<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 8, 2026 at 7:35 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://bluegoatcyber.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Blue Goat Cyber</title>
		<link><![CDATA[https://bluegoatcyber.com]]></link>
		<description><![CDATA[Blue Goat Cyber]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 09:54:04 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://bluegoatcyber.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/fda-cybersecurity-guidance-what-device-makers-must-know/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/fda-cybersecurity-guidance-what-device-makers-must-know/]]></link>
			<title>FDA Cybersecurity Guidance: What Device Makers Must Know</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:54:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/penetration-testing-for-medical-devices-what-fda-expects/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/penetration-testing-for-medical-devices-what-fda-expects/]]></link>
			<title>Penetration Testing for Medical Devices: What FDA Expects</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:53:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/pma-de-novo-510k-cybersecurity-fda-submissions/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/pma-de-novo-510k-cybersecurity-fda-submissions/]]></link>
			<title>PMA vs De Novo vs 510(k): Cybersecurity Impact on FDA Submissions</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:49:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/url-encoding-medical-device-web-security/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/url-encoding-medical-device-web-security/]]></link>
			<title>URL Encoding for Medical Device Web Security: Risks and Best Practices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:30:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/gsm-cybersecurity-vulnerabilities-medical-devices/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/gsm-cybersecurity-vulnerabilities-medical-devices/]]></link>
			<title>GSM Cybersecurity Risks for Medical Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:14:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/microkernels-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/microkernels-medical-device-cybersecurity/]]></link>
			<title>Microkernels for Medical Devices: Security Benefits and Tradeoffs</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:57:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/heap-spraying-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/heap-spraying-medical-device-cybersecurity/]]></link>
			<title>Heap Spraying in Medical Device Cybersecurity: Risks and Defenses</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:11:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/offline-vs-online-password-attacks-medtech/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/offline-vs-online-password-attacks-medtech/]]></link>
			<title>Password Security for Medical Devices: Stop Online and Offline Attacks</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:41:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/birthday-attack-hashing-medtech-collision-risk/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/birthday-attack-hashing-medtech-collision-risk/]]></link>
			<title>Preventing Hash Collision Risk in Medical Device Cybersecurity</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:26:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/biometric-security-and-the-gummy-bear-attack/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/biometric-security-and-the-gummy-bear-attack/]]></link>
			<title>Biometric Security for Medical Devices: Lessons from “Gummy Fingers”</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:26:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/get-vs-post-medical-device-api-security/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/get-vs-post-medical-device-api-security/]]></link>
			<title>GET vs POST for Medical Device APIs: Security Best Practices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:16:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/powershell-medical-device-cybersecurity-attacks-defense/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/powershell-medical-device-cybersecurity-attacks-defense/]]></link>
			<title>PowerShell in Medical Device Cybersecurity: Abuse &amp; Defenses</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/acls-in-cybersecurity-managing-access-control-effectively/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/acls-in-cybersecurity-managing-access-control-effectively/]]></link>
			<title>ACLs for Medical Device Cybersecurity: Access Control Guide</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:43:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/medical-device-sql-injection-parameterized-queries/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/medical-device-sql-injection-parameterized-queries/]]></link>
			<title>Parameterized Queries for Medical Device Cybersecurity (SQLi)</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:38:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/about-us/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/about-us/]]></link>
			<title>About Blue Goat Cyber</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 21:41:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/security-architecture-diagrams-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/security-architecture-diagrams-medical-device-cybersecurity/]]></link>
			<title>Security Architecture Diagrams for Medical Device Cybersecurity</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:52:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/what-is-a-salami-attack/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/what-is-a-salami-attack/]]></link>
			<title>Salami Attacks in Medical Device Cybersecurity: Tiny Changes</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:21:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/how-to-choose-a-cybersecurity-firm-for-fda-submissions/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/how-to-choose-a-cybersecurity-firm-for-fda-submissions/]]></link>
			<title>How to Choose a Cybersecurity Firm for FDA Submissions</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:02:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/fda-medical-device-cybersecurity-guidance-2026/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/fda-medical-device-cybersecurity-guidance-2026/]]></link>
			<title>FDA Medical Device Cybersecurity 2026: 524B eSTAR Checklist</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:33:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/secure-file-upload-validation-web-security-medtech/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/secure-file-upload-validation-web-security-medtech/]]></link>
			<title>Secure File Upload Validation for Web Apps in MedTech</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 08:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/the-med-device-cyber-podcast/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/the-med-device-cyber-podcast/]]></link>
			<title>The Med Device Cyber Podcast</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 08:41:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/]]></link>
			<title>Blue Goat Cyber</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 08:12:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/medical-device-cybersecurity-a-complete-lifecycle-guide/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/medical-device-cybersecurity-a-complete-lifecycle-guide/]]></link>
			<title>Medical Device Cybersecurity: A Complete Lifecycle Guide</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:54:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/debunking-cell-phone-cloning-myths/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/debunking-cell-phone-cloning-myths/]]></link>
			<title>Debunking Device Cloning Myths: What Medical Device Manufacturers Need to Know</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 22:04:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/nonce-understanding-the-concept-and-its-importance/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/nonce-understanding-the-concept-and-its-importance/]]></link>
			<title>Nonces in Medical Device Cybersecurity: Why They Matter for Firmware &amp; Data Protection</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 22:03:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/phreaking-lessons-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/phreaking-lessons-medical-device-cybersecurity/]]></link>
			<title>What Phreaking Teaches Medical Device Cybersecurity Teams</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 07:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/return-to-libc-medical-device-cybersecurity-defense/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/return-to-libc-medical-device-cybersecurity-defense/]]></link>
			<title>Return-to-libc Attacks in Medical Device Cybersecurity: Defense Guide</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 07:43:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/post-exploitation-frameworks-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/post-exploitation-frameworks-medical-device-cybersecurity/]]></link>
			<title>Post-Exploitation Frameworks in MedTech: What Defenders Need</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 07:32:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/curl-medical-device-cybersecurity-testing/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/curl-medical-device-cybersecurity-testing/]]></link>
			<title>How curl Supports Medical Device Cybersecurity Testing</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 05:18:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/fda-premarket-cybersecurity-services/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/fda-premarket-cybersecurity-services/]]></link>
			<title>FDA Premarket Cybersecurity Services</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 07:58:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/vm-escape-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/vm-escape-medical-device-cybersecurity/]]></link>
			<title>VM Escape in Medical Device Cybersecurity: Risk and Mitigations</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 15:01:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/the-challenge-of-attribution-in-cyber-attacks/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/the-challenge-of-attribution-in-cyber-attacks/]]></link>
			<title>Attribution in Cyber Attacks: A MedTech Reality Check</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 14:23:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/why-are-mac-addresses-in-hexadecimal/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/why-are-mac-addresses-in-hexadecimal/]]></link>
			<title>Why MAC Addresses Are Hexadecimal (Medical Device Security Guide)</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 14:13:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/hardware-hacking-tools-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/hardware-hacking-tools-medical-device-cybersecurity/]]></link>
			<title>Hardware Hacking Tools for Medical Device Cybersecurity Testing</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 11:48:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/javascript-rce-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/javascript-rce-medical-device-cybersecurity/]]></link>
			<title>JavaScript RCE in Medical Devices: Risks, Examples, and Fixes</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 11:33:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/covert-vs-overt-channels-in-cybersecurity-understanding-the-difference/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/covert-vs-overt-channels-in-cybersecurity-understanding-the-difference/]]></link>
			<title>Covert vs Overt Channels in Medical Device Cybersecurity</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 10:31:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/ephemeral-ports-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/ephemeral-ports-medical-device-cybersecurity/]]></link>
			<title>Ephemeral Ports in Medical Device Cybersecurity (What to Know)</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 10:15:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/reports-fda-to-scrutinize-medical-device-cybersecurity-significantly-more-in-2026/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/reports-fda-to-scrutinize-medical-device-cybersecurity-significantly-more-in-2026/]]></link>
			<title>Reports: FDA to Scrutinize Medical Device Cybersecurity Significantly More in 2026</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 08:08:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/from-idea-to-fda-clearance-what-nobody-tells-medtech-founders/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/from-idea-to-fda-clearance-what-nobody-tells-medtech-founders/]]></link>
			<title>From Idea to FDA Clearance: What Nobody Tells MedTech Founders</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 08:08:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/how-can-medical-device-manufacturers-support-operational-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/how-can-medical-device-manufacturers-support-operational-cybersecurity/]]></link>
			<title>How Can Medical Device Manufacturers Support Operational Cybersecurity?</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 07:42:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/resources/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/resources/]]></link>
			<title>Medical Device Cybersecurity Resources</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 07:08:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/key-escrow-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/key-escrow-medical-device-cybersecurity/]]></link>
			<title>Key Escrow in Medical Device Cybersecurity: Risks &#038; Controls</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 05:35:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/permissions-vs-rights-access-control-for-medical-device-security/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/permissions-vs-rights-access-control-for-medical-device-security/]]></link>
			<title>Permissions vs Rights: Access Control for Medical Device Security</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 05:26:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/ajax-vulnerabilities-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/ajax-vulnerabilities-medical-device-cybersecurity/]]></link>
			<title>AJAX Vulnerabilities in Medical Device Web Applications</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 05:14:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/iris-scan-spoofing-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/iris-scan-spoofing-medical-device-cybersecurity/]]></link>
			<title>Can Contact Lenses Fool Iris Scans in Medical Devices?</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 04:57:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/hooded-hacker-myth-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/hooded-hacker-myth-medical-device-cybersecurity/]]></link>
			<title>Why Hooded Hackers Hurt Medical Device Cybersecurity</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 04:41:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/nfc-ble-security-risks-medical-devices/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/nfc-ble-security-risks-medical-devices/]]></link>
			<title>NFC &amp; BLE Security in Medical Devices: Lessons from Contactless Skimming</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 04:24:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/what-is-an-xxe-attack-in-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/what-is-an-xxe-attack-in-cybersecurity/]]></link>
			<title>XXE Attacks Explained: Risks and Fixes for MedTech Software</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 03:49:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/a-new-era-for-quality-and-safety-what-the-fdas-qmsr-means-for-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/a-new-era-for-quality-and-safety-what-the-fdas-qmsr-means-for-cybersecurity/]]></link>
			<title>A New Era for Quality and Safety: What the FDA’s QMSR Means for Cybersecurity</title>
			<pubDate><![CDATA[Sun, 08 Feb 2026 15:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://bluegoatcyber.com/blog/write-blocker-medical-device-cybersecurity/]]></guid>
			<link><![CDATA[https://bluegoatcyber.com/blog/write-blocker-medical-device-cybersecurity/]]></link>
			<title>Write Blockers for Medical Device Cybersecurity Investigations</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 10:22:24 +0000]]></pubDate>
		</item>
				</channel>
</rss>
