<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
  <loc>https://www.hedgehogsecurity.co.uk/</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/penetration-testing</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/cyber-essentials</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/airspace-security</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/wireless-spectrum-security</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/about</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/faq</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/buyers-guide</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/case-studies</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/responsible-disclosure</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/privacy-policy</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/terms-of-service</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/cookie-policy</loc>
  <lastmod>2026-04-12T07:43:44+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-digital-parasite-why-attackers-stopped-breaking-things-and-started-moving-in</loc>
  <lastmod>2026-03-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/openvas-deep-dive-vulnerability-scanning</loc>
  <lastmod>2026-03-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/questions-before-commissioning-penetration-test</loc>
  <lastmod>2026-02-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/choosing-penetration-testing-provider-methodology-quality-expertise</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-mfa-not-multi-factor</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-smart-building-management-system</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-challenge-assumptions-not-confirm-comfort</loc>
  <lastmod>2026-01-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-incident-preparedness-breach-pathways</loc>
  <lastmod>2026-01-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/measuring-real-value-penetration-testing</loc>
  <lastmod>2026-01-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt15</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt27</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt3</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-to-network-pivot</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/transparency-penetration-testing-builds-trust</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt10</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt41</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/mustang-panda</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/salt-typhoon</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/volt-typhoon</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pen-test-reports-prioritise-security-investment</loc>
  <lastmod>2025-12-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-secure-architecture-design</loc>
  <lastmod>2025-12-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-evolves-with-business</loc>
  <lastmod>2025-12-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/dora-requirements-penetration-testing-deep-dive</loc>
  <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-controller-firmware</loc>
  <lastmod>2025-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-risk-management-governance</loc>
  <lastmod>2025-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-elevates-cyber-essentials-plus</loc>
  <lastmod>2025-11-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/mature-penetration-testing-programme-multi-year</loc>
  <lastmod>2025-11-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/remediation-validation-retesting-close-the-loop</loc>
  <lastmod>2025-11-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/custom-payloads-encoding-evasion-metasploit</loc>
  <lastmod>2025-11-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-gps-spoofing-patrol-drone</loc>
  <lastmod>2025-11-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/metasploit-deep-dive-exploitation-framework</loc>
  <lastmod>2025-10-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/no-critical-findings-does-not-mean-secure</loc>
  <lastmod>2025-10-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/no-critical-findings-does-not-mean-secure</loc>
  <lastmod>2025-10-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/common-mistakes-interpreting-pen-test-reports</loc>
  <lastmod>2025-10-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-airborne-recon</loc>
  <lastmod>2025-10-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pen-test-reports-regulatory-legal-insurance</loc>
  <lastmod>2025-10-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/executive-summaries-fund-or-fail-remediation</loc>
  <lastmod>2025-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/netcat-deep-dive-the-swiss-army-knife-of-networking</loc>
  <lastmod>2025-09-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/evidence-screenshots-and-reproduction-steps</loc>
  <lastmod>2025-09-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/writing-findings-teams-can-remediate</loc>
  <lastmod>2025-09-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-hijack-construction</loc>
  <lastmod>2025-09-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/real-world-risk-score-vs-cvss</loc>
  <lastmod>2025-09-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/vulnerability-list-vs-narrative-report</loc>
  <lastmod>2025-08-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/translating-technical-findings-into-business-risk</loc>
  <lastmod>2025-08-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-report-is-the-deliverable</loc>
  <lastmod>2025-08-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-guest-wifi-sensitive-data</loc>
  <lastmod>2025-08-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-a-good-penetration-test-report-looks-like</loc>
  <lastmod>2025-08-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pentesting-ai-engines-and-guardrails</loc>
  <lastmod>2025-07-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/detection-gaps-more-valuable-than-vulnerabilities</loc>
  <lastmod>2025-07-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/nmap-deep-dive-vulnerability-scanning-and-penetration-testing</loc>
  <lastmod>2025-07-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-and-defensive-security</loc>
  <lastmod>2025-07-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cracking-passwords-afternoon</loc>
  <lastmod>2025-07-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-human-element-of-penetration-testing</loc>
  <lastmod>2025-07-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/testing-saas-and-shared-responsibility</loc>
  <lastmod>2025-06-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/netntlmv2-hash-cracking-and-legacy-authentication</loc>
  <lastmod>2025-06-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cloud-penetration-testing</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cctv-intelligence-hub</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/privilege-escalation-explained</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/identity-authentication-access-control</loc>
  <lastmod>2025-05-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/internal-vs-external-penetration-testing</loc>
  <lastmod>2025-05-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/responsible-proof-of-concept</loc>
  <lastmod>2025-05-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-misconfigured-api-endpoints</loc>
  <lastmod>2025-05-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-exploitation-means-in-a-pen-test</loc>
  <lastmod>2025-05-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/chaining-low-risk-findings</loc>
  <lastmod>2025-04-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-methodology-walkthrough</loc>
  <lastmod>2025-04-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-automated-tools-are-not-enough</loc>
  <lastmod>2025-04-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/attack-surface-mapping</loc>
  <lastmod>2025-04-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-usb-opened-the-door</loc>
  <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/reconnaissance-and-osint-in-penetration-testing</loc>
  <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/modelling-real-world-threat-scenarios</loc>
  <lastmod>2025-03-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-bad-scoping-is-worse-than-no-testing</loc>
  <lastmod>2025-03-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-happens-before-a-penetration-test</loc>
  <lastmod>2025-03-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-enables-decisions-resilience-confidence</loc>
  <lastmod>2025-03-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/common-penetration-testing-types-explained</loc>
  <lastmod>2025-03-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-default-credentials-ics</loc>
  <lastmod>2025-03-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-attackers-think</loc>
  <lastmod>2025-02-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/compliance-vs-threat-led-testing</loc>
  <lastmod>2025-02-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-business-risk</loc>
  <lastmod>2025-02-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-wifi-car-park</loc>
  <lastmod>2025-02-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/introduction-to-penetration-testing</loc>
  <lastmod>2025-02-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/understanding-pass-the-hash-attack-how-hackers-exploit-password-vulnerabilities</loc>
  <lastmod>2025-01-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-relevant-despite-automation-ai</loc>
  <lastmod>2025-01-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt39-a-closer-look</loc>
  <lastmod>2025-01-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-vs-red-teaming-differences</loc>
  <lastmod>2025-01-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/teamviewer-hack---what-you-need-to-know</loc>
  <lastmod>2025-01-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt33-the-aerospace-stalker</loc>
  <lastmod>2025-01-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-backup-systems-attack-vector</loc>
  <lastmod>2025-01-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cve-2024-21410</loc>
  <lastmod>2025-01-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-tarpits</loc>
  <lastmod>2024-12-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt42</loc>
  <lastmod>2024-12-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt12-the-prcs-cyber-operative</loc>
  <lastmod>2024-12-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt35</loc>
  <lastmod>2024-12-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cloud-permissions-escalation</loc>
  <lastmod>2024-12-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt34</loc>
  <lastmod>2024-11-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/muddywater</loc>
  <lastmod>2024-11-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/capgemini-data-breach-20gb-of-sensitive-information-stolen</loc>
  <lastmod>2024-11-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-a-threat-led-penetration-test-tlpt</loc>
  <lastmod>2024-11-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-social-engineering-reception</loc>
  <lastmod>2024-11-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt1-the-persistent-data-hoarder</loc>
  <lastmod>2024-10-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/xml-external-entity-attack</loc>
  <lastmod>2024-10-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-spear-phishing</loc>
  <lastmod>2024-10-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-hipaa</loc>
  <lastmod>2024-10-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-vlan-not-segmented</loc>
  <lastmod>2024-10-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/airspace-penetration-testing</loc>
  <lastmod>2024-09-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/difference-between-a-penetration-test-and-a-vulnerability-scan</loc>
  <lastmod>2024-09-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/wifi-penetration-testing-of-companies</loc>
  <lastmod>2024-09-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-forgotten-test-server</loc>
  <lastmod>2024-09-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-intern-laptop-beachhead</loc>
  <lastmod>2024-08-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-exploiting-trust-between-offices</loc>
  <lastmod>2024-07-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-coffee-machine</loc>
  <lastmod>2024-06-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-phishing-finance-director</loc>
  <lastmod>2024-05-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-printer-domain-admin</loc>
  <lastmod>2024-04-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-superyacht-keylock</loc>
  <lastmod>2024-03-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-lift-reconnaissance-platform</loc>
  <lastmod>2024-02-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-boardroom-tv</loc>
  <lastmod>2024-01-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-actually-happens-during-a-professional-penetration-test-from-day-one-to-final-report</loc>
  <lastmod>2023-12-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-ethical-hackers-think-differently-from-traditional-it-security-teams</loc>
  <lastmod>2023-12-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-a-vulnerability-scan-and-a-penetration-test-and-why-does-it-matter</loc>
  <lastmod>2023-12-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/when-should-a-business-choose-a-red-team-engagement-instead-of-a-standard-penetration-test</loc>
  <lastmod>2023-12-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-prioritise-findings-based-on-real-world-exploitability-rather-than-theoretical-risk</loc>
  <lastmod>2023-12-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-a-penetration-test-measure-business-impact-not-just-technical-weakness</loc>
  <lastmod>2023-12-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-evidence-makes-a-penetration-test-report-credible-at-board-level</loc>
  <lastmod>2023-12-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-do-many-penetration-test-reports-fail-to-drive-meaningful-remediation</loc>
  <lastmod>2023-12-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-often-should-an-organisation-conduct-external-and-internal-penetration-tests</loc>
  <lastmod>2023-12-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-role-of-threat-intelligence-in-modern-penetration-testing</loc>
  <lastmod>2023-12-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-validate-whether-a-vulnerability-is-truly-exploitable-in-your-environment</loc>
  <lastmod>2023-12-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-most-common-misconfigurations-discovered-during-internal-network-tests</loc>
  <lastmod>2023-12-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-phishing-simulations-differ-from-real-adversary-social-engineering-campaigns</loc>
  <lastmod>2023-12-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-a-crest-aligned-penetration-testing-methodology-actually-involve</loc>
  <lastmod>2023-12-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-penetration-testing-support-iso-27001-compliance-rather-than-simply-tick-a-box</loc>
  <lastmod>2023-12-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-makes-a-web-application-penetration-test-genuinely-thorough</loc>
  <lastmod>2023-12-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-assess-authentication-and-session-management-weaknesses</loc>
  <lastmod>2023-12-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-is-lateral-movement-often-the-most-damaging-phase-of-an-attack</loc>
  <lastmod>2023-12-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-approach-active-directory-security-in-complex-enterprise-environments</loc>
  <lastmod>2023-12-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-privilege-escalation-and-how-easily-can-it-occur-in-mature-organisations</loc>
  <lastmod>2023-12-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-safely-exploit-vulnerabilities-without-disrupting-live-business-systems</loc>
  <lastmod>2023-12-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-biggest-misconceptions-boards-have-about-penetration-testing</loc>
  <lastmod>2023-12-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-evaluate-third-party-and-supply-chain-exposure</loc>
  <lastmod>2023-12-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-risks-of-relying-solely-on-automated-testing-tools</loc>
  <lastmod>2023-12-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-assess-cloud-environments-differently-from-on-premise-infrastructure</loc>
  <lastmod>2023-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-uncover-weaknesses-in-remote-working-and-vpn-architectures</loc>
  <lastmod>2023-12-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-should-findings-from-a-penetration-test-feed-into-a-vulnerability-management-programme</loc>
  <lastmod>2023-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-a-high-quality-executive-summary-in-a-penetration-test-report-look-like</loc>
  <lastmod>2023-11-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-quantify-the-likelihood-of-exploitation-in-the-wild</loc>
  <lastmod>2023-11-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-typical-root-causes-behind-recurring-critical-vulnerabilities</loc>
  <lastmod>2023-11-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-does-physical-penetration-testing-differ-from-digital-testing</loc>
  <lastmod>2023-11-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-a-penetration-test-demonstrate-resilience-against-ransomware</loc>
  <lastmod>2023-11-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-approach-api-security-assessments</loc>
  <lastmod>2023-11-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-early-warning-signs-that-your-organisation-is-ready-for-a-red-team-simulation</loc>
  <lastmod>2023-11-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-businesses-ensure-their-remediation-actions-are-effective-after-a-test</loc>
  <lastmod>2023-11-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-value-of-retesting-and-when-should-it-be-conducted</loc>
  <lastmod>2023-11-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-simulate-insider-threat-scenarios</loc>
  <lastmod>2023-11-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-role-does-password-hygiene-still-play-in-modern-breach-scenarios</loc>
  <lastmod>2023-11-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-are-wireless-networks-typically-compromised-during-an-engagement</loc>
  <lastmod>2023-11-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-real-impact-of-outdated-ssltls-configurations</loc>
  <lastmod>2023-11-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-measure-attack-surface-exposure-from-publicly-available-information</loc>
  <lastmod>2023-11-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-exploitation-proof-of-concept-actually-mean-in-a-report</loc>
  <lastmod>2023-11-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-penetration-testing-reduce-cyber-insurance-premiums</loc>
  <lastmod>2023-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-ethical-boundaries-of-professional-hacking</loc>
  <lastmod>2023-11-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-balance-stealth-with-evidence-gathering</loc>
  <lastmod>2023-11-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-makes-a-penetration-test-valuable-to-security-operations-teams</loc>
  <lastmod>2023-11-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-should-organisations-prepare-internally-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-11-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-differentiates-a-high-assurance-testing-firm-from-a-commodity-provider</loc>
  <lastmod>2023-11-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-adapt-methodology-when-targeting-operational-technology-or-iot-environments</loc>
  <lastmod>2023-11-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-does-penetration-testing-fit-into-a-broader-detect-defend-and-disrupt-cyber-strategy</loc>
  <lastmod>2023-11-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-much-does-a-penetration-test-cost-for-a-medium-sized-uk-business</loc>
  <lastmod>2023-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-factors-influence-the-price-of-a-penetration-test</loc>
  <lastmod>2023-10-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-long-does-a-typical-penetration-test-take-to-complete</loc>
  <lastmod>2023-10-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-compare-penetration-testing-quotes-from-different-providers</loc>
  <lastmod>2023-10-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-credentials-should-a-penetration-testing-company-hold</loc>
  <lastmod>2023-10-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-crest-check-and-cyber-scheme-certifications</loc>
  <lastmod>2023-09-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-disrupt-our-live-production-systems</loc>
  <lastmod>2023-09-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/do-i-need-board-approval-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-09-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-information-does-a-penetration-testing-provider-need-before-starting</loc>
  <lastmod>2023-09-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-define-the-scope-of-a-penetration-test-properly</loc>
  <lastmod>2023-08-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-happens-if-critical-vulnerabilities-are-found-during-testing</loc>
  <lastmod>2023-08-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/will-the-testers-require-administrative-credentials</loc>
  <lastmod>2023-08-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/should-we-inform-staff-before-conducting-an-internal-penetration-test</loc>
  <lastmod>2023-08-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-confidential-is-the-penetration-testing-report</loc>
  <lastmod>2023-08-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/who-owns-the-data-generated-during-a-penetration-test</loc>
  <lastmod>2023-07-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-protect-sensitive-information-discovered-during-testing</loc>
  <lastmod>2023-07-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-be-done-remotely</loc>
  <lastmod>2023-07-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/do-we-need-cyber-insurance-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-07-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-often-do-regulators-expect-penetration-testing-to-be-performed</loc>
  <lastmod>2023-06-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-evidence-will-i-receive-for-audit-or-compliance-purposes</loc>
  <lastmod>2023-06-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-help-with-cyber-essentials-plus-certification</loc>
  <lastmod>2023-06-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-black-box-grey-box-and-white-box-testing-and-which-should-i-choose</loc>
  <lastmod>2023-06-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-ensure-the-penetration-test-aligns-with-our-specific-industry-risks</loc>
  <lastmod>2023-05-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-we-limit-testing-to-out-of-hours-activity</loc>
  <lastmod>2023-05-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-level-of-reporting-detail-should-i-expect-for-technical-teams-versus-executives</loc>
  <lastmod>2023-05-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/will-testers-attempt-password-spraying-or-brute-force-attacks</loc>
  <lastmod>2023-05-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-providers-ensure-testing-is-legal-and-authorised</loc>
  <lastmod>2023-05-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-contractual-protections-should-be-in-place-before-testing-begins</loc>
  <lastmod>2023-04-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-identify-insider-threats</loc>
  <lastmod>2023-04-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-validate-that-remediation-actions-have-fully-resolved-issues</loc>
  <lastmod>2023-04-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-annual-testing-and-continuous-testing</loc>
  <lastmod>2023-04-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/is-it-better-to-use-the-same-provider-each-year-or-rotate-suppliers</loc>
  <lastmod>2023-03-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-evaluate-the-real-world-experience-of-a-penetration-testing-team</loc>
  <lastmod>2023-03-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-tools-do-professional-penetration-testers-typically-use</loc>
  <lastmod>2023-03-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-simulate-ransomware-deployment-safely</loc>
  <lastmod>2023-03-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-kpis-should-i-measure-to-assess-penetration-testing-effectiveness</loc>
  <lastmod>2023-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testing-results-integrate-with-a-siem-or-soc</loc>
  <lastmod>2023-02-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-typical-turnaround-time-for-a-final-report</loc>
  <lastmod>2023-02-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/are-penetration-tests-covered-under-gdpr-processing-agreements</loc>
  <lastmod>2023-02-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-testing-be-tailored-to-mergers-and-acquisitions-due-diligence</loc>
  <lastmod>2023-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-included-in-a-retest-and-is-it-charged-separately</loc>
  <lastmod>2023-01-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-assess-third-party-saas-platforms</loc>
  <lastmod>2023-01-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-testing-cover-mobile-applications-and-apis-together</loc>
  <lastmod>2023-01-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-ensure-minimal-reputational-risk-during-testing</loc>
  <lastmod>2023-01-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-cyber-maturity-level-should-we-reach-before-commissioning-a-red-team</loc>
  <lastmod>2022-12-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-prepare-our-incident-response-team-for-a-live-test</loc>
  <lastmod>2022-12-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-warning-signs-of-a-low-quality-penetration-testing-provider</loc>
  <lastmod>2022-12-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/should-penetration-testing-be-combined-with-a-vulnerability-management-programme</loc>
  <lastmod>2022-12-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-justify-penetration-testing-expenditure-to-the-board</loc>
  <lastmod>2022-11-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-questions-should-i-ask-before-signing-a-penetration-testing-contract</loc>
  <lastmod>2022-11-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>


</urlset>
