<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://jonas.colmsjo.com/error.html</loc>
    <lastmod>2026-02-04T09:38:34.836Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/automotive-security-blog-post/automotive-security-blog-post.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w09-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-02-28T06:07:38.969Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w06-itsec-summary.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/agentic-ai-digital-forensics/index.html</loc>
    <lastmod>2026-02-28T06:00:12.373Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w10-ransomware-summary.html</loc>
    <lastmod>2026-03-07T06:16:08.455Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2024-w46-cybersecurity.html</loc>
    <lastmod>2026-01-13T13:26:42.901Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w07-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-02-15T07:43:48.311Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w12-ransomware-summary.html</loc>
    <lastmod>2026-03-21T06:13:44.617Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w03-ransomware-summary.html</loc>
    <lastmod>2026-01-27T09:19:07.186Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w12-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-03-21T06:07:24.986Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w13-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-03-28T06:07:22.913Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/password-hygiene/index.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w13-ransomware-summary.html</loc>
    <lastmod>2026-03-28T06:15:07.045Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2024-w47-cybersecurity.html</loc>
    <lastmod>2026-01-13T13:26:42.901Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w03-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-01-20T08:22:20.678Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2025-w48-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-01-20T08:01:39.278Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w06-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w11-ransomware-summary.html</loc>
    <lastmod>2026-03-14T06:20:59.872Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/security-frameworks-nis2.html</loc>
    <lastmod>2026-02-15T07:43:48.295Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w07-itsec-summary.html</loc>
    <lastmod>2026-02-28T06:00:12.373Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w04-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-01-27T09:18:40.173Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/cio-ciso-agenda-2026/index.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w11-itsec-summary.html</loc>
    <lastmod>2026-03-14T06:31:13.002Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/it-security-strategy-framework/index.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w02-ransomware-summary.html</loc>
    <lastmod>2026-01-13T15:16:34.367Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/index.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/ransomware.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/threat-intelligence.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/itsec.html</loc>
    <lastmod>2026-02-15T07:43:48.291Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/nis2.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w05-ransomware-summary.html</loc>
    <lastmod>2026-02-04T09:22:38.647Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w05-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-02-04T09:22:38.647Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w02-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-01-20T08:01:39.278Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/iot-case.html</loc>
    <lastmod>2026-01-13T13:26:42.941Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w12-itsec-summary.html</loc>
    <lastmod>2026-03-21T06:21:00.474Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w06-ransomware-summary.html</loc>
    <lastmod>2026-02-07T06:12:33.650Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w08-itsec-summary.html</loc>
    <lastmod>2026-02-21T06:28:21.640Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w08-ransomware-summary.html</loc>
    <lastmod>2026-02-21T06:19:52.555Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w09-ransomware-summary.html</loc>
    <lastmod>2026-02-28T06:16:19.934Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w04-ransomware-summary.html</loc>
    <lastmod>2026-01-27T09:27:19.423Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w10-itsec-summary.html</loc>
    <lastmod>2026-03-07T06:26:05.009Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w11-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-03-14T06:11:55.818Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2025-w51-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-01-20T08:01:39.278Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w08-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-02-21T06:12:15.306Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w07-ransomware-summary.html</loc>
    <lastmod>2026-02-15T07:43:48.311Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2025-w51-ransomware-summary.html</loc>
    <lastmod>2026-01-13T13:26:42.901Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/eu-vs-us-compliance-stacks/index.html</loc>
    <lastmod>2026-02-28T06:00:12.373Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2025-w49-ransomware-summary.html</loc>
    <lastmod>2026-01-13T13:26:42.901Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2025-w47-cybersecurity-summary.html</loc>
    <lastmod>2026-01-20T08:01:39.278Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w10-cybersecurity-cps-summary.html</loc>
    <lastmod>2026-03-07T06:08:14.642Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w13-itsec-summary.html</loc>
    <lastmod>2026-03-28T06:25:40.912Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/posts/2026-w09-itsec-summary.html</loc>
    <lastmod>2026-02-28T06:26:14.296Z</lastmod>
  </url>
  <url>
    <loc>https://jonas.colmsjo.com/about.html</loc>
    <lastmod>2026-01-27T09:18:53.909Z</lastmod>
  </url>
</urlset>
