<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 6:42 am by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://bluegoatcyber.com/news-sitemap.xsl?news-sitemap=root"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/postmarket-cybersecurity-for-medical-devices-the-fda-roadmap/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T04:07:52+00:00]]></news:publication_date>
			<news:title><![CDATA[Postmarket Cybersecurity for Medical Devices: The FDA Roadmap]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-pen-testing-choosing-the-right-provider/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T04:02:51+00:00]]></news:publication_date>
			<news:title><![CDATA[Medical Device Pen Testing: Choosing the Right Provider]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/how-to-respond-to-an-fda-cybersecurity-ai-request/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T03:52:20+00:00]]></news:publication_date>
			<news:title><![CDATA[How to Respond to an FDA Cybersecurity AI Request]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/why-iso-27001-and-soc-2-are-not-enough-for-fda-medical-device-cybersecurity/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T03:48:26+00:00]]></news:publication_date>
			<news:title><![CDATA[Why ISO 27001 and SOC 2 Are Not Enough for FDA Medical Device Cybersecurity]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/a-step-by-step-guide-to-threat-modeling-connected-and-implantable-medical-devices/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T03:41:47+00:00]]></news:publication_date>
			<news:title><![CDATA[A Step-by-Step Guide to Threat Modeling Connected and Implantable Medical Devices]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/how-to-meet-fda-524b-cybersecurity-requirements/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T03:22:30+00:00]]></news:publication_date>
			<news:title><![CDATA[How to Meet FDA 524B Cybersecurity Requirements]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/stride-threat-modeling-for-connected-medical-devices/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-10T02:20:04+00:00]]></news:publication_date>
			<news:title><![CDATA[STRIDE Threat Modeling for Connected Medical Devices]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/fda-estar-cybersecurity-documentation-a-510k-field-guide/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T22:23:30+00:00]]></news:publication_date>
			<news:title><![CDATA[FDA eSTAR Cybersecurity Documentation: A 510(k) Field Guide]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/what-triggers-fda-cybersecurity-deficiencies-for-devices/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T22:17:30+00:00]]></news:publication_date>
			<news:title><![CDATA[What Triggers FDA Cybersecurity Deficiencies for Devices]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/510k-cybersecurity-requirements-every-maker-must-meet/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T22:01:44+00:00]]></news:publication_date>
			<news:title><![CDATA[510(k) Cybersecurity Requirements Every Maker Must Meet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/spdf-cybersecurity-documentation-what-fda-reviewers-expect/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T21:40:57+00:00]]></news:publication_date>
			<news:title><![CDATA[SPDF Cybersecurity Documentation: What FDA Reviewers Expect]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-cybersecurity-risk-analysis-the-fda-playbook/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T21:19:26+00:00]]></news:publication_date>
			<news:title><![CDATA[Medical Device Cybersecurity Risk Analysis: The FDA Playbook]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-sbom-fda-requirements-and-submission-guide/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T21:10:14+00:00]]></news:publication_date>
			<news:title><![CDATA[Medical Device SBOM: FDA Requirements and Submission Guide]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/cybersecurity-risks-of-legacy-medical-devices-in-hospitals/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T20:23:46+00:00]]></news:publication_date>
			<news:title><![CDATA[Cybersecurity Risks of Legacy Medical Devices in Hospitals]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/why-medical-device-cybersecurity-is-nothing-like-enterprise-it/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T18:00:49+00:00]]></news:publication_date>
			<news:title><![CDATA[Why Medical Device Cybersecurity Is Nothing Like Enterprise IT]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/how-to-choose-the-best-medical-device-cybersecurity-company/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-09T07:21:35+00:00]]></news:publication_date>
			<news:title><![CDATA[How to Choose the Best Medical Device Cybersecurity Company]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/how-to-respond-to-a-510k-cybersecurity-deficiency-letter/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-08T20:54:57+00:00]]></news:publication_date>
			<news:title><![CDATA[How to Respond to a 510(k) Cybersecurity Deficiency Letter]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/penetration-testing-for-medical-devices-what-fda-expects/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-08T09:50:48+00:00]]></news:publication_date>
			<news:title><![CDATA[Penetration Testing for Medical Devices: What The FDA Expects]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/fda-cybersecurity-guidance-what-device-makers-must-know/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-08T09:47:01+00:00]]></news:publication_date>
			<news:title><![CDATA[FDA Cybersecurity Guidance: What Device Makers Must Know]]></news:title>
		</news:news>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-cybersecurity-a-complete-lifecycle-guide/]]></loc>
		<news:news>
			<news:publication>
				<news:name><![CDATA[Blue Goat Cyber]]></news:name>
				<news:language><![CDATA[en]]></news:language>
			</news:publication>
			<news:publication_date><![CDATA[2026-04-08T09:37:43+00:00]]></news:publication_date>
			<news:title><![CDATA[Medical Device Cybersecurity: A Complete Lifecycle Guide]]></news:title>
		</news:news>
	</url>
</urlset>