<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.securityblueprintsociety.com/home</loc>
    <lastmod>2026-01-12T20:52:20+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/</loc>
    <changefreq>daily</changefreq>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog</loc>
    <lastmod>2026-01-23T10:14:56+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog/how-to-think-about-threat-modeling-for-ai-and-llm-applications</loc>
    <lastmod>2026-03-11T11:10:42+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog/why-ai-threat-modeling-fails-at-the-architecture-layer</loc>
    <lastmod>2026-02-20T09:00:31+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog/how-to-redesign-trust-in-edge-computing</loc>
    <lastmod>2026-02-20T08:48:53+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog/why-clawdbot-and-moltbot-are-seen-as-security-nightmares</loc>
    <lastmod>2026-02-18T04:55:45+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog?tag=ai+security</loc>
    <lastmod>2026-01-23T10:14:56+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog?tag=llm+security</loc>
    <lastmod>2026-01-23T10:14:56+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog?tag=cybersecurity</loc>
    <lastmod>2026-01-23T10:14:56+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/blog?tag=security+blog</loc>
    <lastmod>2026-01-23T10:14:56+00:00</lastmod>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/store</loc>
    <changefreq>daily</changefreq>
  </url>
  <url>
    <loc>https://www.securityblueprintsociety.com/newsletters/security-blueprint</loc>
    <lastmod>2025-10-29T23:45:00+00:00</lastmod>
  </url>
</urlset>
