<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.csri.info/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.csri.info/cctv-surveillance-for-the-community-by-the-community/</loc><lastmod>2015-06-25T15:38:32+00:00</lastmod></url><url><loc>https://www.csri.info/hunt-for-russias-web-criminals/</loc><lastmod>2015-06-25T15:38:32+00:00</lastmod></url><url><loc>https://www.csri.info/old-photo-copier-spills-defence-documents/</loc><lastmod>2015-06-25T15:38:32+00:00</lastmod></url><url><loc>https://www.csri.info/malicious-software-primer/</loc><lastmod>2015-06-25T15:38:32+00:00</lastmod></url><url><loc>https://www.csri.info/data-awareness/</loc><lastmod>2015-06-25T15:40:12+00:00</lastmod></url><url><loc>https://www.csri.info/password-policy/</loc><lastmod>2015-06-25T15:40:11+00:00</lastmod></url><url><loc>https://www.csri.info/phishing/</loc><lastmod>2015-06-25T16:15:33+00:00</lastmod></url><url><loc>https://www.csri.info/data-protection-laws-in-uk-and-europe/</loc><lastmod>2015-06-25T16:15:33+00:00</lastmod></url><url><loc>https://www.csri.info/consumerisation-what-it-is-and-how-to-protect-your-company-from-it/</loc><lastmod>2015-06-25T16:15:33+00:00</lastmod></url><url><loc>https://www.csri.info/trojans-the-basics/</loc><lastmod>2015-06-25T16:15:33+00:00</lastmod></url><url><loc>https://www.csri.info/the-computer-virus-a-history/</loc><lastmod>2015-06-25T16:15:32+00:00</lastmod></url><url><loc>https://www.csri.info/if-its-not-patched-its-got-holes/</loc><lastmod>2015-06-25T16:15:31+00:00</lastmod></url><url><loc>https://www.csri.info/western-critical-infrastructure-vulnerable-to-stuxnet-style-attack-warns-report/</loc><lastmod>2015-06-25T16:15:31+00:00</lastmod></url><url><loc>https://www.csri.info/uk-critical-systems-report/</loc><lastmod>2015-06-25T16:15:30+00:00</lastmod></url><url><loc>https://www.csri.info/ghosts-from-the-machines/</loc><lastmod>2015-06-29T22:25:33+00:00</lastmod></url><url><loc>https://www.csri.info/britains-utility-companies-wide-open-to-cyber-attack/</loc><lastmod>2015-06-25T16:15:28+00:00</lastmod></url><url><loc>https://www.csri.info/csri-works-with-the-sunday-times-on-its-investigation-into-the-sony-playstation-hack/</loc><lastmod>2015-06-25T16:15:28+00:00</lastmod></url><url><loc>https://www.csri.info/comment-on-playstation-hack-for-voice-of-america/</loc><lastmod>2015-06-25T16:15:28+00:00</lastmod></url><url><loc>https://www.csri.info/the-register-cover-csris-ghosts-from-the-machines-report/</loc><lastmod>2015-06-25T16:15:28+00:00</lastmod></url><url><loc>https://www.csri.info/insight-from-the-csri-on-the-governments-cybercrime-strategy/</loc><lastmod>2015-06-25T16:15:16+00:00</lastmod></url><url><loc>https://www.csri.info/calls-for-changes-to-governments-use-of-internet-lead-by-csri-research-article-widely-sourced-on-web/</loc><lastmod>2015-06-25T16:15:16+00:00</lastmod></url><url><loc>https://www.csri.info/legal-problems-loom-for-the-cloud/</loc><lastmod>2015-06-25T16:15:15+00:00</lastmod></url><url><loc>https://www.csri.info/pwcs-report-delusions-of-safety-the-cyber-savvy-ceo-getting-to-grips-with-todays-growing-cyber-threats/</loc><lastmod>2015-06-25T16:15:30+00:00</lastmod></url><url><loc>https://www.csri.info/recession-leads-to-fraud-and-crime-turnkey-consulting/</loc><lastmod>2015-06-25T15:39:35+00:00</lastmod></url><url><loc>https://www.csri.info/data-loss-a-massive-issue-dimension-data/</loc><lastmod>2015-06-25T16:15:30+00:00</lastmod></url><url><loc>https://www.csri.info/new-payment-methods-and-financial-crime-risks-world-check-thomson-reuters/</loc><lastmod>2015-06-25T16:15:28+00:00</lastmod></url><url><loc>https://www.csri.info/2011-global-encryption-trends-study-sponsored-by-thales/</loc><lastmod>2015-06-25T16:15:16+00:00</lastmod></url><url><loc>https://www.csri.info/cybercrime-futures-avg/</loc><lastmod>2016-09-02T19:24:47+00:00</lastmod></url><url><loc>https://www.csri.info/malicious-software-primer/</loc><lastmod>2015-06-25T15:40:12+00:00</lastmod></url><url><loc>https://www.csri.info/abandon-bankrupt-idea-of-data-castles/</loc><lastmod>2015-06-25T16:15:15+00:00</lastmod></url><url><loc>https://www.csri.info/phone-hacking-why-everyones-to-blame/</loc><lastmod>2015-06-25T16:15:31+00:00</lastmod></url><url><loc>https://www.csri.info/nasa-cybersecurity-an-examination-of-the-agencys-information-security/</loc><lastmod>2015-06-25T16:15:16+00:00</lastmod></url><url><loc>https://www.csri.info/mcafee-report-operation-shady-rat/</loc><lastmod>2015-06-25T16:15:29+00:00</lastmod></url><url><loc>https://www.csri.info/dispelling-the-myths-surrounding-de-identification/</loc><lastmod>2015-06-25T16:15:32+00:00</lastmod></url><url><loc>https://www.csri.info/gary-mckinnon-was-unlucky-hes-not-even-a-very-good-hacker/</loc><lastmod>2024-08-28T14:34:42+00:00</lastmod></url><url><loc>https://www.csri.info/mobile-payments-trust-in-the-cloud-or-trust-in-the-phone/</loc><lastmod>2016-05-12T18:22:46+00:00</lastmod></url><url><loc>https://www.csri.info/uk-encryption-trends-study/</loc><lastmod>2016-05-12T18:07:11+00:00</lastmod></url><url><loc>https://www.csri.info/a-blueprint-for-secure-mobile-workspaces/</loc><lastmod>2016-05-12T18:45:59+00:00</lastmod></url><url><loc>https://www.csri.info/us-to-target-chinese-apt-hackers/</loc><lastmod>2016-08-03T15:36:23+00:00</lastmod></url><url><loc>https://www.csri.info/8034-2/</loc><lastmod>2016-04-05T01:37:33+00:00</lastmod></url><url><loc>https://www.csri.info/russian-state-in-cyber-spy-claims/</loc><lastmod>2016-04-05T01:52:02+00:00</lastmod></url><url><loc>https://www.csri.info/north-korea-nothing-to-fear/</loc><lastmod>2016-04-05T01:58:32+00:00</lastmod></url><url><loc>https://www.csri.info/kaspersky-report-into-russian-cybercriminals-theyre-in-it-for-money/</loc><lastmod>2016-03-31T15:22:59+00:00</lastmod></url><url><loc>https://www.csri.info/research-finds-top-politicians-easy-targets-for-hackers/</loc><lastmod>2016-04-01T15:47:54+00:00</lastmod></url><url><loc>https://www.csri.info/the-data-retention-and-investigatory-powers-act-reasons-for-and-against/</loc><lastmod>2016-04-05T02:01:53+00:00</lastmod></url><url><loc>https://www.csri.info/the-data-retention-and-investigatory-powers-act-reasons-for-and-against-the-threat-to-law-and-order/</loc><lastmod>2016-04-05T02:01:20+00:00</lastmod></url><url><loc>https://www.csri.info/experts-fear-emergence-of-radicalised-islamic-hackers/</loc><lastmod>2016-08-31T15:36:32+00:00</lastmod></url><url><loc>https://www.csri.info/is-the-psychological-response-forced-by-war-aims/</loc><lastmod>2016-10-27T17:37:56+00:00</lastmod></url><url><loc>https://www.csri.info/is-the-changing-presentation-in-cyberspace/</loc><lastmod>2016-08-24T19:44:09+00:00</lastmod></url><url><loc>https://www.csri.info/russian-crime-software-epidemic-holds-company-databases-to-ransom/</loc><lastmod>2016-09-03T13:32:18+00:00</lastmod></url><url><loc>https://www.csri.info/russian-cyber-ransom-software-selling-for-only-30-on-the-darkweb/</loc><lastmod>2016-09-03T13:34:37+00:00</lastmod></url><url><loc>https://www.csri.info/8644-2/</loc><lastmod>2016-09-22T11:30:25+00:00</lastmod></url><url><loc>https://www.csri.info/suffolk-police-commissioner-on-the-war-against-cybercrime/</loc><lastmod>2016-09-22T09:50:40+00:00</lastmod></url><url><loc>https://www.csri.info/satellite-wars-the-nation-state-battle-for-earths-space/</loc><lastmod>2016-11-18T14:04:02+00:00</lastmod></url><url><loc>https://www.csri.info/fake-news-when-states-try-to-hack-peoples-brains/</loc><lastmod>2019-03-05T20:05:22+00:00</lastmod></url><url><loc>https://www.csri.info/ransomware-whos-to-blame-for-biggest-ever-security-lapse/</loc><lastmod>2019-04-24T03:06:06+00:00</lastmod></url><url><loc>https://www.csri.info/autism-bane-or-boon-for-a-career-in-cyber-security/</loc><lastmod>2017-08-21T17:09:47+00:00</lastmod></url><url><loc>https://www.csri.info/police-fears-over-online-toys-and-devices/</loc><lastmod>2019-04-24T03:04:26+00:00</lastmod></url><url><loc>https://www.csri.info/gchq-warns-kaspersky-anti-virus-may-leak-state-secrets-to-russia/</loc><lastmod>2019-04-24T03:10:19+00:00</lastmod></url><url><loc>https://www.csri.info/trump-hotel-rooms-were-wide-open-to-hackers/</loc><lastmod>2019-04-24T04:52:56+00:00</lastmod></url><url><loc>https://www.csri.info/cyber-czar-warns-of-hacking-threat-to-uk-business/</loc><lastmod>2019-04-24T03:00:27+00:00</lastmod></url><url><loc>https://www.csri.info/dating-sites-mask-internet-criminals/</loc><lastmod>2025-05-23T21:51:17+00:00</lastmod></url><url><loc>https://www.csri.info/csris-business-guide-to-the-uks-burning-cyber-security-issues-and-how-to-make-yourself-safe-and-secure/</loc><lastmod>2019-04-24T12:40:03+00:00</lastmod></url><url><loc>https://www.csri.info/malicious-software-and-how-to-protect-yourselves-from-it/</loc><lastmod>2019-04-23T23:09:38+00:00</lastmod></url><url><loc>https://www.csri.info/data-backups%ef%bb%bf/</loc><lastmod>2019-04-23T23:31:16+00:00</lastmod></url><url><loc>https://www.csri.info/gdpr-what-does-it-all-mean/</loc><lastmod>2019-04-24T03:17:35+00:00</lastmod></url><url><loc>https://www.csri.info/making-your-business-secure/</loc><lastmod>2019-04-23T23:54:00+00:00</lastmod></url><url><loc>https://www.csri.info/passw0rds-the-barrier-and-the-way-into-your-organisation/</loc><lastmod>2019-04-24T11:24:51+00:00</lastmod></url><url><loc>https://www.csri.info/making-employees-love-cyber-security/</loc><lastmod>2019-04-24T02:51:46+00:00</lastmod></url><url><loc>https://www.csri.info/the-allure-of-omega-clone-squad-a-deep-dive-into-the-world-of-luxury-watch-replicas/</loc><lastmod>2025-04-15T01:58:52+00:00</lastmod></url><url><loc>https://www.csri.info/has-the-ms-hack-been-a-brand-attack/</loc><lastmod>2025-05-23T21:47:36+00:00</lastmod></url></urlset>
