<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 14, 2026 at 11:20 by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://redtrident.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Red Trident</title>
		<link><![CDATA[https://redtrident.com]]></link>
		<description><![CDATA[Red Trident]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 13:10:46 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://redtrident.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers/]]></guid>
			<link><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers/]]></link>
			<title>Mid-sized companies with IT and ICS networks CAN protect themselves from Iranian based hackers.</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers-part-2/]]></guid>
			<link><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers-part-2/]]></link>
			<title>Mid-sized companies with IT and ICS networks CAN protect themselves from Iranian based hackers, Part 2</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/improving-access-to-power-distribution-and-substations-ics-scada-ot-systems-red-trident-access-solution-powered-by-dispel/]]></guid>
			<link><![CDATA[https://redtrident.com/improving-access-to-power-distribution-and-substations-ics-scada-ot-systems-red-trident-access-solution-powered-by-dispel/]]></link>
			<title>Improving Access to Power Distribution and Substations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/what-you-need-to-know-about-solar-winds-compromise/]]></guid>
			<link><![CDATA[https://redtrident.com/what-you-need-to-know-about-solar-winds-compromise/]]></link>
			<title>What You Need to Know About SolarWinds&#8217; Compromise</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/solarwinds-compromise-assessment/]]></guid>
			<link><![CDATA[https://redtrident.com/solarwinds-compromise-assessment/]]></link>
			<title>SolarWinds Compromise Assessment</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/awwa-cybersecurity-audit/]]></guid>
			<link><![CDATA[https://redtrident.com/awwa-cybersecurity-audit/]]></link>
			<title>Ace the AWWA Cybersecurity Audit</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers-part-3/]]></guid>
			<link><![CDATA[https://redtrident.com/mid-sized-companies-with-it-and-ics-networks-can-protect-themselves-from-iranian-based-hackers-part-3/]]></link>
			<title>Mid-sized companies with IT and ICS networks CAN protect themselves from Iranian based hackers, Part 3</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:09:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/iranian-hacker-threat-is-it-real-part-4/]]></guid>
			<link><![CDATA[https://redtrident.com/iranian-hacker-threat-is-it-real-part-4/]]></link>
			<title>Iranian Hacker Threat – Is it real? Part 4</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:09:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/key-takeaways-from-the-oldsmar-water-system-compromise/]]></guid>
			<link><![CDATA[https://redtrident.com/key-takeaways-from-the-oldsmar-water-system-compromise/]]></link>
			<title>Key Takeaways From the Oldsmar Water System Compromise</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:08:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/contact-us/]]></guid>
			<link><![CDATA[https://redtrident.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:08:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/who-we-are/]]></guid>
			<link><![CDATA[https://redtrident.com/who-we-are/]]></link>
			<title>Our Approach</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:08:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/news/]]></guid>
			<link><![CDATA[https://redtrident.com/news/]]></link>
			<title>News</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:08:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/incident-response/]]></guid>
			<link><![CDATA[https://redtrident.com/incident-response/]]></link>
			<title>Respond &#8211; Incident Response Services</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/cyber-ecp/]]></guid>
			<link><![CDATA[https://redtrident.com/cyber-ecp/]]></link>
			<title>Cyber-ECP</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/past-performance/]]></guid>
			<link><![CDATA[https://redtrident.com/past-performance/]]></link>
			<title>Past Performance</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/cybersecurity-assessments/]]></guid>
			<link><![CDATA[https://redtrident.com/cybersecurity-assessments/]]></link>
			<title>Assess &#8211; Cybersecurity Assessments</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/rti-cybersecurity-programs/]]></guid>
			<link><![CDATA[https://redtrident.com/rti-cybersecurity-programs/]]></link>
			<title>Fix &#8211; Cybersecurity Programs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/rti-cloud-infrastructure/]]></guid>
			<link><![CDATA[https://redtrident.com/rti-cloud-infrastructure/]]></link>
			<title>Cloud Infrastructure</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/privacy-policy/]]></guid>
			<link><![CDATA[https://redtrident.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/]]></guid>
			<link><![CDATA[https://redtrident.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-oil-gas/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-oil-gas/]]></link>
			<title>Oil &#038; Gas</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-water-wastewater/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-water-wastewater/]]></link>
			<title>Water &#038; Wastewater</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/sdvosb-sole-sourcing/]]></guid>
			<link><![CDATA[https://redtrident.com/sdvosb-sole-sourcing/]]></link>
			<title>Sole Sourcing to Service-Disabled Veteran-Owned Small Business</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/careers/]]></guid>
			<link><![CDATA[https://redtrident.com/careers/]]></link>
			<title>Careers</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/product-training/]]></guid>
			<link><![CDATA[https://redtrident.com/product-training/]]></link>
			<title>Product Training</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ics-ot-penetration-testing/]]></guid>
			<link><![CDATA[https://redtrident.com/ics-ot-penetration-testing/]]></link>
			<title>Penetration Testing</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/cybersecurity-for-water-wastewater-sector/]]></guid>
			<link><![CDATA[https://redtrident.com/cybersecurity-for-water-wastewater-sector/]]></link>
			<title>Water &#038; Wastewater Recommendations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-vulnerability-assessment/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-vulnerability-assessment/]]></link>
			<title>OT Vulnerability Assessment</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-assessments/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-assessments/]]></link>
			<title>Assess &#8211; Pen Testing vs Vulnerability Assessment</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/network-asset-discovery/]]></guid>
			<link><![CDATA[https://redtrident.com/network-asset-discovery/]]></link>
			<title>Assess &#8211; Asset &#038; Network Discovery</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/advise/]]></guid>
			<link><![CDATA[https://redtrident.com/advise/]]></link>
			<title>Advise</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-assessments-ics/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-assessments-ics/]]></link>
			<title>Assess</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-remediation/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-remediation/]]></link>
			<title>OT Remediation</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/training-services/]]></guid>
			<link><![CDATA[https://redtrident.com/training-services/]]></link>
			<title>Training</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-manufacturing/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-manufacturing/]]></link>
			<title>Manufacturing</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-government/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-government/]]></link>
			<title>Government</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:05:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/blog/]]></guid>
			<link><![CDATA[https://redtrident.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:03:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/unsubscribe/]]></guid>
			<link><![CDATA[https://redtrident.com/unsubscribe/]]></link>
			<title>Unsubscribe</title>
			<pubDate><![CDATA[Thu, 28 Aug 2025 14:37:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/feedback/]]></guid>
			<link><![CDATA[https://redtrident.com/feedback/]]></link>
			<title>Your Experience</title>
			<pubDate><![CDATA[Wed, 29 Nov 2023 17:27:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/thanks/]]></guid>
			<link><![CDATA[https://redtrident.com/thanks/]]></link>
			<title>Thanks</title>
			<pubDate><![CDATA[Sun, 08 Jun 2025 01:15:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/chaos/]]></guid>
			<link><![CDATA[https://redtrident.com/chaos/]]></link>
			<title>Chaos Cybersecurity</title>
			<pubDate><![CDATA[Mon, 28 Jul 2025 14:44:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/request-pricing/]]></guid>
			<link><![CDATA[https://redtrident.com/request-pricing/]]></link>
			<title>Request Pricing</title>
			<pubDate><![CDATA[Mon, 09 Jun 2025 04:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-cybersecurity-energy/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-cybersecurity-energy/]]></link>
			<title>Landing Page &#8211; Energy</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 19:52:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/book-a-call/]]></guid>
			<link><![CDATA[https://redtrident.com/book-a-call/]]></link>
			<title>Book a Call</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 22:38:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/rti-network-infrastructure/]]></guid>
			<link><![CDATA[https://redtrident.com/rti-network-infrastructure/]]></link>
			<title>Fix &#8211; Network Infrastructure</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 22:31:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/train/]]></guid>
			<link><![CDATA[https://redtrident.com/train/]]></link>
			<title>Train</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 17:56:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/respond/]]></guid>
			<link><![CDATA[https://redtrident.com/respond/]]></link>
			<title>Respond</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 17:55:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/monitor/]]></guid>
			<link><![CDATA[https://redtrident.com/monitor/]]></link>
			<title>Monitor</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 17:53:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/penetration-testing-companies-what-to-look-for/]]></guid>
			<link><![CDATA[https://redtrident.com/penetration-testing-companies-what-to-look-for/]]></link>
			<title>Penetration Testing Companies: What to Look For</title>
			<pubDate><![CDATA[Fri, 03 Nov 2023 18:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://redtrident.com/ot-penetration-testing-how-often-should-i-get-a-pen-test/]]></guid>
			<link><![CDATA[https://redtrident.com/ot-penetration-testing-how-often-should-i-get-a-pen-test/]]></link>
			<title>OT Penetration Testing: How Often Should I Get a Pen Test</title>
			<pubDate><![CDATA[Fri, 03 Nov 2023 17:50:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
