<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
	<loc>https://guardian.jpn.com/security/</loc>
	<lastmod>2026-04-02</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/accounts/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/ai/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/cloud-supply/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/cross-techniques/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/data-privacy/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/devices/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/grc/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/insider-physical/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/networking/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/scams/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
	<loc>https://guardian.jpn.com/security/web-api/</loc>
	<lastmod>2026-01-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/spyware-keylogger/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/fake-captcha/</loc>
<lastmod>2025-10-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/fake-captcha/news/alert/</loc>
<lastmod>2025-10-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/data-breach/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/insider-threat/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/zero-day/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/prompt-injection/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/corporate-governance/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/account-takeover/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/cryptojacking/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/mitm-session-hijack/</loc>
<lastmod>2025-10-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/xss/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/social-engineering/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/misconfiguration/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/accidental-exposure/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/shoulder-surfing-theft-usb/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/priv-esc-lateral/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/jailbreak/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/policy-risk-management/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/mfa-bypass/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/botnet/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/csrf/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/apt/</loc>
<lastmod>2025-10-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/pii-leakage/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/tailgating/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/living-off-the-land/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/training-data-poisoning/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/audit-compliance/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/oauth-sso-abuse/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/drive-by-malvertising/</loc>
<lastmod>2025-10-09</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/dns-cache-poisoning-domain-hijack/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/ssrf/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/bec/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/vulnerable-dependencies/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/shadow-it/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/rogue-usb-badusb/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/credential-dumping/</loc>
<lastmod>2025-10-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/model-exfiltration/</loc>
<lastmod>2025-10-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/bcp-dr/</loc>
<lastmod>2025-10-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/xxe/</loc>
<lastmod>2025-10-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/insecure-deserialization/</loc>
<lastmod>2025-10-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/os-command-injection/</loc>
<lastmod>2025-10-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/smishing-vishing-sns/</loc>
<lastmod>2025-10-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/watering-hole/</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/update-hijacking/</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/backup-tampering/</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/sim-swap/</loc>
<lastmod>2025-10-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/adware/</loc>
<lastmod>2025-10-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/directory-traversal/</loc>
<lastmod>2025-10-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/deepfake-fraud/</loc>
<lastmod>2025-10-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/deepfake-fraud/news/alert/</loc>
<lastmod>2025-10-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/dependency-confusion/</loc>
<lastmod>2025-10-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/third-party-risk/</loc>
<lastmod>2025-10-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/request-smuggling/</loc>
<lastmod>2025-10-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/clickjacking/</loc>
<lastmod>2025-10-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/api-bola/</loc>
<lastmod>2025-10-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/idor/</loc>
<lastmod>2025-10-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/qr-phishing/</loc>
<lastmod>2025-10-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/password-spraying/</loc>
<lastmod>2025-10-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/rootkit/</loc>
<lastmod>2025-10-18</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/bgp-hijacking/</loc>
<lastmod>2025-10-18</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/rate-limit-missing/</loc>
<lastmod>2025-10-18</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/cors-misconfig/</loc>
<lastmod>2025-10-20</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/tech-support-scam/</loc>
<lastmod>2025-10-20</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/package-typosquatting/</loc>
<lastmod>2025-10-20</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/eol-eos/</loc>
<lastmod>2025-10-21</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/eol-eos/news/alert-windows10/</loc>
<lastmod>2025-10-21</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/n-day/</loc>
<lastmod>2025-10-21</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/over-privileged-sharing/</loc>
<lastmod>2025-10-21</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/incident-response/</loc>
<lastmod>2025-10-22</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/open-redirect/</loc>
<lastmod>2025-10-22</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/ssti/</loc>
<lastmod>2025-10-22</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/sns-investment/</loc>
<lastmod>2025-10-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/exposed-buckets/</loc>
<lastmod>2025-10-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/</loc>
<lastmod>2025-10-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/pc-infection/</loc>
<lastmod>2025-10-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/windows-defender/</loc>
<lastmod>2025-10-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/windows-support-scam/</loc>
<lastmod>2025-10-25</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/infected-now/</loc>
<lastmod>2025-10-25</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/removal-guide/</loc>
<lastmod>2025-10-25</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/check-infection/</loc>
<lastmod>2025-10-27</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/smartphone/</loc>
<lastmod>2025-10-27</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/iphone/</loc>
<lastmod>2025-10-27</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/android/</loc>
<lastmod>2025-10-28</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/vs-virus/</loc>
<lastmod>2025-10-28</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/vs-malware/</loc>
<lastmod>2025-10-28</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/security-software/</loc>
<lastmod>2025-10-29</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/news/free-tools/</loc>
<lastmod>2025-10-29</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/simple-explanation/</loc>
<lastmod>2025-10-29</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/mythology/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/symptoms/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/cyber-attack-escalation/</loc>
<lastmod>2025-10-28</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/danger-signals/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/first-24-hours/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/quick-check/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/help-others/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/consultation-guide/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/what-is/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/methods-overview/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/psychology-basics/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/news/report-2025/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/news/fake-investment-sites/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/international-transfer/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/damage-response/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/news/secondary-scam/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/news/cases-2025/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/fake-professions/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/criminal-network/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/news/ai-deepfake/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/photo-verification/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/psychology/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/vulnerable-targets/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/women-guide/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/elderly-protection/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/men-victims/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/stalking-risk/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/checklist/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/verification-guide/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/emergency-response/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/device-security/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/victim-stories/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/recovery-stories/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/legal-recovery/</loc>
<lastmod>2025-10-30</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/column/basic-guide/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/column/sme-protection/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/column/technical-implementation/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/column/industry-cases/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/replay/news/trends-2025/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/news/damage-cases/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/news/emotet/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/ransomware-link/</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/news/2025-threats/</loc>
<lastmod>2025-11-01</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/enterprise-defense/</loc>
<lastmod>2025-11-01</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/history-evolution/</loc>
<lastmod>2025-11-01</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/macos/</loc>
<lastmod>2025-11-02</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/trojan/column/faq-100/</loc>
<lastmod>2025-11-02</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/wiper-malware/</loc>
<lastmod>2025-11-02</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/romance-scam/column/sns-investment/checklist/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/what-is-unauthorized-access/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/methods-types/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/prohibition-law/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/news/incidents-2025/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/sme-protection/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/authentication-guide/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/emergency-response/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/detection-methods/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/waf-implementation/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/vulnerability-testing/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/ransomware-connection/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/ec-web-security/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/critical-infrastructure/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/sns-security/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/remote-work-security/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/unauthorized-access/column/supply-chain-defense/</loc>
<lastmod>2025-11-03</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/beginner-guide/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/incident-cases/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/sme-guide/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/engineer-guide/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/waf-defense/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/mfa-implementation/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/password-manager/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/column/incident-response/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/news/ransomware-prevention/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/credential-stuffing/news/supply-chain-security/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/session-fixation-cookie-theft/</loc>
<lastmod>2025-11-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/mechanism-flow/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/reverse-attack/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/attack-comparison/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/sme-protection-guide/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/waf-protection/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/password-management-2025/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/news/cases-trends-2025/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/ransomware-connection/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/beginner-guide/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/technical-implementation/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/brute-force/column/mfa-defense/</loc>
<lastmod>2025-11-05</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/evil-twin-rogue-wifi/</loc>
<lastmod>2025-11-06</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/beginner-guide/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/sme-protection/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/waf-implementation/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/cdn-defense/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/attack-methods/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/incident-response/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/news/trends-2025/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/multilayer-defense/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/legal-insurance/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/bcp-integration/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/ai-defense/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/ddos/column/zero-day-defense/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/security-awareness-training/</loc>
<lastmod>2025-11-07</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/insecure-file-upload/</loc>
<lastmod>2025-11-08</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/attack-methods/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/damage-cases/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/xss-difference/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/placeholder-implementation/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/escape-processing/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/waf-protection/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/sme-security-measures/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/aws-waf-implementation/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/vulnerability-assessment/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/nosql-injection-defense/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/column/audit-checklist/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/news/supply-chain-risks/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/news/incident-response-manual/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/sql-injection/news/ai-security-measures/</loc>
<lastmod>2025-11-10</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/vulnerability-management/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/investment-crypto-scam/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/stalkerware-mobile/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/secret-leakage/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/fake-app-fake-site/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/data-exfiltration/</loc>
<lastmod>2025-11-11</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/fake-job-scam/</loc>
<lastmod>2025-11-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/data-retention-misconfig/</loc>
<lastmod>2025-11-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/c2-beaconing-evasion/</loc>
<lastmod>2025-11-12</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/consent-phishing/</loc>
<lastmod>2025-11-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/arp-spoofing/</loc>
<lastmod>2025-11-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/cache-poisoning/</loc>
<lastmod>2025-11-13</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/ci-cd-credential-leaks/</loc>
<lastmod>2025-11-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/improper-disposal/</loc>
<lastmod>2025-11-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/evil-maid/</loc>
<lastmod>2025-11-14</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/model-leakage-pii/</loc>
<lastmod>2025-11-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/rogue-mobile-mdm/</loc>
<lastmod>2025-11-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/accounts/token-theft-reuse/</loc>
<lastmod>2025-11-15</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/networking/exposed-services-scan/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/web-api/subdomain-takeover/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/container-escape/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/data-privacy/logs-sensitive-info/</loc>
<lastmod>2025-11-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/insider-physical/rogue-devices/</loc>
<lastmod>2025-11-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cross-techniques/staging-persistence/</loc>
<lastmod>2025-11-17</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/infection-checklist/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/pc-slow-malware/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/adware-removal/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/email-spam/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/basics/5min-guide/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/email-prevention/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/web-protection/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/usb-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/file-sharing/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/ransomware-guide/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/trojan-detection/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/spyware-defense/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/fileless-protection/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/botnet-detection/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/threat-trends-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/year-end-alert/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/prevention-top10/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/initial-response/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/removal-guide/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/recovery-prevention/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/ir-playbook/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/forensics/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/legal-compliance/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/public-relations/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/support-contacts/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/case-studies/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/ai-response/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/finance-threats-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/healthcare-ransomware-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/manufacturing-security-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/retail-ec-threats-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/education-attacks-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/government-security-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/energy-infrastructure-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/tech-zeroday-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/logistics-threats-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/news/industry/hospitality-privacy-2025/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/security-framework/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/csirt-soc/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/security-training/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/budget-allocation/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/vendor-management/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/bcp-planning/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/zero-trust/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/culture-building/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/cyber-insurance/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/security-audit/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/compliance-management/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/risk-assessment/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/roi-measurement/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/isac-collaboration/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/maturity-assessment/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/post-incident-reform/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/tool-integration/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/privacy-governance/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/supply-chain-management/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/dx-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/endpoint-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/edr-mdr-guide/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/next-gen-antivirus/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/sandbox-technology/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/network-segmentation/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/zero-trust-network/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/siem-soar/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/cloud-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/email-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/web-gateway/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/vulnerability-scanning/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/dlp-implementation/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/backup-strategy/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/threat-intelligence/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/iot-ot-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/api-security/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/authentication-access/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/remote-work/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/patch-management/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/penetration-testing/</loc>
<lastmod>2025-11-16</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/ai/ai-supply-chain/</loc>
<lastmod>2025-11-18</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/grc/secure-sdlc/</loc>
<lastmod>2025-11-18</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/latest-cases/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/statistics-monthly/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/ai-threats/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/police-alerts/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/brand-alerts/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/waf-cdn-defense/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/dmarc-spf-dkim/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/ai-detection/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/siem-analysis/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/api-protection/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/email-phishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/sms-smishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/voice-vishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/qr-quishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/sns-phishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/ai-deepfake/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/realtime-phishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/spear-phishing/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/whaling/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/latest-cases-2025/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/psychological-tricks/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/evolution-history/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/basic-principles/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/email-settings/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/security-tools/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/enterprise-security/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/employee-training/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/authentication/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/sme-measures/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/personal-protection/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/elderly-guide/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/cost-effectiveness/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/insurance/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/verification-method/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/emergency-30min/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/report-authorities/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/financial-recovery/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/evidence-preservation/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/legal-action/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/public-disclosure/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/compensation/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/finance-banking/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/securities/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/e-commerce/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/logistics/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/government/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/healthcare/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/education/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/cryptocurrency/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/news/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/technical/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/techniques/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/incident-response/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/industry/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/scams/phishing/column/defense/site-blocking/</loc>
<lastmod>2025-12-04</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/case-studies/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/legal-responsibility/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/backup-strategy/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/security-tools-comparison/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/zero-trust/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/cloud-security/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/active-directory/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/forensics/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/decryption-tools/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/siem-detection/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/waf-protection/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/file-encrypted-diagnosis/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/emergency-response/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/ransom-email/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/apology-template/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/partner-notification/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/outage-announcement/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/incident-response/screen-locked/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/efs-vs-ransomware/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/education/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/government/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/law-firm/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/construction/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/real-estate/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/healthcare-welfare/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/media-entertainment/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/smb-guide/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/healthcare/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/manufacturing/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/financial/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/retail-ec/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/logistics/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/food-service/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/cyber-insurance/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/case-studies/damage-cost/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/backup-strategy/it-bcp/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/roi-proposal/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/threat-report-2025/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/ai-ransomware/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/threat-actors-2025/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/raas-ecosystem/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/news/threat-trends/supply-chain/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/how-it-works/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/infection-routes/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/history/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/glossary/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/types-methods/vs-malware/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/personal-risk/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/prevention-guide/training-exercise/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/ransomware/column/legal-responsibility/report-format/</loc>
<lastmod>2025-12-19</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/definition/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/methods/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/phishing/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/ransomware/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/prevention/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/faq/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/glossary/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/basics/challenges/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/cases/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/cases/overview/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/cases/japan/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/cases/overseas/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/news/cases/trends-2025/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/guidelines/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/checklist/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/vulnerability/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/detection/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/zero-trust/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/cloud/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/incident/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/management/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/contract/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/questionnaire/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/tprm/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/partner-training/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/bcp/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/vendor/visibility/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/business-risk/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/governance/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/investment/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/reporting/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/crisis/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/legal/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/executive/ma/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/sme/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/sme/guide/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/sme/low-cost/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/sme/requirements/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/attack-types/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/attack-types/software/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/attack-types/business/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/attack-types/service/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/sbom/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/cicd/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/oss/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/npm/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/edi/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/technical/threat-modeling/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/finance/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/retail-ec/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/healthcare/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/education/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/manufacturing/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/automotive/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/critical-infrastructure/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/government/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/global/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/industry/logistics/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/cloud-supply/supply-chain/column/measures/basics/</loc>
<lastmod>2025-12-23</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/malware-analysis/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/backup-strategy/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/evidence-legal/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/ransomware-playbook/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/recovery-continuity/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/root-cause-analysis/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/stakeholder-communication/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/supply-chain-response/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/industry/manufacturing-ot/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/devsecops/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/executive-cyber-risk/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/governance/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/incident-response-team/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/industry-standards/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/roi-evaluation/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/security-policy/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/talent-development/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/organization/user-awareness/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/solutions/byod-management/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/apt-groups/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/fileless-malware/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/iot-ot-malware/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/living-off-land/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/malware-trends/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/malware-types/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/threats/ransomware-groups/</loc>
<lastmod>2025-12-24</lastmod>
</url>
<url>
<loc>https://guardian.jpn.com/security/devices/malware-infection/column/incident/</loc>
<lastmod>2025-12-24</lastmod>
</url>
</urlset>
