<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.yemi.tech/info-sec-blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2026/3/17/to0jffw17dfn473qi688qr8gcimflw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a69e0804c0dbfb6898c09db/1cc13e0a-93b4-406e-8e9b-d251fcd4ade6/ChatGPT+Image+Mar+17%2C+2026+at+10_23_06+AM.png</image:loc>
      <image:title>Info Sec blog - Cyber Security Risks in Modern Power Grids:                        Lessons from the Polish Grid Intrusion - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2025/7/19/how-i-discovered-techno-feudalism-through-amazon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a69e0804c0dbfb6898c09db/1752914107768-63DP3EFQDJRNOEAOFTK8/unsplash-image-swYx1qihKDc.jpg</image:loc>
      <image:title>Info Sec blog - How I Discovered Techno-Feudalism Through Amazon. - Make it stand out</image:title>
      <image:caption>Feudal Lords of bygone age ?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2024/12/4/integrating-cyber-attacks-in-an-offensive-combined-arms-military-operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-04</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2023/6/7/artificial-intelligence-in-government-policy-shifts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-09</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2020/6/7/telcos-response-to-sim-card-fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a69e0804c0dbfb6898c09db/1591540761184-IUGVAJX3YLLB8P3NAVLR/image-asset.jpeg</image:loc>
      <image:title>Info Sec blog - Defeating Sim Card fraud - Protect your Phone and SIM card with a passcode and pin respectively</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/5/22/social-engineering-and-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/3/22/weaponised-information-oxford-analytica-nigerian-politics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/2/15/quantum-computing-breakthrough-a-new-threat-to-cryptographic-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/2/12/gdpr-actual-activities-to-do-for-achieving-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/2/8/mitigating-socially-engineered-cyber-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/2018/2/8/board-level-cyber-security-checklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/category/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/category/Information+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/category/Techno-+Feudalism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/category/Risk+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/category/Weaponised+Information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Quantum+Computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Disinformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Social+engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Cyber+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/info-sec-blog/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.yemi.tech/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/573cc03cc2ea51f428cb5dd6/1485544884883-T67AD9WY50LUF4VOFQR8/image-asset.jpeg</image:loc>
      <image:title>About us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.yemi.tech/pricing-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/schedule-appointment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/terms-conditions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/terms-conditions-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.yemi.tech/about-author</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a69e0804c0dbfb6898c09db/1518128875408-RPBGU6ZE0TTYPHJ5ZCSF/5C60ED40-EDB1-4A55-A3EB-E5C7B7B7CC61.jpeg</image:loc>
      <image:title>About Author</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a69e0804c0dbfb6898c09db/1619628468059-GOLAXNP9FY1RS34M2530/blog_picture.jpg</image:loc>
      <image:title>About Author</image:title>
      <image:caption>Principal Consultant</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.yemi.tech/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-02-08</lastmod>
  </url>
</urlset>

