<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.hackwednesday.com</loc>
<lastmod>2026-04-03T04:54:46.168Z</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/about</loc>
<lastmod>2026-04-03T04:54:46.169Z</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog</loc>
<lastmod>2026-04-03T04:54:46.169Z</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources</loc>
<lastmod>2026-04-03T04:54:46.169Z</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/nist-ai-agent-identity-and-authorization-security-teams</loc>
<lastmod>2026-04-01</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/openai-safety-bug-bounty-agent-security</loc>
<lastmod>2026-04-01</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/rsac-2026-agent-security-runtime-controls</loc>
<lastmod>2026-04-01</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/anthropic-claude-code-source-leak-security-lessons</loc>
<lastmod>2026-03-31</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/how-security-teams-can-use-claude-code</loc>
<lastmod>2026-03-31</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/litellm-security-incident-response-lessons</loc>
<lastmod>2026-03-31</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/recent-supply-chain-attacks-trivy-axios-best-practices</loc>
<lastmod>2026-03-31</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/enhancing-security-command-centers-with-openai-sora</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/navigating-the-digital-landscape-in-2025</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/the-playbook-for-security-incident-aftermath</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/blog/what-anthropics-reported-mythos-moment-means-for-cybersecurity-teams</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/ai-security-command-centers</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/best-free-local-password-manager-for-developers</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/best-password-manager-for-privacy-focused-users</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/bug-bounty-in-the-ai-era</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/how-to-choose-between-local-and-cloud-password-managers</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/keepassxc-best-free-local-password-manager</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/keepassxc-vs-bitwarden-for-security-conscious-users</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/llm-model-comparison-for-appsec-teams</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/llm-model-comparison-for-incident-response</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/llm-model-comparison-for-soc-teams</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/nvidia-gtc-2026-security-ai-takeaways</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/offline-first-password-manager-for-security-teams</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.hackwednesday.com/resources/security-leadership-for-ai-adoption</loc>
<lastmod>2026-03-29</lastmod>
</url>
</urlset>
