<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 1:29 am by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyphyi.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>CYPHYI </title>
		<link><![CDATA[https://cyphyi.com]]></link>
		<description><![CDATA[CYPHYI ]]></description>
		<lastBuildDate><![CDATA[Wed, 01 Jan 2025 13:22:01 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyphyi.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyphyi.com/services/]]></guid>
			<link><![CDATA[https://cyphyi.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Wed, 01 Jan 2025 13:22:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/]]></guid>
			<link><![CDATA[https://cyphyi.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 01 Jan 2025 12:52:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/tara-beyond-spreadsheets/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/tara-beyond-spreadsheets/]]></link>
			<title>TARA Beyond Spreadsheets: Streamlining Risk Assessments with Modern Tools</title>
			<pubDate><![CDATA[Wed, 09 Jul 2025 04:30:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/from-in-context-to-off-the-shelf/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/from-in-context-to-off-the-shelf/]]></link>
			<title>From In-Context to Off-the-Shelf: A Practical Guide to Component Integration in ISO/SAE 21434 Compliance</title>
			<pubDate><![CDATA[Wed, 04 Jun 2025 04:02:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/navigating-automotive-cybersecurity-regulations/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/navigating-automotive-cybersecurity-regulations/]]></link>
			<title>Navigating Automotive Cybersecurity Regulations</title>
			<pubDate><![CDATA[Tue, 22 Apr 2025 03:55:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/the-role-of-cybersecurity-audits-in-ensuring-automotive-safety-and-compliance/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/the-role-of-cybersecurity-audits-in-ensuring-automotive-safety-and-compliance/]]></link>
			<title>The Role of Cybersecurity Audits in Ensuring Automotive Safety and Compliance</title>
			<pubDate><![CDATA[Tue, 22 Apr 2025 03:53:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/securing-the-wheels-of-progress-cybersecurity-in-the-automotive-supply-chain/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/securing-the-wheels-of-progress-cybersecurity-in-the-automotive-supply-chain/]]></link>
			<title>Cybersecurity in the Automotive Supply Chain</title>
			<pubDate><![CDATA[Tue, 22 Apr 2025 03:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/unmasking-the-threats-why-tara-is-your-cars-cybersecurity-superhero/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/unmasking-the-threats-why-tara-is-your-cars-cybersecurity-superhero/]]></link>
			<title>Analyzing Product Security Through the Lens of TARA</title>
			<pubDate><![CDATA[Tue, 22 Apr 2025 03:42:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/event/iso-21434-3-day-training/]]></guid>
			<link><![CDATA[https://cyphyi.com/event/iso-21434-3-day-training/]]></link>
			<title>ISO/SAE 21434 Training and Certification Program</title>
			<pubDate><![CDATA[Tue, 20 May 2025 05:34:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/the-critical-role-of-un-regulation-155-and-the-cyber-resilience-act-in-automotive-cybersecurity/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/the-critical-role-of-un-regulation-155-and-the-cyber-resilience-act-in-automotive-cybersecurity/]]></link>
			<title>The Critical Role of UN Regulation 155 and the Cyber Resilience Act in Automotive Cybersecurity</title>
			<pubDate><![CDATA[Tue, 20 May 2025 04:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/newsletter/]]></guid>
			<link><![CDATA[https://cyphyi.com/newsletter/]]></link>
			<title>Newsletter</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 09:35:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/cybersecurity-for-mes/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/cybersecurity-for-mes/]]></link>
			<title>Cybersecurity for Manufacturing Execution Systems (MES)</title>
			<pubDate><![CDATA[Fri, 30 May 2025 09:44:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/securing-iacs-in-automotive-manufacturing/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/securing-iacs-in-automotive-manufacturing/]]></link>
			<title>Securing IACS in Automotive Manufacturing</title>
			<pubDate><![CDATA[Fri, 30 May 2025 09:37:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/a-practical-guide-to-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/a-practical-guide-to-medical-device-cybersecurity/]]></link>
			<title>A Practical Guide to Medical Device Cybersecurity</title>
			<pubDate><![CDATA[Fri, 30 May 2025 09:26:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/automotive-cybersecurity-and-ai/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/automotive-cybersecurity-and-ai/]]></link>
			<title>Automotive Cybersecurity and AI</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 07:02:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/ransomware-ready-and-continous-validation/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/ransomware-ready-and-continous-validation/]]></link>
			<title>Ransomware Ready and Continous Validation</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/my-calendar/]]></guid>
			<link><![CDATA[https://cyphyi.com/my-calendar/]]></link>
			<title>My Calendar</title>
			<pubDate><![CDATA[Wed, 26 Feb 2025 10:44:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog-post/buidling-a-cybersecurity-management-system-csms-for-vehicle-cybersecurity/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog-post/buidling-a-cybersecurity-management-system-csms-for-vehicle-cybersecurity/]]></link>
			<title>Buidling a Cybersecurity Management System (CSMS) for Vehicle Cybersecurity</title>
			<pubDate><![CDATA[Fri, 13 Jun 2025 08:48:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/contact/]]></guid>
			<link><![CDATA[https://cyphyi.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Tue, 28 Jan 2025 21:18:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/gutenverse-form/form-action/]]></guid>
			<link><![CDATA[https://cyphyi.com/gutenverse-form/form-action/]]></link>
			<title>Form Action</title>
			<pubDate><![CDATA[Mon, 27 Jan 2025 21:04:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/the-macroeconomic-stakes-of-cybersecurity-in-fleet-telematics/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/the-macroeconomic-stakes-of-cybersecurity-in-fleet-telematics/]]></link>
			<title>The Macroeconomic Stakes of Cybersecurity in Fleet Telematics</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:54:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/mc-locations/demo-minnesota-orchestra/]]></guid>
			<link><![CDATA[https://cyphyi.com/mc-locations/demo-minnesota-orchestra/]]></link>
			<title>Demo: Minnesota Orchestra</title>
			<pubDate><![CDATA[Wed, 26 Feb 2025 10:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/cybersecurity-and-privacy-risks-in-ev-charging-networks/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/cybersecurity-and-privacy-risks-in-ev-charging-networks/]]></link>
			<title>Cybersecurity and Privacy Risks in EV Charging Networks</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:50:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/advanced-cohort-analysis-for-fleet-wide-automotive-cybersecurity/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/advanced-cohort-analysis-for-fleet-wide-automotive-cybersecurity/]]></link>
			<title>Advanced Cohort Analysis for Fleet-Wide Automotive Cybersecurity</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:48:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/proactive-detection-of-after-sales-vehicle-quality-defects/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/proactive-detection-of-after-sales-vehicle-quality-defects/]]></link>
			<title>Proactive Detection of After-Sales Vehicle Quality Defects</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:44:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/blog/]]></guid>
			<link><![CDATA[https://cyphyi.com/blog/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:25:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news-2/]]></guid>
			<link><![CDATA[https://cyphyi.com/news-2/]]></link>
			<title>News</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:23:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/the-importance-of-contextual-api-security-in-connected-vehicles/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/the-importance-of-contextual-api-security-in-connected-vehicles/]]></link>
			<title>The Importance of Contextual API Security in Connected Vehicles</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:22:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyphyi.com/news/commerce-finalizes-rule-to-secure-connected-vehicle-supply-chains-from-foreign-adversary-threats/]]></guid>
			<link><![CDATA[https://cyphyi.com/news/commerce-finalizes-rule-to-secure-connected-vehicle-supply-chains-from-foreign-adversary-threats/]]></link>
			<title>Commerce Finalizes Rule to Secure Connected Vehicle Supply Chains from Foreign Adversary Threats</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 06:17:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
