<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-posttype.xsl?ver=5.7.3"?>
<!-- generated-on="2026-04-28T17:49:18+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.7.3" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url><loc>https://www.21centurystate.com/articles/fbi-gives-tips-on-dealing-with-ransomware-threats/#new_tab</loc><lastmod>2016-09-15T15:45:39-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/ransomware.jpg</image:loc><image:title><![CDATA[ransomware]]></image:title><image:caption><![CDATA[(Illustration: Shutterstock)]]></image:caption></image:image></url>
<url><loc>https://www.21centurystate.com/articles/fight-hackers-with-cyber-hygiene-symantec-says/#new_tab</loc><lastmod>2016-09-15T15:47:59-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/clean.jpg</image:loc><image:title><![CDATA[clean]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/5-states-to-participate-in-cybersecurity-academy/#new_tab</loc><lastmod>2016-09-15T15:46:44-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/Cybersecurity.jpg</image:loc><image:title><![CDATA[Cybersecurity]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/government-lacks-performance-recognition-leaves-employees-disgruntled/</loc><lastmod>2016-04-29T13:18:03-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/job.jpg</image:loc><image:title><![CDATA[job]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/year-2025-an-age-of-machine-learning-and-data-on-demand/</loc><lastmod>2016-04-28T15:32:39-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/big-data-stream.jpg</image:loc><image:title><![CDATA[big data stream]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/white-house-helps-police-departments-cope-with-their-image-problems/#new_tab</loc><lastmod>2016-09-15T15:44:40-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/police-tablet-riot.jpg</image:loc><image:title><![CDATA[police tablet riot]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/hackers-outpace-cybersecurity-efforts-verizon-report-finds/</loc><lastmod>2016-04-28T15:33:02-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/verizon.jpg</image:loc><image:title><![CDATA[verizon]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/why-we-still-use-paper-ballots-on-election-day/#new_tab</loc><lastmod>2016-09-15T15:43:40-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/vote-screen.jpg</image:loc><image:title><![CDATA[vote screen]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/veterans-affairs-formally-appoints-new-deputy-cio/</loc><lastmod>2016-04-26T13:49:26-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/03/VA-HQ-stock-image.jpg</image:loc><image:title><![CDATA[VA HQ stock image]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/cybersecurity-flaws-make-cars-vulnerable-gao-says/</loc><lastmod>2016-04-26T15:50:01-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/car-1.jpg</image:loc><image:title><![CDATA[car]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/we-have-to-assume-all-of-our-networks-are-compromised-epa-cio-warns/#new_tab</loc><lastmod>2016-09-15T15:38:08-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/cybersecurity-1.jpg</image:loc><image:title><![CDATA[cybersecurity]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/video-interview-akamai-ceo-tom-leighton/</loc><lastmod>2016-04-25T12:10:43-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/Tom-Leighton-Akamai.jpg</image:loc><image:title><![CDATA[Tom Leighton Akamai]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/at-fda-cio-simpson-keeps-the-focus-on-tech/</loc><lastmod>2016-04-25T14:19:36-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/FDA.jpg</image:loc><image:title><![CDATA[FDA]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/audit-firms-see-new-liabilities-in-fedramp-readiness-documentation/</loc><lastmod>2016-05-03T14:44:58-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/audit.jpg</image:loc><image:title><![CDATA[audit]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/government-cios-lean-toward-cloud-for-security/</loc><lastmod>2016-04-22T12:14:23-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/cloudsecurity.jpg</image:loc><image:title><![CDATA[cloudsecurity]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/speed-is-key-to-threat-intelligence-sharing-at-every-level/#new_tab</loc><lastmod>2016-09-15T15:35:37-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/Threat-Intelligence.jpg</image:loc><image:title><![CDATA[Threat Intelligence]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/data-center-refresh-department-of-justice-case-study/</loc><lastmod>2016-04-21T15:21:19-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/DOJ.jpg</image:loc><image:title><![CDATA[DOJ]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/who-knows-more-about-cybersecurity-middle-schooler-or-presidential-candidates/</loc><lastmod>2016-04-20T12:37:10-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/Cyberwarfare.jpg</image:loc><image:title><![CDATA[Cyberwarfare]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/when-it-comes-to-data-security-everyones-concerned/#new_tab</loc><lastmod>2016-09-15T15:34:31-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/trust.jpg</image:loc><image:title><![CDATA[trust]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/data-center-refresh-dcoi-redefines-federal-data-center-policy/</loc><lastmod>2018-08-14T15:14:00-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/wires.jpg</image:loc><image:title><![CDATA[wires]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/data-center-refresh-inside-the-pentagons-data-center-strategy/</loc><lastmod>2016-04-20T16:30:02-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/Navy-Data-Center.jpg</image:loc><image:title><![CDATA[Navy Data Center]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/data-center-refresh-a-special-report-on-the-future-of-federal-data-centers/</loc><lastmod>2016-04-20T16:30:48-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2.jpg</image:loc><image:title><![CDATA[45409-800x450_MT_WBEL_Data_Center_Refresh_12921_r2]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/data-center-refresh-the-pros-and-cons-of-dcoi/</loc><lastmod>2016-04-18T17:21:41-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/pros.png</image:loc><image:title><![CDATA[pros]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/states-learn-how-to-turn-data-into-effective-policy/#new_tab</loc><lastmod>2016-09-15T15:33:14-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/data.jpg</image:loc><image:title><![CDATA[data]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/obama-lauds-tech-innovations-at-white-house-science-fair/#new_tab</loc><lastmod>2016-09-15T15:29:45-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/White-House.jpg</image:loc><image:title><![CDATA[White House]]></image:title><image:caption><![CDATA[President Obama has some fun at the White House Science Fair in April. (Photo: whitehouse.gov)]]></image:caption></image:image></url>
<url><loc>https://www.21centurystate.com/articles/states-urged-to-prepare-for-cyberattacks/#new_tab</loc><lastmod>2016-09-15T15:31:37-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/map.jpg</image:loc><image:title><![CDATA[map]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/11-takeaways-from-the-symantec-cybersecurity-report/#new_tab</loc><lastmod>2016-09-15T15:32:31-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/cyberattack-1.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/2016-fitara-forum-keynote-gaos-dave-powner/</loc><lastmod>2016-04-13T13:16:52-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/03/Powner-1.jpg</image:loc><image:title><![CDATA[Powner]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/congress-takes-heat-for-irs-cybersecurity-woes/</loc><lastmod>2016-04-13T13:16:23-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/tax.jpg</image:loc><image:title><![CDATA[tax]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/exclusive-gsa-lobbying-congress-for-new-tech-service-sources-say/</loc><lastmod>2016-04-13T12:52:18-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/03/GSA-HQ.jpg</image:loc><image:title><![CDATA[GSA HQ]]></image:title><image:caption><![CDATA[(Photo: Shutterstock)]]></image:caption></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/agencies-can-verify-mobile-app-cybersecurity-through-kryptowire/</loc><lastmod>2016-04-11T17:23:08-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/apps.jpg</image:loc><image:title><![CDATA[apps]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/gao-finds-10-key-practices-for-agency-cloud-contracts/</loc><lastmod>2016-04-07T13:41:38-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/clouds.jpg</image:loc><image:title><![CDATA[clouds]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/odni-plans-to-hire-first-cio/</loc><lastmod>2016-04-06T17:43:37-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/clapper.jpg</image:loc><image:title><![CDATA[clapper]]></image:title><image:caption><![CDATA[Director of National Intelligence James Clapper. (Photo: Office of the Director of National Intelligence)]]></image:caption></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/defense-department-reorg-would-boost-cyber-command/</loc><lastmod>2016-04-06T15:29:15-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/01/NSA.jpg</image:loc><image:title><![CDATA[NSA]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/cyber-command-lays-out-its-mission-and-its-limitations/</loc><lastmod>2016-04-06T15:28:53-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/cyberattack-e1528234734408.jpg</image:loc><image:title><![CDATA[cyberattack]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/video-interview-joyce-hunter-on-agricultures-fitara-experience/</loc><lastmod>2016-04-07T13:42:00-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/verton-and-joyce-hunter.jpg</image:loc><image:title><![CDATA[verton and joyce hunter]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/van-dyk-brings-digital-service-message-to-ted-talks/</loc><lastmod>2016-04-05T16:56:22-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/haly-van-dyk-ted-talks.jpg</image:loc><image:title><![CDATA[haly van dyk ted talks]]></image:title></image:image></url>
<url><loc>https://www.21centurystate.com/articles/new-federal-health-it-task-force-to-tackle-interoperability/#new_tab</loc><lastmod>2016-09-15T15:30:42-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/health.jpg</image:loc><image:title><![CDATA[health]]></image:title></image:image></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/fcc-announces-nutrition-labels-for-internet-service/</loc><lastmod>2016-04-05T11:32:58-04:00</lastmod></url>
<url><loc>https://d3f5buclv39urb.cloudfront.net/articles/tippingpoint-uncovers-action-movie-like-vulnerability/</loc><lastmod>2016-04-05T09:46:16-04:00</lastmod><image:image><image:loc>http://meritalk.com/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://www.meritalk.com/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://meritalk.com/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://aws-origin.meritalk.com/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://d3f5buclv39urb.cloudfront.net/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://cdn.meritalk.com/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image><image:image><image:loc>https://34.197.211.84/wp-content/uploads/2016/04/door.jpg</image:loc><image:title><![CDATA[door]]></image:title></image:image></url>
</urlset>
