<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.andremarien.be/</loc></url><url><loc>https://www.andremarien.be/blog/</loc></url><url><loc>https://www.andremarien.be/l/the-magic-of-phishing/</loc></url><url><loc>https://www.andremarien.be/l/one-wrong-click-and-you-lose/</loc></url><url><loc>https://www.andremarien.be/l/paranoia-twijfels-en-veel-angst/</loc></url><url><loc>https://www.andremarien.be/l/computerinbraak-door-een-interne-medewerker/</loc></url><url><loc>https://www.andremarien.be/l/the-colorful-world-of-security-testing/</loc></url><url><loc>https://www.andremarien.be/l/attackers-get-the-fame-defenders-get-the-blame/</loc></url><url><loc>https://www.andremarien.be/l/abuse-categories-for-generative-ai-with-illustrating-cases-and-preventive-detection/</loc></url><url><loc>https://www.andremarien.be/l/building-trust-in-the-security-of-ai-systems/</loc></url><url><loc>https://www.andremarien.be/l/ssst-the-backdoor-is-operational/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing/</loc></url><url><loc>https://www.andremarien.be/l/addenda-security-testing/</loc></url><url><loc>https://www.andremarien.be/l/securing-ai-systems-layer-by-layer/</loc></url><url><loc>https://www.andremarien.be/l/ai-layers-addenda/</loc></url><url><loc>https://www.andremarien.be/l/trends-for-2025-the-four-headlines/</loc></url><url><loc>https://www.andremarien.be/l/ai-and-the-law-of-diminishing-marginal-returns/</loc></url><url><loc>https://www.andremarien.be/l/regulated-or-deregulated/</loc></url><url><loc>https://www.andremarien.be/l/regulation-a-magical-solution/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-1-introduction/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-2-triggers-and-objectives/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-3-choose-the-right-testers/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-4-test-planning/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-5-test-execution/</loc></url><url><loc>https://www.andremarien.be/l/managing-technical-security-testing-part-6-reporting-and-remediation-assistance/</loc></url><url><loc>https://www.andremarien.be/l/attacks-targeting-data/</loc></url><url><loc>https://www.andremarien.be/l/playing-with-basic-signing-based-on-rsa/</loc></url><url><loc>https://www.andremarien.be/l/what-is-new-after-20-years/</loc></url><url><loc>https://www.andremarien.be/l/data-protection/</loc></url></urlset>