<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.9-a.1'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//oda3.org/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://oda3.org/oda3-securing-ai-empowering-defense/</loc>
  <lastmod>2026-05-08T05:51:31Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/ODA3-Securing-AI-Empowering-Defense.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/q1-2026-intelligence-report-the-ai-control-plane-is-the-new-battlefield/</loc>
  <lastmod>2026-05-08T07:19:23Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/2-1536x606-1.webp</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/woocommerce-placeholder/</loc>
  <lastmod>2026-05-08T14:21:51Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/woocommerce-placeholder.webp</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/q1-2026-intelligence-report-the-ai-control-plane-is-the-new-battlefield/</loc>
  <lastmod>2026-05-09T02:39:34Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/2.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/us-government-targets-ai-model-theft-distillation-detection-becomes-national-security-priority/</loc>
  <lastmod>2026-05-09T02:40:22Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/1.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-ai-agent-security-crisis-why-88-of-enterprises-are-already-affected/</loc>
  <lastmod>2026-05-09T02:40:46Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/3.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/rogue-ai-agents-how-to-detect-isolate-and-terminate-unauthorized-autonomous-actors/</loc>
  <lastmod>2026-05-09T02:41:06Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/4.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/preparing-for-eu-ai-act-enforcement-a-100-day-ciso-action-plan/</loc>
  <lastmod>2026-05-09T02:41:34Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/unnamed.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/california-sb-53-catastrophic-ai-risk-definitions-and-what-they-mean-for-your-compliance-program/</loc>
  <lastmod>2026-05-09T02:42:04Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/unnamed1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-hidden-risk-in-your-ai-stack-why-default-configurations-are-a-security-nightmare/</loc>
  <lastmod>2026-05-10T03:13:24Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/screen.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/how-ai-is-reshaping-vulnerability-management-lessons-from-project-glasswing/</loc>
  <lastmod>2026-05-10T03:19:00Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/screen-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/ai-discovered-vulnerabilities-why-legacy-code-is-your-new-attack-surface/</loc>
  <lastmod>2026-05-10T03:40:22Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/AI-Discovered-Vulnerabilities-Why-Legacy-Code-Is-Your-New-Attack-Surface.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/securing-the-silicon-why-hardware-trust-matters-for-ai-deployment/</loc>
  <lastmod>2026-05-10T04:44:43Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/Securing-the-Silicon-Why-Hardware-Trust-Matters-for-AI-Deployment.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-ai-attack-multiplier-how-adversaries-are-winning-the-automation-race/</loc>
  <lastmod>2026-05-10T04:49:45Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/Securing-the-Silicon-Why-Hardware-Trust-Matters-for-AI-Deployment-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/workforce-sentiment-as-a-security-risk-managing-ai-ethics-in-enterprise-contracts/</loc>
  <lastmod>2026-05-10T04:54:04Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/Workforce-Sentiment-as-a-Security-Risk-Managing-AI-Ethics-in-Enterprise-Contracts.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/when-ai-lies-legal-and-reputational-risks-of-generative-content-at-scale/</loc>
  <lastmod>2026-05-10T05:00:00Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/When-AI-Lies-Legal-Risks-of-Generative-Content.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/ai-agents-in-finance-balancing-efficiency-with-transaction-integrity/</loc>
  <lastmod>2026-05-10T05:04:26Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/AI-Agents-in-Finance-Balancing-Efficiency-with-Transaction-Integrity.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-ai-security-vendor-landscape-separating-ai-security-from-security-with-ai/</loc>
  <lastmod>2026-05-10T06:16:36Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/The-AI-Security-Vendor-Landscape-Separating-AI-Security-from-Security-with-AI.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/augment-dont-replace-closing-10-critical-gaps-in-the-cosai-ai-irf-for-2026/</loc>
  <lastmod>2026-05-10T06:19:23Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/Augment-Donot-Replace-Closing-10-Critical-Gaps-in-the-CoSAI-AI-IRF-for-2026.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/ai-governance-regulations-surge-19-new-laws-passed-in-april-2026/</loc>
  <lastmod>2026-05-10T07:25:25Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/AI-Governance-Regulations-Surge-19-New-Laws-Passed-in-April-2026.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/ai-system-inventory-why-spreadsheets-fail-and-what-to-use-instead/</loc>
  <lastmod>2026-05-10T07:29:12Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/AI-System-Inventory-Why-Spreadsheets-Fail-and-What-to-Use-Instead.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-rise-of-autonomous-threat-actors-q1-2026-ai-security-analysis/</loc>
  <lastmod>2026-05-10T07:31:05Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/The-AI-Security-Vendor-Landscape-Separating-AI-Security-from-Security-with-AI-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/the-rise-of-autonomous-threat-actors-q1-2026-ai-security-analysis/</loc>
  <lastmod>2026-05-10T07:32:02Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/The-Rise-of-Autonomous-Threat-Actors-Q1-2026-AI-Security-Analysis.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/nist-cyber-ai-profile-working-session-what-the-next-draft-will-include/</loc>
  <lastmod>2026-05-10T07:35:49Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/NIST-Cyber-AI-Profile-Working-Session-What-the-Next-Draft-Will-Include.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/sec-exam-priorities-2026-ai-washing-ai-trading-systems-and-broker-dealer-obligations/</loc>
  <lastmod>2026-05-10T07:37:59Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/SEC-Exam-Priorities-2026-AI-Washing-AI-Trading-Systems-and-Broker-Dealer-Obligations.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/eu-ai-act-deadlines-shift-omnibus-package-extends-high-risk-compliance-to-2027-2028/</loc>
  <lastmod>2026-05-10T07:39:38Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/EU-AI-Act-Deadlines-Shift-Omnibus-Package-Extends-High-Risk-Compliance-to-2027–2028.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/vercel-breach-through-context-ai-oauth-tokens-ai-tool-supply-chain-nightmare/</loc>
  <lastmod>2026-05-10T07:41:46Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/Vercel-Breach-Through-Context.ai-OAuth-Tokens-AI-Tool-Supply-Chain-Nightmare.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/92-of-organizations-lack-visibility-into-ai-identities-the-ungoverned-workforce/</loc>
  <lastmod>2026-05-10T07:43:41Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/92-of-Organizations-Lack-Visibility-Into-AI-Identities-The-Ungoverned-Workforce.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/mcp-protocol-design-flaw-anthropic-refuses-fix-researchers-find-rce-in-every-sdk/</loc>
  <lastmod>2026-05-10T07:46:33Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/MCP-Protocol-Design-Flaw-Anthropic-Refuses-Fix-Researchers-Find-RCE-in-Every-SDK.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/owasp-top-10-for-agentic-ai-2026-why-prompt-injection-is-just-the-first-move/</loc>
  <lastmod>2026-05-10T07:49:19Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/OWASP-Top-10-for-Agentic-AI-2026-Why-Prompt-Injection-Is-Just-the-First-Move.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/litellm-deserialization-flaw-the-ai-supply-chain-attack-that-compromised-mercor/</loc>
  <lastmod>2026-05-10T07:50:58Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/LiteLLM-Deserialization-Flaw-The-AI-Supply-Chain-Attack-That-Compromised-Mercor.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/treasury-fed-warn-bank-ceos-anthropics-mythos-model-finds-zero-days-automatically/</loc>
  <lastmod>2026-05-10T07:52:49Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/04/Treasury-Fed-Warn-Bank-CEOs-Anthropics-Mythos-Model-Finds-Zero-Days-Automatically.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/image-6a027a67f28bb/</loc>
  <lastmod>2026-05-12T00:56:32Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/image-6a027a67f28bb.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/image-6a02a97224cd3/</loc>
  <lastmod>2026-05-12T04:17:18Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/image-6a02a97224cd3.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://oda3.org/image-6a02aa9714f24/</loc>
  <lastmod>2026-05-12T04:21:20Z</lastmod>
  <image:image>
   <image:loc>https://oda3.org/wp-content/uploads/2026/05/image-6a02aa9714f24.png</image:loc>
  </image:image>
 </url>
</urlset>