<?xml version="1.0" encoding="UTF-8"?>


<?xml-stylesheet type="text/xsl" href="https://blog.falanx.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Falanx</title>
		<link><![CDATA[https://blog.falanx.net]]></link>
		<description><![CDATA[Falanx]]></description>
		<lastBuildDate><![CDATA[Wed, 27 Nov 2024 13:18:55 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://blog.falanx.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://blog.falanx.net/manipulasyon-yonetimi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/manipulasyon-yonetimi/]]></link>
			<title>Manipülasyon Yönetimi</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 13:18:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/was-sind-nist-frameworks/]]></guid>
			<link><![CDATA[https://blog.falanx.net/was-sind-nist-frameworks/]]></link>
			<title>Was sind NIST-Rahmenwerke?</title>
			<pubDate><![CDATA[Wed, 27 Dec 2023 22:23:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/que-son-los-marcos-de-trabajo-del-nist/]]></guid>
			<link><![CDATA[https://blog.falanx.net/que-son-los-marcos-de-trabajo-del-nist/]]></link>
			<title>¿Qué son los marcos de trabajo del NIST?</title>
			<pubDate><![CDATA[Wed, 27 Dec 2023 18:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/how-to-install-windows-sandbox/]]></guid>
			<link><![CDATA[https://blog.falanx.net/how-to-install-windows-sandbox/]]></link>
			<title>How to Install Windows Sandbox</title>
			<pubDate><![CDATA[Wed, 21 Aug 2024 20:33:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/is-davalarinda-delil-yonetimi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/is-davalarinda-delil-yonetimi/]]></link>
			<title>İş Davalarında Delil Yönetimi</title>
			<pubDate><![CDATA[Wed, 20 Nov 2024 13:19:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/how-to-high-traffic-software-architecture/]]></guid>
			<link><![CDATA[https://blog.falanx.net/how-to-high-traffic-software-architecture/]]></link>
			<title>How to High-Traffic Software Architecture</title>
			<pubDate><![CDATA[Wed, 12 Jun 2024 19:52:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/map-of-web-application-architecture/]]></guid>
			<link><![CDATA[https://blog.falanx.net/map-of-web-application-architecture/]]></link>
			<title>Map of Web Application Architecture</title>
			<pubDate><![CDATA[Wed, 03 Jan 2024 23:52:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/load-balancing-vs-redundancy-with-examples/]]></guid>
			<link><![CDATA[https://blog.falanx.net/load-balancing-vs-redundancy-with-examples/]]></link>
			<title>Load Balancing vs Redundancy with Examples</title>
			<pubDate><![CDATA[Wed, 03 Jan 2024 07:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/the-five-forces-of-competition-the-strategic-world-of-michael-porter/]]></guid>
			<link><![CDATA[https://blog.falanx.net/the-five-forces-of-competition-the-strategic-world-of-michael-porter/]]></link>
			<title>The Five Forces of Competition: The Strategic World of Michael Porter</title>
			<pubDate><![CDATA[Tue, 27 Aug 2024 21:00:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/bosanma-davalarinda-delil-yonetimi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/bosanma-davalarinda-delil-yonetimi/]]></link>
			<title>Boşanma Davalarında Delil Yönetimi</title>
			<pubDate><![CDATA[Tue, 26 Nov 2024 11:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/siber-olgunluk-analizi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/siber-olgunluk-analizi/]]></link>
			<title>Siber Olgunluk Analizi Hizmeti</title>
			<pubDate><![CDATA[Tue, 22 Jul 2025 17:44:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/wazuh-nedir/]]></guid>
			<link><![CDATA[https://blog.falanx.net/wazuh-nedir/]]></link>
			<title>Wazuh Hizmeti</title>
			<pubDate><![CDATA[Tue, 20 May 2025 08:13:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/elastic-search-kullanim-ornekleri/]]></guid>
			<link><![CDATA[https://blog.falanx.net/elastic-search-kullanim-ornekleri/]]></link>
			<title>Elastic Search Kullanımı ve Örnekleri</title>
			<pubDate><![CDATA[Tue, 20 May 2025 07:36:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/siber-guvenlikte-fayda-analizi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/siber-guvenlikte-fayda-analizi/]]></link>
			<title>Siber Güvenlikte Fayda Analizi</title>
			<pubDate><![CDATA[Tue, 12 Nov 2024 11:55:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/siber-guvenlik-standartlari/]]></guid>
			<link><![CDATA[https://blog.falanx.net/siber-guvenlik-standartlari/]]></link>
			<title>Siber Güvenlik Standartları</title>
			<pubDate><![CDATA[Tue, 12 Nov 2024 11:49:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/system-security-tools/]]></guid>
			<link><![CDATA[https://blog.falanx.net/system-security-tools/]]></link>
			<title>Information Systems Security Tools</title>
			<pubDate><![CDATA[Tue, 02 Jan 2024 23:42:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/seo-ve-yasal-uyum-danismanligi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/seo-ve-yasal-uyum-danismanligi/]]></link>
			<title>SEO ve Yasal Uyum Danışmanlığı</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 16:39:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/guidelines-for-personal-data-applications-and-procedures-in-turkey/]]></guid>
			<link><![CDATA[https://blog.falanx.net/guidelines-for-personal-data-applications-and-procedures-in-turkey/]]></link>
			<title>Guidelines for Personal Data Applications and Procedures in Turkey</title>
			<pubDate><![CDATA[Thu, 28 Dec 2023 22:02:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/mitre-attck-framework/]]></guid>
			<link><![CDATA[https://blog.falanx.net/mitre-attck-framework/]]></link>
			<title>MITRE ATT&#038;CK Framework</title>
			<pubDate><![CDATA[Thu, 28 Dec 2023 19:54:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/bilgi-sistemleri-guvenlik-testleri/]]></guid>
			<link><![CDATA[https://blog.falanx.net/bilgi-sistemleri-guvenlik-testleri/]]></link>
			<title>Bilgi Sistemleri Güvenlik Testleri</title>
			<pubDate><![CDATA[Thu, 24 Jul 2025 23:33:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/ofansif-dijital-pazarlama/]]></guid>
			<link><![CDATA[https://blog.falanx.net/ofansif-dijital-pazarlama/]]></link>
			<title>Ofansif Dijital Pazarlama</title>
			<pubDate><![CDATA[Thu, 14 Nov 2024 11:40:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/davalarda-dijital-delil-yonetimi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/davalarda-dijital-delil-yonetimi/]]></link>
			<title>Davalarda Dijital Delil Yönetimi</title>
			<pubDate><![CDATA[Thu, 14 Nov 2024 11:33:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/noc-tools/]]></guid>
			<link><![CDATA[https://blog.falanx.net/noc-tools/]]></link>
			<title>NOC Tools</title>
			<pubDate><![CDATA[Thu, 04 Jan 2024 00:15:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/cyber-strategy/]]></guid>
			<link><![CDATA[https://blog.falanx.net/cyber-strategy/]]></link>
			<title>Cyber Strategy</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 17:57:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/siber-guvenlik-yasasi-sirketleri-nasil-etkileyecek/]]></guid>
			<link><![CDATA[https://blog.falanx.net/siber-guvenlik-yasasi-sirketleri-nasil-etkileyecek/]]></link>
			<title>Siber Güvenlik Yasası Şirketleri Nasıl Etkileyecek?</title>
			<pubDate><![CDATA[Sun, 30 Mar 2025 13:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/common-information-security-principles/]]></guid>
			<link><![CDATA[https://blog.falanx.net/common-information-security-principles/]]></link>
			<title>Common Information Security Principles</title>
			<pubDate><![CDATA[Sun, 19 May 2024 16:59:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/digital-marketing-with-strategy-and-technique/]]></guid>
			<link><![CDATA[https://blog.falanx.net/digital-marketing-with-strategy-and-technique/]]></link>
			<title>Digital Marketing with Strategy and Technique</title>
			<pubDate><![CDATA[Sun, 11 Aug 2024 20:31:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/integrity-management/]]></guid>
			<link><![CDATA[https://blog.falanx.net/integrity-management/]]></link>
			<title>Integrity Management in Information Security</title>
			<pubDate><![CDATA[Sun, 11 Aug 2024 19:56:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/confidentiality/]]></guid>
			<link><![CDATA[https://blog.falanx.net/confidentiality/]]></link>
			<title>Confidentiality in Information Security</title>
			<pubDate><![CDATA[Sun, 11 Aug 2024 19:55:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/integrity/]]></guid>
			<link><![CDATA[https://blog.falanx.net/integrity/]]></link>
			<title>Integrity in Information Security</title>
			<pubDate><![CDATA[Sun, 11 Aug 2024 19:55:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/availability/]]></guid>
			<link><![CDATA[https://blog.falanx.net/availability/]]></link>
			<title>Availability in Information Security</title>
			<pubDate><![CDATA[Sun, 11 Aug 2024 19:55:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/map-of-cyber-security/]]></guid>
			<link><![CDATA[https://blog.falanx.net/map-of-cyber-security/]]></link>
			<title>Map of Cyber Security</title>
			<pubDate><![CDATA[Sat, 30 Dec 2023 15:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/personal-data-breach-applications-by-country/]]></guid>
			<link><![CDATA[https://blog.falanx.net/personal-data-breach-applications-by-country/]]></link>
			<title>Personal Data Breach Applications by Country</title>
			<pubDate><![CDATA[Sat, 10 Aug 2024 13:51:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/log-management-in-digital-forensic/]]></guid>
			<link><![CDATA[https://blog.falanx.net/log-management-in-digital-forensic/]]></link>
			<title>Log Management in Digital Forensic</title>
			<pubDate><![CDATA[Sat, 10 Aug 2024 13:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/how-to-analysis-an-ios-image/]]></guid>
			<link><![CDATA[https://blog.falanx.net/how-to-analysis-an-ios-image/]]></link>
			<title>How to analysis an iOS Image</title>
			<pubDate><![CDATA[Sat, 06 Jan 2024 18:27:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/savunma-hizmetlerimiz/]]></guid>
			<link><![CDATA[https://blog.falanx.net/savunma-hizmetlerimiz/]]></link>
			<title>Savunma Çözümlerimiz</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 13:24:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/siber-strateji/]]></guid>
			<link><![CDATA[https://blog.falanx.net/siber-strateji/]]></link>
			<title>Siber Strateji</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 11:03:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/what-is-sandbox-and-sandboxing-solutions/]]></guid>
			<link><![CDATA[https://blog.falanx.net/what-is-sandbox-and-sandboxing-solutions/]]></link>
			<title>What is Sandbox and Sandboxing Solutions?</title>
			<pubDate><![CDATA[Mon, 24 Jun 2024 20:46:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/iso-27001-itil-and-cobit-differences/]]></guid>
			<link><![CDATA[https://blog.falanx.net/iso-27001-itil-and-cobit-differences/]]></link>
			<title>ISO 27001, ITIL and COBIT Differences</title>
			<pubDate><![CDATA[Mon, 24 Jun 2024 19:22:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/dijital-pazarlama-guvenligi/]]></guid>
			<link><![CDATA[https://blog.falanx.net/dijital-pazarlama-guvenligi/]]></link>
			<title>Dijital Pazarlama Güvenliği</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 14:19:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/what-is-windows-sandbox/]]></guid>
			<link><![CDATA[https://blog.falanx.net/what-is-windows-sandbox/]]></link>
			<title>What is Windows Sandbox?</title>
			<pubDate><![CDATA[Mon, 15 Jul 2024 20:31:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/windows-security-tools/]]></guid>
			<link><![CDATA[https://blog.falanx.net/windows-security-tools/]]></link>
			<title>Windows Systems Security Tools</title>
			<pubDate><![CDATA[Mon, 01 Jan 2024 23:57:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/defensive-linux-security-tools/]]></guid>
			<link><![CDATA[https://blog.falanx.net/defensive-linux-security-tools/]]></link>
			<title>Defensive Linux Security Tools</title>
			<pubDate><![CDATA[Mon, 01 Jan 2024 23:25:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/wage-and-quality-decline-in-the-it-sector/]]></guid>
			<link><![CDATA[https://blog.falanx.net/wage-and-quality-decline-in-the-it-sector/]]></link>
			<title>Wage and Quality Decline in the IT Sector</title>
			<pubDate><![CDATA[Fri, 29 Mar 2024 21:10:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/profile-of-a-good-penetration-tester/]]></guid>
			<link><![CDATA[https://blog.falanx.net/profile-of-a-good-penetration-tester/]]></link>
			<title>Profile of A Good Penetration Tester</title>
			<pubDate><![CDATA[Fri, 29 Mar 2024 21:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/elk-stack-vs-snort/]]></guid>
			<link><![CDATA[https://blog.falanx.net/elk-stack-vs-snort/]]></link>
			<title>ELK Stack vs Snort</title>
			<pubDate><![CDATA[Fri, 29 Dec 2023 20:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/the-process-of-finding-the-attacker-originating-from-turkey/]]></guid>
			<link><![CDATA[https://blog.falanx.net/the-process-of-finding-the-attacker-originating-from-turkey/]]></link>
			<title>The process of finding the  attacker originating from Turkey</title>
			<pubDate><![CDATA[Fri, 29 Dec 2023 19:57:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/what-is-grc-in-cyber-security/]]></guid>
			<link><![CDATA[https://blog.falanx.net/what-is-grc-in-cyber-security/]]></link>
			<title>What is GRC in Cyber Security?</title>
			<pubDate><![CDATA[Fri, 28 Jun 2024 11:31:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/the-role-and-effects-of-neuromarketing-in-digital-marketing/]]></guid>
			<link><![CDATA[https://blog.falanx.net/the-role-and-effects-of-neuromarketing-in-digital-marketing/]]></link>
			<title>The Role and Effects of Neuromarketing in Digital Marketing</title>
			<pubDate><![CDATA[Fri, 28 Jun 2024 11:21:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.falanx.net/information-security-and-tools/]]></guid>
			<link><![CDATA[https://blog.falanx.net/information-security-and-tools/]]></link>
			<title>Information Security and Tools</title>
			<pubDate><![CDATA[Fri, 05 Jan 2024 07:38:14 +0000]]></pubDate>
		</item>
				</channel>
</rss>
