<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//itbezpecnost.sk/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/tyzdenne-patch-priority-top-5-zranitelnosti-29-12-2025-4-1-2026/</loc>
		<lastmod>2026-01-01T14:01:41+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2025/12/template-weekly-patching.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-a-bezpecnost/threat-model-pre-ai-ako-bezpecne-prepojit-jazykove-modely-s-firemnymi-datami/</loc>
		<lastmod>2026-01-01T14:46:06+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2025/12/ai-llm-thread-model.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/it-governance-nie-je-byrokracia-cesta-od-firefightingu-k-riadenej-sluzbe/</loc>
		<lastmod>2026-01-01T15:27:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/ai-governance.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/kyberneticka-bezpecnost/ransomware-v-roku-2026-preco-firmy-stale-padaju-a-co-realne-funguje/</loc>
		<lastmod>2026-01-01T19:50:36+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/ransomware.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/kyberneticka-bezpecnost/immutable-backup/</loc>
		<lastmod>2026-01-02T16:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/immutablebackup.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/ai-act/ai-act-co-to-je-odkedy-plati-a-na-koho-sa-vztahuje/</loc>
		<lastmod>2026-01-03T11:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/ai-act-final.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/ai-act-v-praxi-rizika-a-povinnosti/</loc>
		<lastmod>2026-01-03T12:02:46+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/2ai-act-final.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/kyberneticka-bezpecnost/glassworm-malware-macos-vscode-krypto/</loc>
		<lastmod>2026-01-03T23:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/glassworm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/yzdenne-patch-priority-react-ransomware-cisco-ibm/</loc>
		<lastmod>2026-01-05T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/zranitelnosti2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-a-bezpecnost/rag-poisoning-knowledge-base-utok-ai/</loc>
		<lastmod>2026-01-06T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/rag2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/decision-log-it-governance-chaos/</loc>
		<lastmod>2026-01-07T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/decision-log.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/data-act-cloud-switching-exit-runbook/</loc>
		<lastmod>2026-01-09T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/dataact2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/eu-data-act-iot-vendor-lock-in/</loc>
		<lastmod>2026-01-08T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/dataact1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/patch-priority-trend-micro-hpe-macos-office/</loc>
		<lastmod>2026-01-12T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/vulne-3tyzden.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/raci-matica-v-it-zodpovednosti-governance-incident-change/</loc>
		<lastmod>2026-01-11T18:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/raci.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-a-bezpecnost/apple-gemini-siri-bezpecnost-dat-mdm-analyza/</loc>
		<lastmod>2026-01-13T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/gemini-apple.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-a-bezpecnost/mcp-public-llm-bezpecnost/</loc>
		<lastmod>2026-01-14T20:57:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/mcp-llm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/patch-priority-26-01-2026-cisco-fortinet-gitlab/</loc>
		<lastmod>2026-01-25T19:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/tyzden4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/tyzdenne-patch-priority-2026-02-02-02-08/</loc>
		<lastmod>2026-02-01T18:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/zranitelnosti.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-a-bezpecnost/moltbook-bezpecnost-ai-agentov-podvod-analyza/</loc>
		<lastmod>2026-02-03T21:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/moltenF.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/moltenbook1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/molten2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/supply-chain-utoky-riziko-dodavatelia/</loc>
		<lastmod>2026-02-04T20:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/chain-attack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/chain-attack1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/supply-chain2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/tyzdenne-patch-priority-09-02-15-02-2026/</loc>
		<lastmod>2026-02-08T17:58:06+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/zranitelnosti-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/kyberneticka-bezpecnost/paradox-komplexnosti-viac-bezpecnostnych-nastrojov-menej-bezpecia/</loc>
		<lastmod>2026-02-09T19:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/vela.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/drahe.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/done.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/shadow-it-rizika-a-riesenie-2026/</loc>
		<lastmod>2026-02-11T21:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/shadow-it.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/tyzdenne-patch-priority-2026-02-16-22/</loc>
		<lastmod>2026-02-15T19:17:45+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/patch15-22-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/cra-pqc-it-bezpecnost-2026-analyza/</loc>
		<lastmod>2026-02-22T18:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/cra.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/zranitelnosti/tyzdenne-patch-priority-23-02-01-03-ivanti-epmm-chrome-dell-recoverpoint-wordpress-windows-admin-center/</loc>
		<lastmod>2026-02-23T20:27:33+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/02/weekly26-2-01-03.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/dora/dora-incident-response-dokument-nestaci/</loc>
		<lastmod>2026-03-02T18:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/03/dora.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/ai-and-security/openclaw-bezpecnostna-analyza-mac-mini-ai-agent-riziko/</loc>
		<lastmod>2026-03-09T20:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/03/openclaw.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/it-governance/shadow-ai-ai-agenti-bezpecnostne-riziko-firmy-2026/</loc>
		<lastmod>2026-03-24T16:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/03/ai_agenti.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/nis2-zokb/nis2-zakon-kyberneticka-bezpecnost-slovensko-2026/</loc>
		<lastmod>2026-03-27T20:52:50+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/03/nis2-checklist-povinnosti-firmy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/iso-27001/iso-27001-bez-omacky-isms/</loc>
		<lastmod>2026-04-03T23:02:41+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/01/iso27001.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/regulacie/nis2-zokb/iso-27001-nis2-slovensko-porovnanie/</loc>
		<lastmod>2026-04-04T11:44:18+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/04/iso-27001-nis2-slovensko-porovnanie.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/iso-27001/chyby-pri-implementacii-isms/</loc>
		<lastmod>2026-04-04T13:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/04/chyby-pri-implementacii-isms.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itbezpecnost.sk/iso-27001/iso-27001-implementacia-isms-krok-za-krokom/</loc>
		<lastmod>2026-04-04T13:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://itbezpecnost.sk/wp-content/uploads/2026/04/iso-27001-implementacia-isms-krok-za-krokom.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->