<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:37 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberdefense.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Jan Kallberg, PhD</title>
		<link><![CDATA[https://cyberdefense.com]]></link>
		<description><![CDATA[Jan Kallberg, PhD]]></description>
		<lastBuildDate><![CDATA[Sun, 11 Jan 2026 02:42:47 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberdefense.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberdefense.com/publications/]]></guid>
			<link><![CDATA[https://cyberdefense.com/publications/]]></link>
			<title>Publications</title>
			<pubDate><![CDATA[Sun, 11 Jan 2026 02:42:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/claims-ideas-and-concepts/]]></guid>
			<link><![CDATA[https://cyberdefense.com/claims-ideas-and-concepts/]]></link>
			<title>Ideas, Claims, and Concepts</title>
			<pubDate><![CDATA[Sun, 11 Jan 2026 02:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/op-eds-and-commentaries/]]></guid>
			<link><![CDATA[https://cyberdefense.com/op-eds-and-commentaries/]]></link>
			<title>Oped and Commentary</title>
			<pubDate><![CDATA[Sun, 11 Jan 2026 02:33:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/contact/]]></guid>
			<link><![CDATA[https://cyberdefense.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 19:11:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/cv/]]></guid>
			<link><![CDATA[https://cyberdefense.com/cv/]]></link>
			<title>CV</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 19:10:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/biography/]]></guid>
			<link><![CDATA[https://cyberdefense.com/biography/]]></link>
			<title>Biography</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 19:08:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberdefense.com/2026/01/cyber-attacks-main-ability-to-destabilize-a-society-is-through-secondary-effects/]]></guid>
			<link><![CDATA[https://cyberdefense.com/2026/01/cyber-attacks-main-ability-to-destabilize-a-society-is-through-secondary-effects/]]></link>
			<title>Cyber Attacks&#8217; Main Ability to Destabilize a Society is through Secondary Effects</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 19:04:41 +0000]]></pubDate>
		</item>
				</channel>
</rss>
