<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:25 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://auxin.io/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Auxin</title>
		<link><![CDATA[https://auxin.io]]></link>
		<description><![CDATA[Auxin]]></description>
		<lastBuildDate><![CDATA[Wed, 30 Jul 2025 17:28:38 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://auxin.io/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://auxin.io/llm-security-workshop-in-berlin/]]></guid>
			<link><![CDATA[https://auxin.io/llm-security-workshop-in-berlin/]]></link>
			<title>DevOpsCon Berlin 2025 &#8211; GenAI Security Workshop &#8211; Omer Farooq</title>
			<pubDate><![CDATA[Wed, 30 Jul 2025 17:28:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/insights/]]></guid>
			<link><![CDATA[https://auxin.io/insights/]]></link>
			<title>Insights</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 14:49:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/]]></guid>
			<link><![CDATA[https://auxin.io/]]></link>
			<title>Auxin Security</title>
			<pubDate><![CDATA[Mon, 21 Apr 2025 15:27:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/llm-vs-lcm-simplified-for-ais-next-stage/]]></guid>
			<link><![CDATA[https://auxin.io/llm-vs-lcm-simplified-for-ais-next-stage/]]></link>
			<title>LLM vs LCM Simplified for AI’s Next Stage </title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-ai-tutorial-in-5-minutes-logistic-regression-in-jupyter-notebook/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-ai-tutorial-in-5-minutes-logistic-regression-in-jupyter-notebook/]]></link>
			<title>Auxin Security AI Tutorial in 5 Minutes: Logistic Regression in Jupyter Notebook</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/ai-specific-attack-vectors-prompt-injection-data-poisoning-and-model/]]></guid>
			<link><![CDATA[https://auxin.io/ai-specific-attack-vectors-prompt-injection-data-poisoning-and-model/]]></link>
			<title>AI-Specific Attack Vectors: Prompt Injection, Data Poisoning, and Model</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/ai-in-threat-detection-and-proactive-security/]]></guid>
			<link><![CDATA[https://auxin.io/ai-in-threat-detection-and-proactive-security/]]></link>
			<title>AI In Threat Detection and Proactive Security</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-ai-tutorial-svm-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-ai-tutorial-svm-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security AI Tutorial: SVM in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-k-means-clustering-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-k-means-clustering-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial: K-Means Clustering in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/how-zero-trust-strengthens-security-for-remote-work/]]></guid>
			<link><![CDATA[https://auxin.io/how-zero-trust-strengthens-security-for-remote-work/]]></link>
			<title>How Zero Trust Strengthens Security for Remote Work</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-hierarchical-clustering-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-hierarchical-clustering-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial: Hierarchical Clustering in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-mean-shift-clustering-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-mean-shift-clustering-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial: Mean Shift Clustering in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-dbscan-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-dbscan-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial: DBSCAN in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-spectral-clustering-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-spectral-clustering-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial: Spectral Clustering in Jupyter Notebook in 5 Minutes</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/transform-cyber-defense-using-agentic-and-frontier-ai/]]></guid>
			<link><![CDATA[https://auxin.io/transform-cyber-defense-using-agentic-and-frontier-ai/]]></link>
			<title>Transform Cyber Defense Using Agentic and Frontier AI </title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/using-firejail-to-improve-linux-application-security/]]></guid>
			<link><![CDATA[https://auxin.io/using-firejail-to-improve-linux-application-security/]]></link>
			<title>Using Firejail to Improve Linux Application Security </title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/manage-infrastructure-easily-with-terraform-as-code/]]></guid>
			<link><![CDATA[https://auxin.io/manage-infrastructure-easily-with-terraform-as-code/]]></link>
			<title>Manage Infrastructure Easily with Terraform as Code</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/ai-powered-automation-enhancing-efficiency-and-productivity/]]></guid>
			<link><![CDATA[https://auxin.io/ai-powered-automation-enhancing-efficiency-and-productivity/]]></link>
			<title>AI-Powered Automation – Enhancing Efficiency and Productivity</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/from-ai-attacks-to-quantum-threats-cybersecurity-challenges-in-2026/]]></guid>
			<link><![CDATA[https://auxin.io/from-ai-attacks-to-quantum-threats-cybersecurity-challenges-in-2026/]]></link>
			<title>From AI Attacks to Quantum Threats: Cybersecurity Challenges in 2026</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/ignite-2025-all-the-key-ai-cloud-and-governance-innovations-from-microsoft/]]></guid>
			<link><![CDATA[https://auxin.io/ignite-2025-all-the-key-ai-cloud-and-governance-innovations-from-microsoft/]]></link>
			<title>Ignite 2025: All the Key AI, Cloud, and Governance Innovations from Microsoft</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/llm-security-workshop-in-san-diego/]]></guid>
			<link><![CDATA[https://auxin.io/llm-security-workshop-in-san-diego/]]></link>
			<title>DevSecOps San Diego 2025 – GenAI Security with Omer Farooq</title>
			<pubDate><![CDATA[Wed, 30 Jul 2025 17:29:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/trust-technology-and-human-factors-why-theyre-the-core-of-cyber-resilience/]]></guid>
			<link><![CDATA[https://auxin.io/trust-technology-and-human-factors-why-theyre-the-core-of-cyber-resilience/]]></link>
			<title>Trust, Technology, and Human Factors: Why They’re the Core of Cyber Resilience</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/about-us/]]></guid>
			<link><![CDATA[https://auxin.io/about-us/]]></link>
			<title>About us</title>
			<pubDate><![CDATA[Mon, 17 Nov 2025 14:30:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/using-scim-2-0-to-manage-users-with-azure-ad/]]></guid>
			<link><![CDATA[https://auxin.io/using-scim-2-0-to-manage-users-with-azure-ad/]]></link>
			<title>Using SCIM 2.0 to Manage Users with Azure AD</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/devopscon-berlin-2025-defend-against-ai-attacks/]]></guid>
			<link><![CDATA[https://auxin.io/devopscon-berlin-2025-defend-against-ai-attacks/]]></link>
			<title>Auxin Team &#8211; DevOpsCon Berlin 2025 &#8211; Defend Against AI Attacks</title>
			<pubDate><![CDATA[Wed, 30 Jul 2025 17:27:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/session-by-hussan-farooq-at-devopscon-2025/]]></guid>
			<link><![CDATA[https://auxin.io/session-by-hussan-farooq-at-devopscon-2025/]]></link>
			<title>DevOpsCon 2025 &#8211; RAG Security &#8211; Dr. Husssan Farooq</title>
			<pubDate><![CDATA[Wed, 30 Jul 2025 17:27:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/simple-ways-to-prevent-account-takeover-and-fraud/]]></guid>
			<link><![CDATA[https://auxin.io/simple-ways-to-prevent-account-takeover-and-fraud/]]></link>
			<title>Simple Ways to Prevent Account Takeover and Fraud</title>
			<pubDate><![CDATA[Tue, 20 May 2025 19:25:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/simplify-cybersecurity-with-emerging-threat-solutions/]]></guid>
			<link><![CDATA[https://auxin.io/simplify-cybersecurity-with-emerging-threat-solutions/]]></link>
			<title>Simplify Cybersecurity with Emerging Threat Solutions </title>
			<pubDate><![CDATA[Tue, 06 May 2025 18:24:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/agentic-ai-security-transforms-cyber-defense-strategies/]]></guid>
			<link><![CDATA[https://auxin.io/agentic-ai-security-transforms-cyber-defense-strategies/]]></link>
			<title>Agentic AI Security Transforms Cyber Defense Strategies</title>
			<pubDate><![CDATA[Tue, 06 May 2025 11:45:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/ai-is-hackers-new-best-friend/]]></guid>
			<link><![CDATA[https://auxin.io/ai-is-hackers-new-best-friend/]]></link>
			<title>AI is Hackers New Best Friend</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:42:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/devopscon-new-york-2025-agentic-ai-with-omer-farooq/]]></guid>
			<link><![CDATA[https://auxin.io/devopscon-new-york-2025-agentic-ai-with-omer-farooq/]]></link>
			<title>DevOpsCon New York 2025 – Agentic AI with Omer Farooq</title>
			<pubDate><![CDATA[Mon, 19 May 2025 14:41:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-summer-ai-internship-2025-empowering-future-innovators/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-summer-ai-internship-2025-empowering-future-innovators/]]></link>
			<title>Auxin Summer AI Internship 2025 – Empowering Future Innovators</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 15:30:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/protect-your-brand-from-cloud-extortion-threats/]]></guid>
			<link><![CDATA[https://auxin.io/protect-your-brand-from-cloud-extortion-threats/]]></link>
			<title>Protect Your Brand from Cloud Extortion Threats </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:42:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/effortless-strategies-for-effective-threat-modeling/]]></guid>
			<link><![CDATA[https://auxin.io/effortless-strategies-for-effective-threat-modeling/]]></link>
			<title>Effortless Strategies for Effective Threat Modeling </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:41:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/secure-patient-data-effortlessly-in-healthcare/]]></guid>
			<link><![CDATA[https://auxin.io/secure-patient-data-effortlessly-in-healthcare/]]></link>
			<title>Secure Patient Data Effortlessly in Healthcare</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:41:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/protect-your-ai-systems-from-darkmind-attack/]]></guid>
			<link><![CDATA[https://auxin.io/protect-your-ai-systems-from-darkmind-attack/]]></link>
			<title>Protect Your AI Systems from DarkMind Attack </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/effortlessly-protect-cloud-data-from-emerging-threat/]]></guid>
			<link><![CDATA[https://auxin.io/effortlessly-protect-cloud-data-from-emerging-threat/]]></link>
			<title>Effortlessly Protect Cloud Data from Emerging Threat </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:38:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/secure-crypto-assets-from-sophisticated-attacks/]]></guid>
			<link><![CDATA[https://auxin.io/secure-crypto-assets-from-sophisticated-attacks/]]></link>
			<title>Secure Crypto Assets from Sophisticated Attacks</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:37:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/effortlessly-improve-security-with-zero-trust-architecture/]]></guid>
			<link><![CDATA[https://auxin.io/effortlessly-improve-security-with-zero-trust-architecture/]]></link>
			<title>Effortlessly improve Security with Zero Trust Architecture</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:36:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/secure-insights-from-reasoning-models-with-ease/]]></guid>
			<link><![CDATA[https://auxin.io/secure-insights-from-reasoning-models-with-ease/]]></link>
			<title>Secure Insights from Reasoning Models with Ease </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:36:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-1-linear-regression-in-jupyter-notebook-in-5-minutes/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-1-linear-regression-in-jupyter-notebook-in-5-minutes/]]></link>
			<title>Auxin Security Tutorial # 1: Linear Regression in Jupyter Notebook in 5 Minutes </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:36:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/secure-your-ai-future-with-effective-policy/]]></guid>
			<link><![CDATA[https://auxin.io/secure-your-ai-future-with-effective-policy/]]></link>
			<title>Secure Your AI Future with Effective Policy</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:35:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/maximize-security-efficiency-with-zero-trust-and-sase/]]></guid>
			<link><![CDATA[https://auxin.io/maximize-security-efficiency-with-zero-trust-and-sase/]]></link>
			<title>Maximize Security Efficiency with Zero Trust and SASE </title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:35:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/auxin-security-tutorial-2-simplify-decision-tree-classification/]]></guid>
			<link><![CDATA[https://auxin.io/auxin-security-tutorial-2-simplify-decision-tree-classification/]]></link>
			<title>Auxin Security Tutorial #2: Simplify Decision Tree Classification</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:33:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/retrieval-augmented-generation-architectures-for-industry-use-cases/]]></guid>
			<link><![CDATA[https://auxin.io/retrieval-augmented-generation-architectures-for-industry-use-cases/]]></link>
			<title>Retrieval-Augmented Generation Architectures for Industry Use-Cases</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/simplify-user-management-using-scim-automation/]]></guid>
			<link><![CDATA[https://auxin.io/simplify-user-management-using-scim-automation/]]></link>
			<title>Simplify User/Group Management Using SCIM Automation</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:31:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/secure-the-future-of-enterprise-with-agentic-ai/]]></guid>
			<link><![CDATA[https://auxin.io/secure-the-future-of-enterprise-with-agentic-ai/]]></link>
			<title>Secure the Future of Enterprise with Agentic AI</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:29:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/markets/]]></guid>
			<link><![CDATA[https://auxin.io/markets/]]></link>
			<title>Markets</title>
			<pubDate><![CDATA[Mon, 21 Apr 2025 15:28:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/consumer-retail/]]></guid>
			<link><![CDATA[https://auxin.io/consumer-retail/]]></link>
			<title>Consumer &#038; Retail</title>
			<pubDate><![CDATA[Mon, 07 Apr 2025 14:38:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://auxin.io/why-student-data-privacy-matters-more-than-you-think-lessons-from-a-1-1m-privacy-fine/]]></guid>
			<link><![CDATA[https://auxin.io/why-student-data-privacy-matters-more-than-you-think-lessons-from-a-1-1m-privacy-fine/]]></link>
			<title>Why Student Data Privacy Matters More Than You Think: Lessons from a $1.1M Privacy Fine</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:40:03 +0000]]></pubDate>
		</item>
				</channel>
</rss>
