<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 8:36 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://securestrux.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>SecureStrux</title>
		<link><![CDATA[https://securestrux.com]]></link>
		<description><![CDATA[SecureStrux]]></description>
		<lastBuildDate><![CDATA[Wed, 20 Aug 2025 20:16:47 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://securestrux.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/the-state-of-cybersecurity-in-higher-education/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/the-state-of-cybersecurity-in-higher-education/]]></link>
			<title>The State of Cybersecurity in Higher Education</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 20:16:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/]]></link>
			<title>Insights</title>
			<pubDate><![CDATA[Wed, 13 Sep 2023 12:32:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/]]></guid>
			<link><![CDATA[https://securestrux.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 26 Nov 2025 17:17:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/schedule-meeting/]]></guid>
			<link><![CDATA[https://securestrux.com/schedule-meeting/]]></link>
			<title>Schedule Meeting</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 19:26:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/cybersecurity-trends-that-might-shape-defense-contracting-in-2026/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/cybersecurity-trends-that-might-shape-defense-contracting-in-2026/]]></link>
			<title>The Cybersecurity Trends Poised to Transform Defense Contracting in 2026</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/building-a-siprnet-enclave-lessons-learned-from-the-field/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/building-a-siprnet-enclave-lessons-learned-from-the-field/]]></link>
			<title>Building a SIPRNet Enclave: Lessons Learned From the Field</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/cisa-and-fbi-introduce-new-guidance-to-address-cyber-risks-in-ot-environments/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/cisa-and-fbi-introduce-new-guidance-to-address-cyber-risks-in-ot-environments/]]></link>
			<title>CISA and FBI Introduce New Guidance to Address Cyber Risks in OT Environments</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/what-is-splunk-transforming-your-organizations-data-management-and-cybersecurity-operations/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/what-is-splunk-transforming-your-organizations-data-management-and-cybersecurity-operations/]]></link>
			<title>What is Splunk and What Does Splunk do?</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/corporate-account-takeover-how-it-works-tips-for-prevention/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/corporate-account-takeover-how-it-works-tips-for-prevention/]]></link>
			<title>Corporate Account Takeover: How it Works &#038; Tips for Prevention</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/managing-the-digital-supply-chain-in-defense-networks/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/managing-the-digital-supply-chain-in-defense-networks/]]></link>
			<title>Managing the Digital Supply Chain in Defense Networks</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:39:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/who-we-are/our-culture/]]></guid>
			<link><![CDATA[https://securestrux.com/who-we-are/our-culture/]]></link>
			<title>Our Culture</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:09:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/director-of-business-development-dow/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/director-of-business-development-dow/]]></link>
			<title>Director of Business Development &#8211; DoW</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 17:04:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/disa-advances-mission-network-as-a-service-initiative-for-2026/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/disa-advances-mission-network-as-a-service-initiative-for-2026/]]></link>
			<title>DISA Advances Mission Network-as-a-Service Initiative for 2026</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:41:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/system-test-data-manager-26-049/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/system-test-data-manager-26-049/]]></link>
			<title>System Test Data Manager (26-049)</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 16:01:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/mobile-reverse-engineer-53501/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/mobile-reverse-engineer-53501/]]></link>
			<title>Mobile Reverse Engineer (53501)</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 17:24:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/powerstrux-webinar-q1-2026/]]></guid>
			<link><![CDATA[https://securestrux.com/powerstrux-webinar-q1-2026/]]></link>
			<title>PowerStrux Webinar Q1 2026</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 15:17:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/systems-architect-26-060/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/systems-architect-26-060/]]></link>
			<title>Systems Architect (26-060)</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:17:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/operationalizing-compliance-turning-audits-into-action/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/operationalizing-compliance-turning-audits-into-action/]]></link>
			<title>Operationalizing Compliance: Turning Audits into Action</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 15:25:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/addressing-cybersecurity-challenges-in-higher-education/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/addressing-cybersecurity-challenges-in-higher-education/]]></link>
			<title>Addressing Cybersecurity Challenges in Higher Education</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 20:16:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/webinar-powerstrux-introduction-and-update-2026-q1/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/webinar-powerstrux-introduction-and-update-2026-q1/]]></link>
			<title>Webinar &#8211; PowerStrux Introduction and Update 2026 Q1</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 15:14:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/cmmc-2-0-and-the-external-factors-problem-what-defense-contractors-need-to-know/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/cmmc-2-0-and-the-external-factors-problem-what-defense-contractors-need-to-know/]]></link>
			<title>CMMC 2.0 and the External Factors Problem &#8211; What Defense Contractors Need to Know</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/systems-engineer-26-021-26-022/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/systems-engineer-26-021-26-022/]]></link>
			<title>Systems Engineer (26-021 &#038; 26-022)</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 16:21:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/what-we-do/continuous-monitoring-tools-and-products/]]></guid>
			<link><![CDATA[https://securestrux.com/what-we-do/continuous-monitoring-tools-and-products/]]></link>
			<title>Products</title>
			<pubDate><![CDATA[Wed, 26 Nov 2025 16:51:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/active-directory-module-for-windows-powershell-basic-auditing-for-security-professionals/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/active-directory-module-for-windows-powershell-basic-auditing-for-security-professionals/]]></link>
			<title>Active Directory Module for Windows PowerShell | Basic Auditing for Security Professionals</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 20:19:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/how-to-use-windows-powershell-for-advanced-auditing/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/how-to-use-windows-powershell-for-advanced-auditing/]]></link>
			<title>How to Use Windows PowerShell for Advanced Auditing</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 20:18:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/a-quick-guide-creating-a-tenable-nessus-scanning-account-for-vsca/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/a-quick-guide-creating-a-tenable-nessus-scanning-account-for-vsca/]]></link>
			<title>A Quick Guide: Creating a Tenable Nessus Scanning Account for VSCA</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 20:17:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/how-a-securestrux-mock-cora-can-reduce-the-stress-and-uncertainty-of-your-upcoming-visit/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/how-a-securestrux-mock-cora-can-reduce-the-stress-and-uncertainty-of-your-upcoming-visit/]]></link>
			<title>How a SecureStrux Mock CORA can Reduce the Stress and Uncertainty of Your Upcoming &#8220;Visit&#8221;</title>
			<pubDate><![CDATA[Tue, 25 Nov 2025 17:33:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/cmmc-2-0-compliance-what-defense-contractors-need-to-know-in-2025-and-2026/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/cmmc-2-0-compliance-what-defense-contractors-need-to-know-in-2025-and-2026/]]></link>
			<title>CMMC 2.0 Compliance: What Defense Contractors Need to Know in 2025 and 2026</title>
			<pubDate><![CDATA[Mon, 24 Nov 2025 18:27:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/jobs/cloud-engineer-52589/]]></guid>
			<link><![CDATA[https://securestrux.com/jobs/cloud-engineer-52589/]]></link>
			<title>Cloud Engineer (52589)</title>
			<pubDate><![CDATA[Mon, 15 Dec 2025 16:52:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/who-we-are/our-team/]]></guid>
			<link><![CDATA[https://securestrux.com/who-we-are/our-team/]]></link>
			<title>Our Team</title>
			<pubDate><![CDATA[Fri, 09 Jan 2026 21:29:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/the-dows-new-approach-to-cybersecurity-risk-management/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/the-dows-new-approach-to-cybersecurity-risk-management/]]></link>
			<title>The DoW’s New Approach to Cybersecurity Risk Management</title>
			<pubDate><![CDATA[Thu, 02 Oct 2025 14:09:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/empowering-efficient-system-auditing-with-the-powerstrux-windows-auditor/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/empowering-efficient-system-auditing-with-the-powerstrux-windows-auditor/]]></link>
			<title>Empowering Efficient System Auditing with the PowerStrux Windows Auditor</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 18:05:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/overcoming-hurdles-navigating-challenges-in-risk-management-framework/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/overcoming-hurdles-navigating-challenges-in-risk-management-framework/]]></link>
			<title>Overcoming Hurdles: Navigating Challenges in Risk Management Framework</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 17:56:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/demystifying-cmmc-a-comprehensive-introduction/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/demystifying-cmmc-a-comprehensive-introduction/]]></link>
			<title>Demystifying CMMC &#8211; A Comprehensive Introduction</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 17:53:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/understanding-and-implementing-nist-sp-800-53-au-2-logging-requirements-for-defense-industrial-base-systems/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/understanding-and-implementing-nist-sp-800-53-au-2-logging-requirements-for-defense-industrial-base-systems/]]></link>
			<title>Understanding and Implementing NIST SP 800-53 AU-2 Logging Requirements for Defense Industrial Base Systems</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 17:49:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/securing-the-defense-industrial-base-comprehensive-cmmc-compliance-with-securestrux/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/securing-the-defense-industrial-base-comprehensive-cmmc-compliance-with-securestrux/]]></link>
			<title>Securing the Defense Industrial Base: Comprehensive CMMC Compliance with SecureStrux</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 17:47:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/taking-the-secret-out-of-obtaining-siprnet/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/taking-the-secret-out-of-obtaining-siprnet/]]></link>
			<title>Taking the Secret Out of Obtaining SIPRNet &#8211; A Video Webinar</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 17:34:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/configuring-splunk-enterprise-for-common-access-card-cac-authentication/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/configuring-splunk-enterprise-for-common-access-card-cac-authentication/]]></link>
			<title>Configuring Splunk Enterprise for Common Access Card (CAC) Authentication</title>
			<pubDate><![CDATA[Mon, 28 Jul 2025 17:51:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/cybersecurity-maturity-model-certification-cmmc-services/]]></guid>
			<link><![CDATA[https://securestrux.com/cybersecurity-maturity-model-certification-cmmc-services/]]></link>
			<title>Cybersecurity Maturity Model Certification (CMMC)</title>
			<pubDate><![CDATA[Wed, 26 Feb 2025 14:59:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/careers/]]></guid>
			<link><![CDATA[https://securestrux.com/careers/]]></link>
			<title>Careers</title>
			<pubDate><![CDATA[Tue, 27 May 2025 15:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/impact-of-glba-on-higher-education/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/impact-of-glba-on-higher-education/]]></link>
			<title>Impact of GLBA on Higher Education</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 18:17:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/who-we-are/about-us/]]></guid>
			<link><![CDATA[https://securestrux.com/who-we-are/about-us/]]></link>
			<title>About Us</title>
			<pubDate><![CDATA[Tue, 27 May 2025 13:51:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/nessus-scans-offline-registration/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/nessus-scans-offline-registration/]]></link>
			<title>Master Nessus Scans &#038; Offline Registration in Minutes</title>
			<pubDate><![CDATA[Thu, 08 May 2025 18:37:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/who-we-serve/dod-cybersecurity-service-provider/]]></guid>
			<link><![CDATA[https://securestrux.com/who-we-serve/dod-cybersecurity-service-provider/]]></link>
			<title>Government Agencies</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 18:19:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/cyber-advisory-center/apply-configuration-with-microsofts-lgpo-utility/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/cyber-advisory-center/apply-configuration-with-microsofts-lgpo-utility/]]></link>
			<title>Apply Configuration With Microsoft&#8217;s LGPO Utility</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 18:11:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/cyber-operational-readiness-assessment/]]></guid>
			<link><![CDATA[https://securestrux.com/cyber-operational-readiness-assessment/]]></link>
			<title>CORA</title>
			<pubDate><![CDATA[Mon, 07 Jul 2025 18:30:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/summer-2025-cora-alert-prepare-now/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/summer-2025-cora-alert-prepare-now/]]></link>
			<title>Summer 2025 CORA Alert – Prepare Now</title>
			<pubDate><![CDATA[Fri, 27 Jun 2025 16:27:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/resources/insights/compliance-as-a-service-caas-4-ways-to-simplify-regulation/]]></guid>
			<link><![CDATA[https://securestrux.com/resources/insights/compliance-as-a-service-caas-4-ways-to-simplify-regulation/]]></link>
			<title>Compliance as a Service (CaaS): 4 Ways to Simplify Regulation</title>
			<pubDate><![CDATA[Mon, 17 Feb 2025 21:27:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/what-we-do/engineering-solutions/]]></guid>
			<link><![CDATA[https://securestrux.com/what-we-do/engineering-solutions/]]></link>
			<title>Engineering Solutions</title>
			<pubDate><![CDATA[Fri, 11 Jul 2025 14:07:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://securestrux.com/job-openings/]]></guid>
			<link><![CDATA[https://securestrux.com/job-openings/]]></link>
			<title>Jobs</title>
			<pubDate><![CDATA[Fri, 10 Jan 2025 15:33:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
