<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 15, 2026 at 9:25 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.razorthorn.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Razorthorn Security</title>
		<link><![CDATA[https://www.razorthorn.com]]></link>
		<description><![CDATA[Razorthorn Security]]></description>
		<lastBuildDate><![CDATA[Tue, 31 Mar 2026 09:59:39 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.razorthorn.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.razorthorn.com/about-razorthorn/meet-the-team/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/about-razorthorn/meet-the-team/]]></link>
			<title>Meet the Team</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 09:59:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/razorthorn-technology-partners/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/razorthorn-technology-partners/]]></link>
			<title>Razorthorn Technology Partners</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:19:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/passwordless-authentication-future-identity-security/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/passwordless-authentication-future-identity-security/]]></link>
			<title>Passwordless Authentication: The Future of Identity Security</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:11:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/achieving-pci-dss-compliance-uk-businesses/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/achieving-pci-dss-compliance-uk-businesses/]]></link>
			<title>Achieving PCI DSS Compliance: A Guide for UK Businesses</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:06:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/third-party-supplier-security/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/third-party-supplier-security/]]></link>
			<title>Third Party Supplier Security: Are Your Vendors Safe?</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:58:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/the-rise-of-deepfakes-in-cybercrime/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/the-rise-of-deepfakes-in-cybercrime/]]></link>
			<title>Trust Nothing: The Rise of Deepfakes in Cybercrime</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/deepfake-fraud-in-business/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/deepfake-fraud-in-business/]]></link>
			<title>Deepfake Fraud in Business &#8211; Can You Trust What You See?</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:39:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-testing/penetration-testing-service/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-testing/penetration-testing-service/]]></link>
			<title>CREST Accredited Penetration Testing</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:34:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/defending-identity-how-to-protect-against-ai-attacks/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/defending-identity-how-to-protect-against-ai-attacks/]]></link>
			<title>Defending Identity: How To Protect Against AI Attacks</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 11:48:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/third-party-risk-management/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/third-party-risk-management/]]></link>
			<title>Third Party Risk Management</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 13:04:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/managed-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/managed-threat-intelligence/]]></link>
			<title>Managed Threat Intelligence from Razorthorn Security</title>
			<pubDate><![CDATA[Wed, 18 Feb 2026 13:26:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/the-digital-operational-resilience-act-dora-what-you-need-to-know/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/the-digital-operational-resilience-act-dora-what-you-need-to-know/]]></link>
			<title>DORA Compliance: What Financial Institutions Need to Know</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 16:36:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-testing/physical-red-team-assessment/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-testing/physical-red-team-assessment/]]></link>
			<title>Physical Red Team Assessment</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 11:07:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/vendor/identifai/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/vendor/identifai/]]></link>
			<title>identifAI</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:23:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-review/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-review/]]></link>
			<title>Cybersecurity Review: Identify Security Gaps and Strengthen Your Defences</title>
			<pubDate><![CDATA[Tue, 09 Dec 2025 16:41:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-testing/security-control-assessment/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-testing/security-control-assessment/]]></link>
			<title>Security Control Assessment: Validate Security Tool Effectiveness</title>
			<pubDate><![CDATA[Tue, 09 Dec 2025 15:51:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/dora-compliance/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/dora-compliance/]]></link>
			<title>DORA Compliance Consultancy for Financial Institutions</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 11:21:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/ciso-as-a-service/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/ciso-as-a-service/]]></link>
			<title>CISO as a Service: Cost-Effective Security Leadership</title>
			<pubDate><![CDATA[Thu, 11 Dec 2025 11:08:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/sme-cyber-security-insurance-affordable-defence/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/sme-cyber-security-insurance-affordable-defence/]]></link>
			<title>How to Build Effective &amp; Affordable Cyber Defences for SMEs</title>
			<pubDate><![CDATA[Thu, 04 Dec 2025 12:52:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cybersecurity-burnout-preparing-staff-for-reality/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cybersecurity-burnout-preparing-staff-for-reality/]]></link>
			<title>Burnout in Cybersecurity: Preparing Cyber Staff for the Reality, Not Just the Role</title>
			<pubDate><![CDATA[Mon, 15 Dec 2025 15:35:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-insurance-myths-uk-businesses/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-insurance-myths-uk-businesses/]]></link>
			<title>3 Common Cyber Insurance Myths (and Why They’re Costing You Money)</title>
			<pubDate><![CDATA[Fri, 28 Nov 2025 10:36:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/dora-third-party-compliance/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/dora-third-party-compliance/]]></link>
			<title>DORA Third Party Compliance: Essential Requirements for Financial Services</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:00:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/future-of-authentication-passwordless-security/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/future-of-authentication-passwordless-security/]]></link>
			<title>The Death of Passwords: The Future of Authentication</title>
			<pubDate><![CDATA[Thu, 27 Nov 2025 12:49:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/about-razorthorn/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/about-razorthorn/]]></link>
			<title>About Razorthorn Security</title>
			<pubDate><![CDATA[Wed, 19 Nov 2025 12:38:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/]]></link>
			<title>Razorthorn Security &#8211; Leaders in Cybersecurity Consultancy</title>
			<pubDate><![CDATA[Wed, 08 Oct 2025 12:19:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/contact-us/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 18 Nov 2025 16:18:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/watch-interview-with-ian-murphy-ceo-cyberoff/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/watch-interview-with-ian-murphy-ceo-cyberoff/]]></link>
			<title>Watch: Interview with Ian Murphy, CEO, CyberOff</title>
			<pubDate><![CDATA[Wed, 22 Oct 2025 10:50:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/pci-dss-consultancy-and-qsa-auditing/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/pci-dss-consultancy-and-qsa-auditing/]]></link>
			<title>PCI DSS Consultancy and QSA Auditing</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 11:07:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/security-vs-privacy-the-ethics-of-data-collection/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/security-vs-privacy-the-ethics-of-data-collection/]]></link>
			<title>Security vs Privacy: The Ethics of Data Collection</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 10:59:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/the-art-of-digital-war/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/the-art-of-digital-war/]]></link>
			<title>The Art of Digital War</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 10:51:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/managed-vulnerability-scanning/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/managed-vulnerability-scanning/]]></link>
			<title>Managed Vulnerability Scanning &#038; Patch Management</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 10:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/]]></link>
			<title>Cybersecurity Consultancy</title>
			<pubDate><![CDATA[Tue, 18 Nov 2025 10:42:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-testing/razors-edge-ctem/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-testing/razors-edge-ctem/]]></link>
			<title>Razor&#8217;s Edge CTEM Platform</title>
			<pubDate><![CDATA[Wed, 22 Oct 2025 15:34:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-testing/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-testing/]]></link>
			<title>Cybersecurity Testing</title>
			<pubDate><![CDATA[Tue, 18 Nov 2025 10:39:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/achieving-soc-2-compliance-compliance-with-razorthorn/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/achieving-soc-2-compliance-compliance-with-razorthorn/]]></link>
			<title>Achieving SOC 2 Compliance with Razorthorn</title>
			<pubDate><![CDATA[Tue, 11 Nov 2025 16:22:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/ai-powered-cyber-attacks/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/ai-powered-cyber-attacks/]]></link>
			<title>AI-Powered Cyber Attacks: Detection &amp; Defence Strategies</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 11:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/the-psychological-toll-of-working-in-cybersecurity/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/the-psychological-toll-of-working-in-cybersecurity/]]></link>
			<title>The Psychological Toll of Working in Cybersecurity &#8211; When You Can&#8217;t Unsee What You&#8217;ve Seen</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 10:56:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-insurance-for-smes/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-insurance-for-smes/]]></link>
			<title>Cyber Insurance for SMEs: Reducing Premiums with Security</title>
			<pubDate><![CDATA[Thu, 13 Nov 2025 10:36:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/managed-cyber-security-services/]]></link>
			<title>Managed Security Services</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/securing-your-software-development-lifecycle/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/securing-your-software-development-lifecycle/]]></link>
			<title>Securing your Software Development Lifecycle</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:28:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/hacking-myths/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/hacking-myths/]]></link>
			<title>Hacking Myths | The Truth About Hacking</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:26:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/dora-compliance-resource-hub/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/dora-compliance-resource-hub/]]></link>
			<title>DORA Compliance Resource Hub</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:23:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/chatgpt-vs-cyber-threats-the-real-role-of-ai-in-cybersecurity/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/chatgpt-vs-cyber-threats-the-real-role-of-ai-in-cybersecurity/]]></link>
			<title>ChatGPT vs Cyber Threats &#8211; The REAL Role of AI in Cybersecurity</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:19:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/beyond-snapshots-the-need-for-continuous-penetration-testing/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/beyond-snapshots-the-need-for-continuous-penetration-testing/]]></link>
			<title>Beyond Snapshots: The Need For Continuous Penetration Testing</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:14:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/beyond-buzzwords-the-truth-about-ai/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/beyond-buzzwords-the-truth-about-ai/]]></link>
			<title>Beyond Buzzwords: The Truth About AI</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:12:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/dora-nis2-the-cybersecurity-regulation-revolution/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/dora-nis2-the-cybersecurity-regulation-revolution/]]></link>
			<title>DORA and NIS2: The Cybersecurity Regulation Revolution</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:12:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/blog/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/blog/]]></link>
			<title>Blog, Videos &#038; Podcast</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:10:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/generative-ai-security/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/generative-ai-security/]]></link>
			<title>Generative AI Security: Why Protection Can&#8217;t Keep Pace with Innovation</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:04:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/privacy-policy/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:03:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/nist-compliance/]]></guid>
			<link><![CDATA[https://www.razorthorn.com/cyber-security-consultancy/cyber-security-compliance/nist-compliance/]]></link>
			<title>Achieving NIST Compliance with Razorthorn</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:02:39 +0000]]></pubDate>
		</item>
				</channel>
</rss>
