<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:37 pm by All in One SEO v4.8.9 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cytal.co.uk/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cytal</title>
		<link><![CDATA[https://cytal.co.uk]]></link>
		<description><![CDATA[Cytal]]></description>
		<lastBuildDate><![CDATA[Tue, 10 Feb 2026 11:07:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cytal.co.uk/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cytal.co.uk/blog/why-our-tool-catches-bugs-other-tools-miss/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/why-our-tool-catches-bugs-other-tools-miss/]]></link>
			<title>Why ProtoCrawler Catches Bugs Other Tools Miss</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 11:07:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/news/]]></guid>
			<link><![CDATA[https://cytal.co.uk/news/]]></link>
			<title>News</title>
			<pubDate><![CDATA[Thu, 23 Sep 2021 11:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/cybersecurity-as-a-service-what-it-means-and-what-to-look-for/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/cybersecurity-as-a-service-what-it-means-and-what-to-look-for/]]></link>
			<title>Cybersecurity as a service: what it means and what to look for</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 15:35:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-an-mssp-managed-security-service-providers-explained/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-an-mssp-managed-security-service-providers-explained/]]></link>
			<title>What is an MSSP? Managed security service providers explained</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 10:43:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-defensics-alternative/]]></guid>
			<link><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-defensics-alternative/]]></link>
			<title>Schedule a Protocrawler Demo &#8211; Defensics Alternative</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 14:07:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/ics-security-protecting-industrial-control-systems-in-2026/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/ics-security-protecting-industrial-control-systems-in-2026/]]></link>
			<title>ICS security: protecting industrial control systems in 2026</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/cyber-security-monitoring-what-gets-missed-in-ot-environments/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/cyber-security-monitoring-what-gets-missed-in-ot-environments/]]></link>
			<title>Cyber security monitoring: what gets missed in OT environments</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 10:55:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/cyber-security-compliance-guide-for-uk-industrial-organisations/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/cyber-security-compliance-guide-for-uk-industrial-organisations/]]></link>
			<title>Cyber security compliance guide for UK industrial organisations</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 10:12:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-telecoms-itsar-nccs-india/]]></guid>
			<link><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-telecoms-itsar-nccs-india/]]></link>
			<title>Schedule a Protocrawler Demo &#8211; TELECOMS (ITSAR / NCCS) &#8211; INDIA</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 11:03:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-industrial-control-systems-ics-india/]]></guid>
			<link><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-industrial-control-systems-ics-india/]]></link>
			<title>Schedule a Protocrawler Demo &#8211;  INDUSTRIAL CONTROL SYSTEMS (ICS) &#8211; INDIA</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 11:01:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-industrial-control-systems-ics/]]></guid>
			<link><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-industrial-control-systems-ics/]]></link>
			<title>Schedule a Protocrawler Demo &#8211; INDUSTRIAL CONTROL SYSTEMS (ICS)</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 10:48:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/]]></guid>
			<link><![CDATA[https://cytal.co.uk/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 16 Sep 2025 10:33:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/mutation-based-fuzz-testing-a-practical-guide-with-protocrawler/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/mutation-based-fuzz-testing-a-practical-guide-with-protocrawler/]]></link>
			<title>Mutation-Based Fuzz Testing: A Practical Guide with ProtoCrawler</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 09:59:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/how-fuzz-testing-finds-vulnerabilities-other-tools-miss/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/how-fuzz-testing-finds-vulnerabilities-other-tools-miss/]]></link>
			<title>How fuzz testing finds vulnerabilities other tools miss</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 08:36:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-negative-testing-in-software-testing/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-negative-testing-in-software-testing/]]></link>
			<title>What is negative testing in software testing?</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 07:52:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-fuzz-testing-a-plain-english-explanation/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-fuzz-testing-a-plain-english-explanation/]]></link>
			<title>What is fuzz testing? A plain-English explanation</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 13:43:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/cloud-security-services-what-does-real-protection-actually-look-like/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/cloud-security-services-what-does-real-protection-actually-look-like/]]></link>
			<title>Cloud security services: what does real protection actually look like?</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 15:23:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/managed-cyber-security-services-what-to-look-for-and-what-to-avoid/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/managed-cyber-security-services-what-to-look-for-and-what-to-avoid/]]></link>
			<title>Managed cyber security services: what to look for (and what to avoid)</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 12:02:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-a-cybersecurity-risk-assessment/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-a-cybersecurity-risk-assessment/]]></link>
			<title>What is a cybersecurity risk assessment?</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 11:14:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-telecoms/]]></guid>
			<link><![CDATA[https://cytal.co.uk/schedule-a-protocrawler-demo-telecoms/]]></link>
			<title>Schedule a Protocrawler Demo &#8211; TELECOMS</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 15:55:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-threat-detection/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-threat-detection/]]></link>
			<title>What Is Threat Detection?</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 14:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/the-complete-guide-to-cybersecurity-testing/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/the-complete-guide-to-cybersecurity-testing/]]></link>
			<title>The Complete Guide to Cybersecurity Testing</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 14:18:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/from-skeptic-to-supporter-why-protocrawlers-learning-curve-is-shorter-than-you-think/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/from-skeptic-to-supporter-why-protocrawlers-learning-curve-is-shorter-than-you-think/]]></link>
			<title>From Skeptic to Supporter: Why Protocrawler’s Learning Curve is Shorter Than You Think</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 14:12:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/how-automated-fuzz-testing-saves-time-and-resources/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/how-automated-fuzz-testing-saves-time-and-resources/]]></link>
			<title>How Automated Fuzz Testing Saves Time and Resources</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 14:02:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/protocols/ntp-protocol/]]></guid>
			<link><![CDATA[https://cytal.co.uk/protocols/ntp-protocol/]]></link>
			<title>NTP Protocol</title>
			<pubDate><![CDATA[Mon, 02 Feb 2026 13:47:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/how-to-test-software-with-invalid-and-unexpected-inputs/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/how-to-test-software-with-invalid-and-unexpected-inputs/]]></link>
			<title>How to test software with invalid and unexpected inputs</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 11:27:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/what-is-iec-62443-the-industrial-cyber-security-standard-explained/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/what-is-iec-62443-the-industrial-cyber-security-standard-explained/]]></link>
			<title>What Is IEC 62443? The Industrial Cyber Security Standard Explained</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 08:18:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/securing-uk-telecom-networks-in-an-era-of-converging-threats/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/securing-uk-telecom-networks-in-an-era-of-converging-threats/]]></link>
			<title>Securing UK Telecom Networks in an Era of Converging Threats</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 15:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-certification-uk-what-it-involves-and-how-to-prepare/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-certification-uk-what-it-involves-and-how-to-prepare/]]></link>
			<title>IEC 62443 Certification UK: What It Involves and How to Prepare</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 14:59:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/why-protocrawler-beats-defensics-for-ot-fuzz-testing/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/why-protocrawler-beats-defensics-for-ot-fuzz-testing/]]></link>
			<title>Why ProtoCrawler Beats Defensics for OT Fuzz Testing</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 10:48:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iot-security-testing-methods-for-identifying-device-vulnerabilities/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iot-security-testing-methods-for-identifying-device-vulnerabilities/]]></link>
			<title>IoT Security Testing: Methods for Identifying Device Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 14:31:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-framework-how-the-standard-is-organised-and-how-it-works/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-framework-how-the-standard-is-organised-and-how-it-works/]]></link>
			<title>IEC 62443 Framework: How the Standard Is Organised and How It Works</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 14:09:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/iec-62443/]]></guid>
			<link><![CDATA[https://cytal.co.uk/iec-62443/]]></link>
			<title>IEC 62443</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 14:08:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-vs-nist-how-the-two-frameworks-compare-and-when-to-use-each/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-vs-nist-how-the-two-frameworks-compare-and-when-to-use-each/]]></link>
			<title>IEC 62443 vs NIST: How the Two Frameworks Compare and When to Use Each</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 14:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-security-levels-what-they-mean-and-how-to-achieve-them/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-security-levels-what-they-mean-and-how-to-achieve-them/]]></link>
			<title>IEC 62443 Security Levels: What They Mean and How to Achieve Them</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 12:37:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/seamless-security-integrating-protocrawler-into-your-ci-cd-pipeline/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/seamless-security-integrating-protocrawler-into-your-ci-cd-pipeline/]]></link>
			<title>Seamless Security: Integrating ProtoCrawler into Your CI/CD Pipeline</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 10:27:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-4-2-component-security-requirements-and-how-to-meet-them/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-4-2-component-security-requirements-and-how-to-meet-them/]]></link>
			<title>IEC 62443-4-2: Component Security Requirements and How to Meet Them</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 14:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/why-protocrawler-outperforms-legacy-fuzzers-like-defensics-in-ot-security/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/why-protocrawler-outperforms-legacy-fuzzers-like-defensics-in-ot-security/]]></link>
			<title>Why Protocrawler Outperforms Legacy Fuzzers like Defensics in OT Security</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 10:03:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-4-1-secure-development-lifecycle-requirements-explained/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-4-1-secure-development-lifecycle-requirements-explained/]]></link>
			<title>IEC 62443-4-1: Secure Development Lifecycle Requirements Explained</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 14:02:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/book-a-demo/]]></guid>
			<link><![CDATA[https://cytal.co.uk/book-a-demo/]]></link>
			<title>Schedule a Protocrawler Demo</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 11:25:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-compliance-testing-how-to-meet-the-standards-security-requirements/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-compliance-testing-how-to-meet-the-standards-security-requirements/]]></link>
			<title>IEC 62443 Compliance Testing: How to Meet the Standard&#8217;s Security Requirements</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 11:33:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-security-testing-tools-what-they-need-to-do-and-how-to-choose/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-security-testing-tools-what-they-need-to-do-and-how-to-choose/]]></link>
			<title>IEC 62443 Security Testing Tools: What They Need to Do and How to Choose</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 10:18:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/how-protocrawlers-html-reports-simplify-vulnerability-remediation/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/how-protocrawlers-html-reports-simplify-vulnerability-remediation/]]></link>
			<title>How Protocrawler’s HTML Reports Simplify Vulnerability Remediation</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 13:53:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-compliance-in-the-uk-a-practical-guide-for-industrial-organisations/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-compliance-in-the-uk-a-practical-guide-for-industrial-organisations/]]></link>
			<title>IEC 62443 Compliance in the UK: A Practical Guide for Industrial Organisations</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 11:51:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iec-62443-fuzz-testing-how-to-meet-protocol-security-requirements/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iec-62443-fuzz-testing-how-to-meet-protocol-security-requirements/]]></link>
			<title>IEC 62443 Fuzz Testing: How to Meet Protocol Security Requirements</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 09:37:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/iot-device-vulnerabilities-the-most-common-security-weaknesses/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/iot-device-vulnerabilities-the-most-common-security-weaknesses/]]></link>
			<title>IoT Device Vulnerabilities: The Most Common Security Weaknesses</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 09:30:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/protocol-fuzzing-how-it-finds-hidden-security-vulnerabilities/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/protocol-fuzzing-how-it-finds-hidden-security-vulnerabilities/]]></link>
			<title>Protocol Fuzzing: How It Finds Hidden Security Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 09:16:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/iot-security-vulnerabilities-risks-and-testing-strategies/]]></guid>
			<link><![CDATA[https://cytal.co.uk/iot-security-vulnerabilities-risks-and-testing-strategies/]]></link>
			<title>IoT Security: Vulnerabilities, Risks and Testing Strategies</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 14:29:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/protocols/netconf-protocol/]]></guid>
			<link><![CDATA[https://cytal.co.uk/protocols/netconf-protocol/]]></link>
			<title>NETCONF Protocol</title>
			<pubDate><![CDATA[Mon, 02 Feb 2026 13:38:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cytal.co.uk/blog/securing-uk-industrial-control-systems-in-an-era-of-converging-threats/]]></guid>
			<link><![CDATA[https://cytal.co.uk/blog/securing-uk-industrial-control-systems-in-an-era-of-converging-threats/]]></link>
			<title>Securing UK Industrial Control Systems in an Era of Converging Threats</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 14:59:20 +0000]]></pubDate>
		</item>
				</channel>
</rss>
