<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 9:27 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://snmconsultinginc.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>SNM Consulting Inc.</title>
		<link><![CDATA[https://snmconsultinginc.com]]></link>
		<description><![CDATA[SNM Consulting Inc.]]></description>
		<lastBuildDate><![CDATA[Tue, 25 Mar 2025 10:52:08 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://snmconsultinginc.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://snmconsultinginc.com/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 25 Mar 2025 10:52:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/resources/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/resources/]]></link>
			<title>Resources</title>
			<pubDate><![CDATA[Wed, 12 Mar 2025 10:23:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/about/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Tue, 25 Mar 2025 10:51:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/ai-risk-governance-and-compliance/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/ai-risk-governance-and-compliance/]]></link>
			<title>AI Risk, Governance &#038; Compliance</title>
			<pubDate><![CDATA[Tue, 11 Mar 2025 05:37:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/the-velocity-of-risk/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/the-velocity-of-risk/]]></link>
			<title>The Velocity of Risk: Why Your Quarterly Board Deck Can’t Keep Up with AI</title>
			<pubDate><![CDATA[Thu, 19 Feb 2026 13:47:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/contact/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 15:16:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 14:14:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/?elementskit_template=footer]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/?elementskit_template=footer]]></link>
			<title>Footer</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 14:10:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/red-team-and-genai/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/red-team-and-genai/]]></link>
			<title>Red Team and GenAI</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 14:02:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/conferences/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/conferences/]]></link>
			<title>Pictures</title>
			<pubDate><![CDATA[Fri, 28 Nov 2025 20:02:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/blogs/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/blogs/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Fri, 28 Nov 2025 19:33:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/podcasts/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/podcasts/]]></link>
			<title>Podcasts</title>
			<pubDate><![CDATA[Fri, 28 Nov 2025 19:30:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/owasp-llm-top-10-lets-dig-into-it/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/owasp-llm-top-10-lets-dig-into-it/]]></link>
			<title>OWASP LLM Top 10 – Let’s dig into it</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 14:01:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/ai-security-threat-defense/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/ai-security-threat-defense/]]></link>
			<title>AI Security &#038; Threat Defense</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 12:17:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/model-cards/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/model-cards/]]></link>
			<title>Model Cards: The Key to Transparent and Ethical AI Development</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 13:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/guarding-the-gates-detecting-and-preventing-prompt-injection-attacks-in-generative-ai-with-open-source-solutions/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/guarding-the-gates-detecting-and-preventing-prompt-injection-attacks-in-generative-ai-with-open-source-solutions/]]></link>
			<title>Guarding the Gates: Detecting and Preventing Prompt Injection Attacks in Generative AI with Open-Source Solutions</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 13:54:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/open-source-program-office-ospo-services/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/open-source-program-office-ospo-services/]]></link>
			<title>Open Source Program Office (OSPO) Services</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 12:51:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/cloud-security-assessment-services/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/cloud-security-assessment-services/]]></link>
			<title>Cloud Security Assessment Services</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 12:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/kubernetes-security-services/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/kubernetes-security-services/]]></link>
			<title>Kubernetes Security Services</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 11:08:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/?elementskit_template=header]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/?elementskit_template=header]]></link>
			<title>Header</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 08:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/services/application-security-practice/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/services/application-security-practice/]]></link>
			<title>Application Security Practice</title>
			<pubDate><![CDATA[Mon, 10 Mar 2025 05:14:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/ci-cd-top-ten-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/ci-cd-top-ten-snm-consulting/]]></link>
			<title>CI/CD Top Ten | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:17:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/why-appsec-maturity-models-are-needed-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/why-appsec-maturity-models-are-needed-snm-consulting/]]></link>
			<title>Scaling Safely: The Crucial Role of Application Security Maturity Models | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/precautions-when-charging-devices-via-usb-in-public-places-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/precautions-when-charging-devices-via-usb-in-public-places-snm-consulting/]]></link>
			<title>Safeguard Your Devices and Data with These Must-Know USB Precautions in Public Spaces! | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/browser-push-notifications-a-security-concern-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/browser-push-notifications-a-security-concern-snm-consulting/]]></link>
			<title>Browser Push Notifications – A Security Concern | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/risk-associated-file-downloads-from-the-internet-and-how-to-be-safe-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/risk-associated-file-downloads-from-the-internet-and-how-to-be-safe-snm-consulting/]]></link>
			<title>Risk associated file downloads from the Internet and how to be safe | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/creating-intentional-bias-in-genai-with-data-poisoning-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/creating-intentional-bias-in-genai-with-data-poisoning-snm-consulting/]]></link>
			<title>Concerns around Intentional bias in GenAI by Data Poisoning | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/security-yourself-in-a-digitally-connected-world-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/security-yourself-in-a-digitally-connected-world-snm-consulting/]]></link>
			<title>Protect yourself in a digitally connected world | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/evolving-domain-of-attack-surface-management-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/evolving-domain-of-attack-surface-management-snm-consulting/]]></link>
			<title>Evolving domain of External Attack Surface Management | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/the-importance-of-signing-container-images-ensuring-security-and-trust-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/the-importance-of-signing-container-images-ensuring-security-and-trust-snm-consulting/]]></link>
			<title>The Importance of Signing Container Images: Ensuring Security and Trust | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/breaking-organizational-silos-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/breaking-organizational-silos-snm-consulting/]]></link>
			<title>Breaking Organizational Silos | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/what-parallels-can-we-draw-from-the-nfl-to-take-a-risk-based-approach-for-appsec-snm-consulting/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/what-parallels-can-we-draw-from-the-nfl-to-take-a-risk-based-approach-for-appsec-snm-consulting/]]></link>
			<title>Scoring a Touchdown in AppSec: Learning Risk-Based Strategies from the NFL Playbook | SNM Consulting</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/securing-mobile-applications/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/securing-mobile-applications/]]></link>
			<title>Securing your Mobile Applications &#8211; Why it is important and how to do this effectively?</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/defending-non-profits/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/defending-non-profits/]]></link>
			<title>Securing the Vision: Guiding Non-Profit Organizations through the Digital Era amidst Cyber Challenges</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/journey-to-appsec-maturity-dialogue-at-rsa/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/journey-to-appsec-maturity-dialogue-at-rsa/]]></link>
			<title>Maria Schwenger | Journey to AppSec Maturity: Dialogue at RSA</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/journey-to-appsec-maturity-dialogue-at-rsa-copy/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/journey-to-appsec-maturity-dialogue-at-rsa-copy/]]></link>
			<title>As they say &#8216;better late than never&#8217;</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/cyber-future-foundations-post-linkedin/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/cyber-future-foundations-post-linkedin/]]></link>
			<title>Cyber Future Foundation’s Post -linkedin</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/navigating-the-ai-frontier-with-insights-on-use-cases-security-privacy-and-ethical-dilemmas/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/navigating-the-ai-frontier-with-insights-on-use-cases-security-privacy-and-ethical-dilemmas/]]></link>
			<title>Navigating the AI Frontier with Insights on Use Cases, Implementation, Security, Privacy, and Ethical Dilemmas</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/10k-and-8k-reporting-requirements/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/10k-and-8k-reporting-requirements/]]></link>
			<title>10k and 8k – reporting requirements</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/standing-up-your-application-security-program/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/standing-up-your-application-security-program/]]></link>
			<title>Fortify and Thrive: Elevating Your Defenses with an Application Security Uprising</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/1854-2/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/1854-2/]]></link>
			<title>Guardians of Cyber Realms: Unleashing the Power of Security Awareness in Organization</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/securing-the-cyber-frontier-navigating-vulnerability-management-domain-with-different-approaches-and-prioritization-strategies/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/securing-the-cyber-frontier-navigating-vulnerability-management-domain-with-different-approaches-and-prioritization-strategies/]]></link>
			<title>Securing the Cyber Frontier: Navigating Vulnerability Management Domain with Different Approaches and Prioritization Strategies</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/regulations-ai/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/regulations-ai/]]></link>
			<title>Embracing the Importance of AI: The Necessity of Regulations in the AI Landscape</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/modern-approach-to-vulnerability-management-epss/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/modern-approach-to-vulnerability-management-epss/]]></link>
			<title>Modern Approach to Vulnerability Management &#8211; EPSS</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/modern-approach-to-software-composition-analysis-call-graph-and-runtime-sca/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/modern-approach-to-software-composition-analysis-call-graph-and-runtime-sca/]]></link>
			<title>Modern Approach to Software Composition Analysis &#8211; Call Graph and Runtime SCA</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/code-generation-with-an-eye-on-mitigating-risks/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/code-generation-with-an-eye-on-mitigating-risks/]]></link>
			<title>Navigating the Exciting World of Code Generation with an Eye on Mitigating Risks</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/views-from-a-fractional/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/views-from-a-fractional/]]></link>
			<title>Views from a Fractional CISO delivering complete security: A conversation with Aruneesh Salhotra</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/what-is-lorem-ipsum-copy/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/what-is-lorem-ipsum-copy/]]></link>
			<title>Aruneesh Salhotra &#038; Maria Schwenger | Journey to AppSec Maturity: Dialogue at RSA</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/thepurplebookcommunity/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/thepurplebookcommunity/]]></link>
			<title>The PurpleBook Community</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://snmconsultinginc.com/the-future-of-attack-surface-management/]]></guid>
			<link><![CDATA[https://snmconsultinginc.com/the-future-of-attack-surface-management/]]></link>
			<title>The Future of Attack Surface Management</title>
			<pubDate><![CDATA[Fri, 07 Mar 2025 21:16:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
