<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://nayangoel.com/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blogs</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/seo-images</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/future-of-ai-security-challenges-opportunities</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/defense-in-depth-building-resilient-systems-in-the-modern-threat-landscape</loc>
    <lastmod>2026-03-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-breaking-down-security-silos-for-modern-development</loc>
    <lastmod>2026-03-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-secure-code-essential-software-engineering-best-practices</loc>
    <lastmod>2026-03-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-from-anomaly-detection-to-ai-powered-threats</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-a-devsecops-guide-to-modern-cloud-security</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/cloud-security-protecting-your-digital-assets-in-the-modern-era</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-technical-career-roadmap</loc>
    <lastmod>2026-03-06</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-protecting-machine-learning-systems-from-emerging-threats</loc>
    <lastmod>2026-03-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-powered-cybersecurity-building-intelligent-defense-systems</loc>
    <lastmod>2026-03-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-code-essential-software-engineering-practices-for-2024</loc>
    <lastmod>2026-03-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-your-new-digital-security-guardian</loc>
    <lastmod>2026-03-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-defending-against-the-double-edged-sword-of-intelligence</loc>
    <lastmod>2026-02-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-engineering-beyond-compliance-to-trust-architecture</loc>
    <lastmod>2026-02-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-cybersecurity-blueprint-for-the-future</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-building-defense-for-the-unknown</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-web-development-building-applications-that-won-t-break</loc>
    <lastmod>2026-02-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-in-the-modern-era-a-developer-s-guide-to-building-trust</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-future-a-security-engineer-s-guide-to-emerging-tech</loc>
    <lastmod>2026-02-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-essential-security-practices-for-modern-development</loc>
    <lastmod>2026-02-21</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-shifting-security-left-in-your-development-pipeline</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-fortress-code-security-first-software-engineering-practices</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/software-engineering-best-practices-building-secure-maintainable-code</loc>
    <lastmod>2026-02-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-security-into-code-a-developer-s-guide-to-defensive-programming</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-engineering-beyond-compliance-to-trust</loc>
    <lastmod>2026-02-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-security-first-applications-a-developer-s-essential-guide</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-security-first-approach</loc>
    <lastmod>2026-02-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-in-the-age-of-big-data-a-developer-s-guide</loc>
    <lastmod>2026-02-06</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-shifting-left-to-build-security-into-your-pipeline</loc>
    <lastmod>2026-02-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/machine-learning-in-cybersecurity-beyond-the-hype</loc>
    <lastmod>2026-02-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-developer-s-roadmap-to-infosec</loc>
    <lastmod>2026-02-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-a-guide-to-modern-cloud-security-architecture</loc>
    <lastmod>2026-02-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-web-development-building-fortresses-not-houses-of-cards</loc>
    <lastmod>2026-01-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-tech-a-blueprint-for-tomorrow-s-threats</loc>
    <lastmod>2026-01-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-bulletproof-code-essential-software-engineering-best-practices</loc>
    <lastmod>2026-01-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/cloud-security-defending-digital-assets-in-the-sky</loc>
    <lastmod>2026-01-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-building-security-into-your-development-dna</loc>
    <lastmod>2026-01-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/cloud-security-engineering-trust-in-distributed-infrastructure</loc>
    <lastmod>2026-01-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-building-security-into-every-line-of-code</loc>
    <lastmod>2026-01-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-web-development-building-defense-into-your-code</loc>
    <lastmod>2026-01-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-a-security-engineer-s-guide-to-modern-threats</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-ai-from-model-poisoning-to-production-defense</loc>
    <lastmod>2026-01-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-security-engineer-s-roadmap</loc>
    <lastmod>2026-01-21</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-fortress-code-essential-software-engineering-best-practices</loc>
    <lastmod>2026-01-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-tech-professional-s-roadmap-to-success</loc>
    <lastmod>2026-01-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-shifting-left-to-build-security-into-your-development-pipeline</loc>
    <lastmod>2026-01-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-by-design-building-web-apps-that-hackers-can-t-break</loc>
    <lastmod>2026-01-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-beyond-the-hype-into-real-world-defense</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-by-design-software-engineering-best-practices-that-matter</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/cloud-security-engineering-trust-in-distributed-systems</loc>
    <lastmod>2026-01-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-by-design-building-secure-systems-that-protect-users</loc>
    <lastmod>2026-01-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/machine-learning-in-cybersecurity-from-promise-to-practice</loc>
    <lastmod>2026-01-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-ai-systems-the-new-frontier-of-cybersecurity</loc>
    <lastmod>2026-01-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-from-threat-detection-to-adversarial-defense</loc>
    <lastmod>2026-01-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-in-the-digital-age-a-developer-s-essential-guide</loc>
    <lastmod>2026-01-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-security-first-approach-to-innovation</loc>
    <lastmod>2026-01-06</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-web-development-building-defense-into-every-line-of-code</loc>
    <lastmod>2026-01-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-by-design-building-privacy-first-applications</loc>
    <lastmod>2026-01-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/code-that-stands-the-test-of-time-essential-software-engineering-practices</loc>
    <lastmod>2026-01-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-defending-the-future-of-intelligent-systems</loc>
    <lastmod>2026-01-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/security-first-web-development-building-resilient-applications</loc>
    <lastmod>2026-01-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-breaking-down-silos-to-build-secure-software-at-scale</loc>
    <lastmod>2025-12-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-by-design-building-web-apps-that-hackers-fear</loc>
    <lastmod>2025-12-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-a-developer-s-guide-to-cloud-security-best-practices</loc>
    <lastmod>2025-12-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-privacy-first-systems-a-developer-s-guide-to-data-protection</loc>
    <lastmod>2025-12-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-future-a-guide-to-emerging-technology-security</loc>
    <lastmod>2025-12-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-defending-the-intelligence-revolution</loc>
    <lastmod>2025-12-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-engineering-trust-in-the-digital-age</loc>
    <lastmod>2025-12-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-future-a-guide-to-emerging-technology-vulnerabilities</loc>
    <lastmod>2025-12-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-defending-against-the-next-generation-of-cyber-threats</loc>
    <lastmod>2025-12-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-shifting-security-left-in-modern-software-development</loc>
    <lastmod>2025-12-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-from-threat-detection-to-adversarial-attacks</loc>
    <lastmod>2025-12-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/security-first-software-engineering-best-practices-that-actually-work</loc>
    <lastmod>2025-12-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-security-engineer-s-guide</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-shifting-security-left-for-modern-development</loc>
    <lastmod>2025-12-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/devsecops-building-security-into-your-development-pipeline</loc>
    <lastmod>2025-12-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-the-cloud-a-engineer-s-guide-to-modern-cloud-computing</loc>
    <lastmod>2025-12-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-by-design-building-trust-in-the-age-of-digital-surveillance</loc>
    <lastmod>2025-12-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-developer-s-strategic-roadmap</loc>
    <lastmod>2025-12-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-from-threat-detection-to-adaptive-defense</loc>
    <lastmod>2025-12-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-tech-from-iot-to-ai-a-security-engineer-s-guide</loc>
    <lastmod>2025-12-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-in-modern-applications-a-developer-s-complete-guide</loc>
    <lastmod>2025-12-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-ai-defending-against-the-next-generation-of-cyber-threats</loc>
    <lastmod>2025-12-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/data-privacy-engineering-beyond-compliance-to-trust-centric-design</loc>
    <lastmod>2025-12-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-dev-s-guide-to-security-careers</loc>
    <lastmod>2025-12-06</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-ai-the-new-frontier-of-cybersecurity-challenges</loc>
    <lastmod>2025-12-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-tech-beyond-traditional-security-paradigms</loc>
    <lastmod>2025-12-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-web-development-building-defense-into-every-layer</loc>
    <lastmod>2025-12-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/machine-learning-in-cybersecurity-from-threat-detection-to-defense</loc>
    <lastmod>2025-12-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-beyond-traditional-cybersecurity</loc>
    <lastmod>2025-11-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-developer-s-roadmap-to-infosec-success</loc>
    <lastmod>2025-11-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-tech-professional-s-roadmap</loc>
    <lastmod>2025-11-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-ai-the-hidden-attack-vectors-in-machine-learning-systems</loc>
    <lastmod>2025-11-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ml-in-cybersecurity-from-threat-detection-to-automated-response</loc>
    <lastmod>2025-11-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/cloud-security-beyond-the-shared-responsibility-model</loc>
    <lastmod>2025-11-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/secure-by-design-building-web-apps-that-resist-modern-threats</loc>
    <lastmod>2025-11-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/ai-security-defending-against-the-double-edged-sword-of-modern-tech</loc>
    <lastmod>2025-11-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/securing-emerging-technologies-a-modern-security-engineer-s-guide</loc>
    <lastmod>2025-11-21</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-security-into-code-a-developer-s-guide-to-cyber-defense</loc>
    <lastmod>2025-11-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-security-first-applications-a-developer-s-practical-guide</loc>
    <lastmod>2025-11-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/breaking-into-cybersecurity-a-developer-s-strategic-career-guide</loc>
    <lastmod>2025-11-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/building-security-first-the-developer-s-guide-to-defensive-coding</loc>
    <lastmod>2025-11-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://nayangoel.com/blog/machine-learning-in-cybersecurity-from-detection-to-defense</loc>
    <lastmod>2025-11-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
</urlset>