<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 8:26 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.arunvishwanath.us/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Arun Vishwanath, Ph.D., MBA</title>
		<link><![CDATA[https://www.arunvishwanath.us]]></link>
		<description><![CDATA[Arun Vishwanath, Ph.D., MBA]]></description>
		<lastBuildDate><![CDATA[Wed, 24 Feb 2021 10:32:10 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.arunvishwanath.us/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.arunvishwanath.us/contact/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Wed, 24 Feb 2021 10:32:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/]]></link>
			<title>Arun Vishwanath, Ph.D., MBA</title>
			<pubDate><![CDATA[Tue, 20 Jan 2026 19:04:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/about-dr-arun-vishwanath-buffalo/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/about-dr-arun-vishwanath-buffalo/]]></link>
			<title>About Dr Arun Vishwanath Buffalo</title>
			<pubDate><![CDATA[Wed, 07 Jan 2026 18:26:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2025/11/18/why-cybersecurity-awareness-training-still-isnt-working-and-what-needs-to-change/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2025/11/18/why-cybersecurity-awareness-training-still-isnt-working-and-what-needs-to-change/]]></link>
			<title>Why Cybersecurity Awareness Training Still Isn’t Working. And What Needs to Change</title>
			<pubDate><![CDATA[Tue, 18 Nov 2025 20:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/blog/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/blog/]]></link>
			<title>Cybersecurity Musings</title>
			<pubDate><![CDATA[Tue, 23 Feb 2021 13:58:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/publications/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/publications/]]></link>
			<title>Publications</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 23:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2026/02/04/how-security-awareness-has-undermined-real-email-communication/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2026/02/04/how-security-awareness-has-undermined-real-email-communication/]]></link>
			<title>How Security Awareness Has Undermined Real Email Communication</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 15:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/cyber-risk/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/cyber-risk/]]></link>
			<title>Unlock Your Cyber Risk Beliefs</title>
			<pubDate><![CDATA[Tue, 30 Jan 2024 17:08:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2023/02/28/time-to-change-our-flawed-approach-to-security-awareness-published-in-dark-reading/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2023/02/28/time-to-change-our-flawed-approach-to-security-awareness-published-in-dark-reading/]]></link>
			<title>Time to Change Our Flawed Approach to Security Awareness [Published in Dark Reading]</title>
			<pubDate><![CDATA[Tue, 28 Feb 2023 20:01:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/conference-papers/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/conference-papers/]]></link>
			<title>Conference Papers</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 18:37:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/news-and-events/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/news-and-events/]]></link>
			<title>News Coverage</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 13:56:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2025/02/19/the-death-of-security-awareness-training-why-ai-is-making-it-obsolete/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2025/02/19/the-death-of-security-awareness-training-why-ai-is-making-it-obsolete/]]></link>
			<title>The Death Of Security Awareness Training: Why AI Is Making It Obsolete</title>
			<pubDate><![CDATA[Wed, 19 Feb 2025 19:53:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2021/05/12/the-colonial-pipeline-hack-was-avoidable/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2021/05/12/the-colonial-pipeline-hack-was-avoidable/]]></link>
			<title>The Colonial Pipeline Hack Was Avoidable</title>
			<pubDate><![CDATA[Wed, 12 May 2021 13:56:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/news-events/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/news-events/]]></link>
			<title>News &#038; Events</title>
			<pubDate><![CDATA[Wed, 03 Mar 2021 10:29:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2023/12/19/safeguarding-our-childrens-digital-future-a-call-to-action/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2023/12/19/safeguarding-our-childrens-digital-future-a-call-to-action/]]></link>
			<title>Safeguarding Our Children&#8217;s Digital Future: A Call to Action</title>
			<pubDate><![CDATA[Tue, 19 Dec 2023 14:59:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2023/02/28/build-security-around-users-a-human-first-approach-to-cyber-resilience-published-in-dark-reading/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2023/02/28/build-security-around-users-a-human-first-approach-to-cyber-resilience-published-in-dark-reading/]]></link>
			<title>Build Security Around Users: A Human-First Approach to Cyber Resilience [Published in Dark Reading]</title>
			<pubDate><![CDATA[Tue, 28 Feb 2023 20:09:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/about-dr-arun-vishwanath/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/about-dr-arun-vishwanath/]]></link>
			<title>About Dr Arun Vishwanath</title>
			<pubDate><![CDATA[Tue, 18 Apr 2023 18:59:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/bio/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/bio/]]></link>
			<title>Dr Arun Vishwanath</title>
			<pubDate><![CDATA[Tue, 01 Jun 2021 23:01:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/invited-talks/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/invited-talks/]]></link>
			<title>Invited Talks</title>
			<pubDate><![CDATA[Thu, 29 Aug 2024 19:40:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2022/01/31/the-end-of-the-beginning-of-covid-19/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2022/01/31/the-end-of-the-beginning-of-covid-19/]]></link>
			<title>The end of the beginning of COVID-19 [Published in Medium]</title>
			<pubDate><![CDATA[Mon, 31 Jan 2022 14:49:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2021/05/18/the-failures-that-led-to-the-colonial-pipeline-ransomware-attack/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2021/05/18/the-failures-that-led-to-the-colonial-pipeline-ransomware-attack/]]></link>
			<title>The failures that led to the Colonial Pipeline ransomware attack [Published in CNN]</title>
			<pubDate><![CDATA[Mon, 31 Jan 2022 14:41:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/hacked/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/hacked/]]></link>
			<title>Your Hacker Connection Quotient</title>
			<pubDate><![CDATA[Fri, 26 Jan 2024 13:17:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2023/04/21/it-may-not-matter-how-close-you-are-to-tom-cruise-but-it-matters-how-close-you-are-to-a-hacker/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2023/04/21/it-may-not-matter-how-close-you-are-to-tom-cruise-but-it-matters-how-close-you-are-to-a-hacker/]]></link>
			<title>How many degrees separate you from a hacker?</title>
			<pubDate><![CDATA[Mon, 24 Apr 2023 13:45:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/dr-arun-vishwanath-buffalo-new-york/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/dr-arun-vishwanath-buffalo-new-york/]]></link>
			<title>Dr Arun Vishwanath, Buffalo, New York</title>
			<pubDate><![CDATA[Mon, 09 Jan 2023 14:14:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/cybersecurity/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/cybersecurity/]]></link>
			<title>CyberSecurity Musings</title>
			<pubDate><![CDATA[Fri, 21 Apr 2023 13:47:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2022/03/28/stopping-russian-cyberattacks-at-their-source/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2022/03/28/stopping-russian-cyberattacks-at-their-source/]]></link>
			<title>Stopping Russian Cyberattacks at Their Source [Published in Dark Reading]</title>
			<pubDate><![CDATA[Mon, 28 Mar 2022 14:36:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/10/01/mobile-telephony-is-dying/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/10/01/mobile-telephony-is-dying/]]></link>
			<title>Mobile telephony is dying [Published in iPswitch]</title>
			<pubDate><![CDATA[Thu, 12 Nov 2020 03:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/weakestlink/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/weakestlink/]]></link>
			<title>Strengthening The Weakest Link</title>
			<pubDate><![CDATA[Fri, 26 Jan 2024 13:18:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/09/15/why-do-we-still-teach-our-children-abc/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/09/15/why-do-we-still-teach-our-children-abc/]]></link>
			<title>Why do we still teach our children ABC? [Published in Medium]</title>
			<pubDate><![CDATA[Thu, 12 Nov 2020 03:56:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2018/09/21/why-do-so-many-people-fall-for-fake-profiles-online/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2018/09/21/why-do-so-many-people-fall-for-fake-profiles-online/]]></link>
			<title>Why do so many people fall for fake profiles online? [Published in The Conversation]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:23:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/09/15/data-security-in-the-cloud-part-2/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/09/15/data-security-in-the-cloud-part-2/]]></link>
			<title>Data Security In The Cloud: Part 2 [Published in iPswitch]</title>
			<pubDate><![CDATA[Thu, 12 Nov 2020 03:55:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2018/02/08/with-ai-we-may-have-created-ourselves-out-of-existence/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2018/02/08/with-ai-we-may-have-created-ourselves-out-of-existence/]]></link>
			<title>AI will replace trucker, retail workers, journalists–and you and I [Published in CNN]</title>
			<pubDate><![CDATA[Wed, 26 Aug 2020 21:53:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2018/03/06/when-ai-writes-your-news-what-happens-to-democracy/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2018/03/06/when-ai-writes-your-news-what-happens-to-democracy/]]></link>
			<title>The impact AI will have on democracy [Published in CNN]</title>
			<pubDate><![CDATA[Wed, 26 Aug 2020 21:52:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2018/08/02/to-reward-or-not-to-reward/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2018/08/02/to-reward-or-not-to-reward/]]></link>
			<title>To reward, or not to reward [Published in InfoSecurity Magazine]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:50:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/06/14/covid-19s-lessons-about-social-engineering/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/06/14/covid-19s-lessons-about-social-engineering/]]></link>
			<title>COVID-19&#8217;s Lessons About Social Engineering [Published in Dark Reading]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:47:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2018/09/14/stopping-the-russians-from-influencing-the-midterms/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2018/09/14/stopping-the-russians-from-influencing-the-midterms/]]></link>
			<title>Spearphishing has become even more dangerous [Published in CNN]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:44:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2019/07/13/the-troubling-implications-of-weaponizing-the-internet/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2019/07/13/the-troubling-implications-of-weaponizing-the-internet/]]></link>
			<title>The troubling implications of weaponizing the Internet [Published in Washington Post]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:36:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2019/10/01/how-much-cyber-hygiene-do-you-need/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2019/10/01/how-much-cyber-hygiene-do-you-need/]]></link>
			<title>How much cyber hygiene do you need? [Published in Medium]</title>
			<pubDate><![CDATA[Mon, 05 Oct 2020 20:17:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/05/12/improving-everyones-ability-to-work-from-home-after-the-pandemic/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/05/12/improving-everyones-ability-to-work-from-home-after-the-pandemic/]]></link>
			<title>Improving Everyone’s Ability to Work from Home After the Pandemic [Published in IPSwitch]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 19:08:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/02/15/stop-saying-cyber-hygiene-is-like-personal-hygiene-2/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/02/15/stop-saying-cyber-hygiene-is-like-personal-hygiene-2/]]></link>
			<title>Stop saying “Cyber Hygiene is like personal hygiene” [Published in Medium]</title>
			<pubDate><![CDATA[Mon, 05 Oct 2020 20:17:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/01/23/its-2020-do-we-need-more-cyber-hygiene/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/01/23/its-2020-do-we-need-more-cyber-hygiene/]]></link>
			<title>It&#8217;s 2020: Do we need more cyber hygiene? [Published in InfoSecurity Magazine]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 18:24:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/05/12/stopping-the-dark-triad-from-impacting-our-response-to-covid-19/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/05/12/stopping-the-dark-triad-from-impacting-our-response-to-covid-19/]]></link>
			<title>Stopping the Dark Triad from impacting our response to COVID-19 [Published in IPSwitch]</title>
			<pubDate><![CDATA[Thu, 13 Aug 2020 18:09:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2020/09/15/data-security-in-the-cloud-part-1/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2020/09/15/data-security-in-the-cloud-part-1/]]></link>
			<title>Data Security in the Cloud: Part 1 [Published in iPswitch]</title>
			<pubDate><![CDATA[Mon, 05 Oct 2020 20:15:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2015/01/29/how-to-fight-cybercrime-with-smarter-habits/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2015/01/29/how-to-fight-cybercrime-with-smarter-habits/]]></link>
			<title>How to fight cybercrime with smarter habits [Published in The Conversation]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:26:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2015/02/26/who-is-to-blame-for-cyberattacks-cnn/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2015/02/26/who-is-to-blame-for-cyberattacks-cnn/]]></link>
			<title>Who is to blame for cyberattacks? [Published in The Conversation]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:26:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2015/06/08/why-the-cyber-attacks-keep-coming/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2015/06/08/why-the-cyber-attacks-keep-coming/]]></link>
			<title>Why the cyber attacks keep coming [Published in CNN]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2016/02/11/when-hackers-turn-your-lights-off/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2016/02/11/when-hackers-turn-your-lights-off/]]></link>
			<title>When hackers turn your lights off [Published in CNN]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:25:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2016/02/11/when-hackers-turn-your-lights-off-2/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2016/02/11/when-hackers-turn-your-lights-off-2/]]></link>
			<title>When hackers turn your lights off [Published in CNN]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:25:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2016/03/02/apple-want-to-show-you-really-care-protect-us-from-everyday-hacking/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2016/03/02/apple-want-to-show-you-really-care-protect-us-from-everyday-hacking/]]></link>
			<title>Apple, want to show you really care? Protect us from everyday hacking [Published in CNN]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:25:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.arunvishwanath.us/2016/03/25/is-2016-the-year-of-online-extortion/]]></guid>
			<link><![CDATA[https://www.arunvishwanath.us/2016/03/25/is-2016-the-year-of-online-extortion/]]></link>
			<title>Is 2016 the year of online extortion?[Published in CNN]</title>
			<pubDate><![CDATA[Fri, 07 Aug 2020 16:25:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
