<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 23:28 by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://maheshcg.me/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Mahesh CG</title>
		<link><![CDATA[https://maheshcg.me]]></link>
		<description><![CDATA[Mahesh CG]]></description>
		<lastBuildDate><![CDATA[Wed, 25 Jan 2023 16:37:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://maheshcg.me/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://maheshcg.me/navigating-governance-risk-management-and-compliance-with-grc/]]></guid>
			<link><![CDATA[https://maheshcg.me/navigating-governance-risk-management-and-compliance-with-grc/]]></link>
			<title>&lt;strong&gt;Navigating Governance, Risk Management, and Compliance with GRC&lt;/strong&gt;</title>
			<pubDate><![CDATA[Wed, 25 Jan 2023 16:37:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/unlocking-the-differences-a-closer-look-at-identity-and-access-management-iam-and-privileged-access-management-pam/]]></guid>
			<link><![CDATA[https://maheshcg.me/unlocking-the-differences-a-closer-look-at-identity-and-access-management-iam-and-privileged-access-management-pam/]]></link>
			<title>&lt;strong&gt;Unlocking the Differences: A Closer Look at Identity and Access Management (IAM) and Privileged Access Management (PAM)&lt;/strong&gt;</title>
			<pubDate><![CDATA[Wed, 18 Jan 2023 15:48:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_8/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_8/]]></link>
			<title>LinkedIn Recommendation_8</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:25:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_7/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_7/]]></link>
			<title>LinkedIn Recommendation_7</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:22:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_5/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_5/]]></link>
			<title>LinkedIn Recommendation_5</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:19:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_3/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_3/]]></link>
			<title>LinkedIn Recommendation_3</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:17:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_4/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_4/]]></link>
			<title>LinkedIn Recommendation_4</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:17:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_6/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_6/]]></link>
			<title>LinkedIn Recommendation_6</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:16:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_2/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_2/]]></link>
			<title>LinkedIn Recommendation_2</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:08:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_1/]]></guid>
			<link><![CDATA[https://maheshcg.me/testimonial/linkedin-recommendation_1/]]></link>
			<title>LinkedIn Recommendation_1</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:07:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/recommendations/]]></guid>
			<link><![CDATA[https://maheshcg.me/recommendations/]]></link>
			<title>Recommendations</title>
			<pubDate><![CDATA[Wed, 14 Dec 2022 10:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/the-importance-of-zero-trust-in-todays-remote-workforce/]]></guid>
			<link><![CDATA[https://maheshcg.me/the-importance-of-zero-trust-in-todays-remote-workforce/]]></link>
			<title>The Importance of Zero Trust in Today&#8217;s Remote Workforce</title>
			<pubDate><![CDATA[Wed, 08 Feb 2023 20:00:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/dataprivacynews/]]></guid>
			<link><![CDATA[https://maheshcg.me/dataprivacynews/]]></link>
			<title>Data Privacy News</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 13:17:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/enhancing-cybersecurity-governance-key-metrics-and-reporting-for-grc/]]></guid>
			<link><![CDATA[https://maheshcg.me/enhancing-cybersecurity-governance-key-metrics-and-reporting-for-grc/]]></link>
			<title>Enhancing Cybersecurity Governance: Key Metrics and Reporting for GRC</title>
			<pubDate><![CDATA[Thu, 24 Aug 2023 16:42:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/navigating-ndmos-standards-on-data-management-of-saudi-arabia/]]></guid>
			<link><![CDATA[https://maheshcg.me/navigating-ndmos-standards-on-data-management-of-saudi-arabia/]]></link>
			<title>Navigating NDMO&#8217;s Standards on Data Management of Saudi Arabia</title>
			<pubDate><![CDATA[Thu, 20 Jul 2023 15:53:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/the-crucial-role-of-data-governance-in-the-modern-business-landscape/]]></guid>
			<link><![CDATA[https://maheshcg.me/the-crucial-role-of-data-governance-in-the-modern-business-landscape/]]></link>
			<title>The Crucial Role of Data Governance in the Modern Business Landscape</title>
			<pubDate><![CDATA[Thu, 17 Aug 2023 17:06:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/protecting-yourself-from-scammers-safeguarding-data-privacy-in-the-digital-age/]]></guid>
			<link><![CDATA[https://maheshcg.me/protecting-yourself-from-scammers-safeguarding-data-privacy-in-the-digital-age/]]></link>
			<title>Protecting Yourself from Scammers: Safeguarding Data Privacy in the Digital Age</title>
			<pubDate><![CDATA[Thu, 13 Jul 2023 08:47:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/hacking-the-human-mind-exploring-neurosecurity-and-cognitive-biases-in-cybersecurity/]]></guid>
			<link><![CDATA[https://maheshcg.me/hacking-the-human-mind-exploring-neurosecurity-and-cognitive-biases-in-cybersecurity/]]></link>
			<title>Hacking the Human Mind: Exploring Neurosecurity and Cognitive Biases in Cybersecurity</title>
			<pubDate><![CDATA[Thu, 03 Aug 2023 17:08:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/how-important-is-cyber-security-at-christmas/]]></guid>
			<link><![CDATA[https://maheshcg.me/how-important-is-cyber-security-at-christmas/]]></link>
			<title>How Important Is Cyber Security at Christmas?</title>
			<pubDate><![CDATA[Sun, 25 Dec 2022 10:33:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/blogs/]]></guid>
			<link><![CDATA[https://maheshcg.me/blogs/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Sun, 15 Jan 2023 20:41:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/understanding-vulnerability-assessment-and-penetration-testing-vapt-techniques-tools-and-best-practices/]]></guid>
			<link><![CDATA[https://maheshcg.me/understanding-vulnerability-assessment-and-penetration-testing-vapt-techniques-tools-and-best-practices/]]></link>
			<title>Understanding Vulnerability Assessment and Penetration Testing (VAPT): Techniques, Tools, and Best Practices</title>
			<pubDate><![CDATA[Sun, 15 Jan 2023 17:11:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/cybersecurity-career-path/]]></guid>
			<link><![CDATA[https://maheshcg.me/cybersecurity-career-path/]]></link>
			<title>Cybersecurity Career Path</title>
			<pubDate><![CDATA[Sun, 15 Jan 2023 16:50:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/understanding-it-asset-discovery-tools-how-they-work-and-their-importance-in-managing-it-infrastructures/]]></guid>
			<link><![CDATA[https://maheshcg.me/understanding-it-asset-discovery-tools-how-they-work-and-their-importance-in-managing-it-infrastructures/]]></link>
			<title>Understanding IT Asset Discovery Tools: How They Work and Their Importance in Managing IT Infrastructures</title>
			<pubDate><![CDATA[Sun, 12 Mar 2023 19:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/what-is-it-governance-a-formal-way-to-align-it-business-strategy/]]></guid>
			<link><![CDATA[https://maheshcg.me/what-is-it-governance-a-formal-way-to-align-it-business-strategy/]]></link>
			<title>What is IT governance? A formal way to align IT &amp; business strategy</title>
			<pubDate><![CDATA[Sun, 11 Dec 2022 22:17:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/what-is-the-cia-triad/]]></guid>
			<link><![CDATA[https://maheshcg.me/what-is-the-cia-triad/]]></link>
			<title>What is The CIA TRIAD?</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 18:31:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/risk-management/]]></guid>
			<link><![CDATA[https://maheshcg.me/risk-management/]]></link>
			<title>Risk Management</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 11:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/privileged-access-management-pam/]]></guid>
			<link><![CDATA[https://maheshcg.me/privileged-access-management-pam/]]></link>
			<title>Privileged Access Management (PAM)</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 11:02:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/passwordless-the-future-of-authentication/]]></guid>
			<link><![CDATA[https://maheshcg.me/passwordless-the-future-of-authentication/]]></link>
			<title>Passwordless &#8211; The Future of Authentication</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 11:00:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/in-pursuit-of-digital-trust/]]></guid>
			<link><![CDATA[https://maheshcg.me/in-pursuit-of-digital-trust/]]></link>
			<title>IN PURSUIT OF DIGITAL TRUST</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 10:54:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/uber-hacked-full-access-granted-to-hacker/]]></guid>
			<link><![CDATA[https://maheshcg.me/uber-hacked-full-access-granted-to-hacker/]]></link>
			<title>Uber Hacked &#8211; Full Access Granted to Hacker</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 10:51:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/how-the-u-s-government-is-spending-billions-on-cybersecurity/]]></guid>
			<link><![CDATA[https://maheshcg.me/how-the-u-s-government-is-spending-billions-on-cybersecurity/]]></link>
			<title>How the U.S. Government is Spending Billions on Cybersecurity?</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 10:48:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/the-largest-ddos-attack-ever-recorded-by-google-recorded-at-46-million-requests-per-second/]]></guid>
			<link><![CDATA[https://maheshcg.me/the-largest-ddos-attack-ever-recorded-by-google-recorded-at-46-million-requests-per-second/]]></link>
			<title>The Largest DDoS Attack Ever Recorded By Google Recorded At 46 Million Requests Per Second</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 10:47:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/five-tips-for-securing-your-email-from-hackers/]]></guid>
			<link><![CDATA[https://maheshcg.me/five-tips-for-securing-your-email-from-hackers/]]></link>
			<title>Five Tips For Securing Your Email From Hackers</title>
			<pubDate><![CDATA[Sun, 04 Dec 2022 10:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/why-soc-is-crucial-for-protecting-your-business-understanding-the-importance-of-security-operations-centre/]]></guid>
			<link><![CDATA[https://maheshcg.me/why-soc-is-crucial-for-protecting-your-business-understanding-the-importance-of-security-operations-centre/]]></link>
			<title>Why SOC is Crucial for Protecting Your Business: Understanding the Importance of Security Operations Centre</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 17:23:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/the-impact-of-gdpr-compliance-on-data-security-and-privacy/]]></guid>
			<link><![CDATA[https://maheshcg.me/the-impact-of-gdpr-compliance-on-data-security-and-privacy/]]></link>
			<title>The Impact of GDPR Compliance on Data Security and Privacy</title>
			<pubDate><![CDATA[Sat, 24 Jun 2023 17:15:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/download-my-resume/]]></guid>
			<link><![CDATA[https://maheshcg.me/download-my-resume/]]></link>
			<title>Download my Resume</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 23:46:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/]]></guid>
			<link><![CDATA[https://maheshcg.me/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 29 Dec 2025 20:42:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/the-swiss-cheese-cyber-security-defense-in-depth-model/]]></guid>
			<link><![CDATA[https://maheshcg.me/the-swiss-cheese-cyber-security-defense-in-depth-model/]]></link>
			<title>The Swiss Cheese Cyber Security Defense-in-Depth Model</title>
			<pubDate><![CDATA[Mon, 26 Dec 2022 17:51:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/cybersecurity-and-ai-ethics-striking-a-balance-between-innovation-and-responsibility/]]></guid>
			<link><![CDATA[https://maheshcg.me/cybersecurity-and-ai-ethics-striking-a-balance-between-innovation-and-responsibility/]]></link>
			<title>Cybersecurity and AI Ethics: Striking a Balance Between Innovation and Responsibility</title>
			<pubDate><![CDATA[Fri, 28 Jul 2023 09:06:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://maheshcg.me/exploring-the-capabilities-of-chatgpt-in-enhancing-cybersecurity-measures/]]></guid>
			<link><![CDATA[https://maheshcg.me/exploring-the-capabilities-of-chatgpt-in-enhancing-cybersecurity-measures/]]></link>
			<title>Exploring the Capabilities of ChatGPT in Enhancing Cybersecurity Measures</title>
			<pubDate><![CDATA[Fri, 20 Jan 2023 18:09:54 +0000]]></pubDate>
		</item>
				</channel>
</rss>
