<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://aisecurity.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T01:16:49Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-1-course-overview-how-to-use-this-prepcast</loc>
    <lastmod>2025-09-15T03:19:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-2-the-ai-security-landscape</loc>
    <lastmod>2025-09-15T03:19:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-3-system-architecture-trust-boundaries</loc>
    <lastmod>2025-09-15T03:20:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-4-data-lifecycle-security</loc>
    <lastmod>2025-09-15T03:20:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-5-prompt-security-i-injection-jailbreaks</loc>
    <lastmod>2025-09-15T03:21:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-6-prompt-security-ii-indirect-cross-domain-injections</loc>
    <lastmod>2025-09-15T03:21:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-7-content-safety-vs-security</loc>
    <lastmod>2025-09-15T03:22:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-8-data-poisoning-attacks</loc>
    <lastmod>2025-09-15T03:22:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-9-training-time-integrity</loc>
    <lastmod>2025-09-15T03:22:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-10-privacy-attacks</loc>
    <lastmod>2025-09-15T03:23:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-11-privacy-preserving-techniques</loc>
    <lastmod>2025-09-15T03:23:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-12-model-theft-extraction</loc>
    <lastmod>2025-09-15T03:24:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-13-adversarial-evasion</loc>
    <lastmod>2025-09-15T03:24:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-14-rag-security-i-retrieval-index-hardening</loc>
    <lastmod>2025-09-15T03:24:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-15-rag-security-ii-context-filtering-grounding</loc>
    <lastmod>2025-09-15T03:25:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-16-agents-as-an-attack-surface</loc>
    <lastmod>2025-09-15T03:25:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-17-secrets-credential-hygiene</loc>
    <lastmod>2025-09-15T03:26:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-18-authn-z-for-llm-apps</loc>
    <lastmod>2025-09-15T03:26:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-19-output-validation-policy-enforcement</loc>
    <lastmod>2025-09-15T03:26:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-20-red-teaming-strategy-for-genai</loc>
    <lastmod>2025-09-15T03:27:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-21-evals-test-pipelines</loc>
    <lastmod>2025-09-15T03:27:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-22-telemetry-observability</loc>
    <lastmod>2025-09-15T03:28:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-23-abuse-fraud-detection</loc>
    <lastmod>2025-09-15T03:28:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-24-cost-resource-abuse</loc>
    <lastmod>2025-09-15T03:29:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-25-mlops-serving-security</loc>
    <lastmod>2025-09-15T03:29:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-26-supply-chain-artifacts</loc>
    <lastmod>2025-09-15T03:30:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-27-secure-fine-tuning-adaptation</loc>
    <lastmod>2025-09-15T03:30:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-28-api-gateways-proxies-for-ai</loc>
    <lastmod>2025-09-15T03:31:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-29-code-execution-sandboxing</loc>
    <lastmod>2025-09-15T03:31:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-30-connector-plugin-security</loc>
    <lastmod>2025-09-15T03:32:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-31-cloud-infra-for-ai</loc>
    <lastmod>2025-09-15T03:32:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-32-keys-encryption-attestation</loc>
    <lastmod>2025-09-15T03:33:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-33-governance-acceptable-use</loc>
    <lastmod>2025-09-15T03:34:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-34-risk-frameworks-in-practice</loc>
    <lastmod>2025-09-15T03:34:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-35-threat-modeling-for-ai</loc>
    <lastmod>2025-09-15T03:34:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-36-owasp-genai-llm-top-10</loc>
    <lastmod>2025-09-15T03:35:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-37-secure-sdlc-for-ai</loc>
    <lastmod>2025-09-15T03:35:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-38-incident-response-for-ai-events</loc>
    <lastmod>2025-09-15T03:36:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-39-deepfakes-synthetic-media-risk</loc>
    <lastmod>2025-09-15T03:36:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-40-content-provenance-watermarking</loc>
    <lastmod>2025-09-15T03:37:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-41-legal-compliance-horizon-high-level</loc>
    <lastmod>2025-09-15T03:37:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-42-third-party-vendor-risk</loc>
    <lastmod>2025-09-15T03:38:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-43-enterprise-architecture-patterns</loc>
    <lastmod>2025-09-15T03:38:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-44-people-process</loc>
    <lastmod>2025-09-15T03:38:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-45-program-management-patterns-30-60-90</loc>
    <lastmod>2025-09-15T03:39:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-46-multimodal-cross-modal-security</loc>
    <lastmod>2025-09-15T03:39:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-47-on-device-edge-ai-security</loc>
    <lastmod>2025-09-15T03:40:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-48-guardrails-engineering</loc>
    <lastmod>2025-09-15T03:40:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-49-confidential-computing-for-ai</loc>
    <lastmod>2025-09-15T03:41:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/episode-50-automated-adversarial-generation</loc>
    <lastmod>2025-09-15T03:41:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aisecurity.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-27T00:33:43Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
