<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.sumitchouhan.com/the-weight-of-a-single-bolt</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/why-ais-189-compliance-is-no-longer-optional-for-automotive-players-in-india</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/expertise</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/reconnaissance-in-it-and-mapping-the-path-to-ot-power-grid</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/hard-questions-on-autonomous-and-connected-vehicles</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/why-an-iso-audit-wont-save-you-and-why-low-cyber-maturity-will-destroy-you-no-matter-what-tools-you-buy</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/projects</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/inside-the-ddos-attack-that-took-down-x-twitter</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/the-ikea-effect-in-cybersecurity</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/i-can-track-you</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/a-new-definition-of-sovereignty</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/pedigree-over-potential-indias-costly-mistake-in-cybersecurity-hiring</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/the-world-of-quantum-unraveling-the-invisible-realm</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/detection-as-the-safety-net-designing-for-the-attacks-you-couldnt-stop</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/why-vanet-still-isnt-ready-for-prime-time-part-1</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/the-industrialization-of-vehicle-exploitation-a-2026-technical-review</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/chat-control-20-the-eus-most-controversial-digital-proposal-yet-when-child-protection-meets-privacy-who-protects-the-protectors</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/when-the-compiler-lies-lessons-from-reflections-on-trusting-trust-and-the-science-of-verifiable-software</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/why-traditional-vapt-is-becoming-redundant</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/why-traditional-soc-platforms-wont-help-with-ot-management</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/ais-189-and-ais-190-what-everyone-missed-and-why-global-indian-oems-must-pay-attention</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/birthday-wishes-budget-plans-and-a-breach-waiting-to-happen</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/qilin-ransomware-a-technical-overview</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/ukraines-tactical-radios-are-going-quantum-resilient-inside-the-himera-quantropi-partnership</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/unlocking-the-full-potential-of-xdr-a-guide-for-security-researchers-and-practitioners-v2</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/interpreting-voidlink-through-a-defensive-and-enterprise-lens</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/understanding-tisax-and-iso-270012022-part-1</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/about-me</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/articles</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com/odyssey</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.sumitchouhan.com</loc><lastmod>2026-04-20T10:05:08.000Z</lastmod><priority>1.0</priority></url></urlset>