loc><lastmod>2015-11-11</lastmod></url><url><loc>https://aerissecure.com/services/penetration-testing/</loc></url><url><loc>https://aerissecure.com/blog/microsoft-my-bulletins-pci-compliance/</loc><lastmod>2016-04-19</lastmod></url><url><loc>https://aerissecure.com/blog/SAQ-CVT-Explained/</loc><lastmod>2015-11-17</lastmod></url><url><loc>https://aerissecure.com/blog/june-QED/</loc><lastmod>2015-11-11</lastmod></url><url><loc>https://aerissecure.com/blog/bakinging-regulation-penetration-testing/</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://aerissecure.com/blog/</loc></url><url><loc>https://aerissecure.com/blog/due-diligence-checklist/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/weekly-wrap-up-sept-5-2014/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/weekly-wrap-up-sept-12-2014/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/old-vs-new-a-comparison-of-magnetic-stripe-and-chip-and-pin/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/vulnerability-scanning-from-aws/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://aerissecure.com/resources/presentations/how-web-apps-break/</loc></url><url><loc>https://aerissecure.com/certificate-verification/</loc></url><url><loc>https://aerissecure.com/blog/dallas-office/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/blog/dq-data-breach-impacts-az-business-owners/</loc><lastmod>2017-02-16</lastmod></url><url><loc>https://aerissecure.com/blog/web-application-session-auditing-part-3-exploitation/</loc><lastmod>2017-03-28</lastmod></url><url><loc>https://aerissecure.com/pentest/device/</loc></url><url><loc>https://aerissecure.com/blog/33-stores-affect-in-pf-changs-data-breach/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/blog/weekly-wrap-up-aug-29-2014/</loc><lastmod>2015-11-19</lastmod></url><url><loc>https://aerissecure.com/resources/presentations/the-rising-cyber-threat-to-small-business/</loc></url>
</urlset>
