<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on March 16, 2026 at 12:31 pm by All in One SEO v4.8.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.tyrex-cyber.co.uk/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Tyrex</title>
		<link><![CDATA[https://www.tyrex-cyber.co.uk]]></link>
		<description><![CDATA[Tyrex]]></description>
		<lastBuildDate><![CDATA[Wed, 11 Feb 2026 14:03:56 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.tyrex-cyber.co.uk/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/iec-62443-usb-security-requirements/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/iec-62443-usb-security-requirements/]]></link>
			<title>IEC 62443 USB Security Requirements</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 14:03:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/ransomware-101/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/ransomware-101/]]></link>
			<title>Ransomware 101: How It Works and How to Block It with USB Protection</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 14:02:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 13:48:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/cybersecurity-and-resilience-bill-safeguarding-the-uks-digital-future/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/cybersecurity-and-resilience-bill-safeguarding-the-uks-digital-future/]]></link>
			<title>Cybersecurity and Resilience Bill: Safeguarding the UK’s Digital Future</title>
			<pubDate><![CDATA[Tue, 27 Jan 2026 17:05:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/why-usb-devices-remain-one-of-the-biggest-hidden-cyber-threats/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/why-usb-devices-remain-one-of-the-biggest-hidden-cyber-threats/]]></link>
			<title>Why USB Devices Remain One of the Biggest Hidden Cyber Threats</title>
			<pubDate><![CDATA[Tue, 03 Feb 2026 17:24:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/5-of-the-worst-ransomware-attacks-and-how-usb-hygiene-could-have-helped/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/5-of-the-worst-ransomware-attacks-and-how-usb-hygiene-could-have-helped/]]></link>
			<title>5 of the Worst Ransomware Attacks and How USB Hygiene Could Have Helped</title>
			<pubDate><![CDATA[Tue, 03 Feb 2026 13:46:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/usb-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/usb-cybersecurity/]]></link>
			<title>What is USB Cybersecurity?</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 15:54:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-sheep-dip-in-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-sheep-dip-in-cybersecurity/]]></link>
			<title>What is Sheep Dip in Cybersecurity?</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 09:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/how-ai-is-being-used-in-cyberattacks/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/how-ai-is-being-used-in-cyberattacks/]]></link>
			<title>How AI is being Used in Cyberattacks</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 12:09:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-removable-media-cyber-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-removable-media-cyber-security/]]></link>
			<title>What is Removable Media Cyber Security?</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 11:26:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-industrial-control-systems-ics-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-is-industrial-control-systems-ics-security/]]></link>
			<title>What is Industrial Control Systems (ICS) Security?</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 11:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/resources/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/resources/]]></link>
			<title>Resources</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 10:11:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/ransomware-in-the-workplace-what-to-do/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/ransomware-in-the-workplace-what-to-do/]]></link>
			<title>Ransomware in the Workplace: What to Do?</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 10:09:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/ai-malware-understanding-and-preventing-these-new-threats/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/ai-malware-understanding-and-preventing-these-new-threats/]]></link>
			<title>AI Malware: Understanding and Preventing Emerging Threats</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 10:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-apples-cyber-incidents-teach-us-about-hardware-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/what-apples-cyber-incidents-teach-us-about-hardware-security/]]></link>
			<title>What Apple’s Cyber Incidents Teach Us About Hardware Security</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 17:37:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/fighting-polymorphic-malware-with-hardware-based-usb-scanners/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/fighting-polymorphic-malware-with-hardware-based-usb-scanners/]]></link>
			<title>Fighting Polymorphic Malware with Hardware-Based USB Scanners</title>
			<pubDate><![CDATA[Wed, 14 Jan 2026 14:56:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/maritime-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/maritime-cybersecurity/]]></link>
			<title>Maritime Cybersecurity</title>
			<pubDate><![CDATA[Wed, 07 Jan 2026 12:22:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/classified-networks/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/classified-networks/]]></link>
			<title>Classified Networks</title>
			<pubDate><![CDATA[Wed, 03 Dec 2025 16:07:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/intelligent-resilience/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/intelligent-resilience/]]></link>
			<title>How to Build Intelligent Resilience Against Cyber Threats in the Age of AI</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 12:10:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/data-centre-network-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/data-centre-network-security/]]></link>
			<title>Data Centre Network Security</title>
			<pubDate><![CDATA[Wed, 26 Nov 2025 16:40:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/healthcare-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/healthcare-cybersecurity/]]></link>
			<title>Healthcare Cybersecurity</title>
			<pubDate><![CDATA[Wed, 03 Sep 2025 13:35:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/iot-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/iot-cybersecurity/]]></link>
			<title>IoT Cybersecurity</title>
			<pubDate><![CDATA[Wed, 03 Sep 2025 13:28:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/government-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/government-cybersecurity/]]></link>
			<title>Government Cybersecurity</title>
			<pubDate><![CDATA[Wed, 03 Sep 2025 09:27:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/]]></link>
			<title>Solutions</title>
			<pubDate><![CDATA[Tue, 29 Jul 2025 10:47:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/removable-media-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/removable-media-security/]]></link>
			<title>Removable Cyber Security</title>
			<pubDate><![CDATA[Tue, 25 Nov 2025 17:10:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/financial-services/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/financial-services/]]></link>
			<title>Financial Services Cybersecurity</title>
			<pubDate><![CDATA[Tue, 23 Sep 2025 08:39:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/aerospace-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/aerospace-cybersecurity/]]></link>
			<title>Aerospace Cybersecurity</title>
			<pubDate><![CDATA[Thu, 04 Dec 2025 17:03:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/blog/industrial-cyber-security-why-it-matters-more-than-ever/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/blog/industrial-cyber-security-why-it-matters-more-than-ever/]]></link>
			<title>Industrial Cyber Security: Why It Matters More Than Ever</title>
			<pubDate><![CDATA[Thu, 04 Dec 2025 16:54:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/enterprise-usb-security/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/solutions-usb-malware-removal/enterprise-usb-security/]]></link>
			<title>Enterprise USB Security</title>
			<pubDate><![CDATA[Mon, 01 Dec 2025 09:26:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/contact/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Tue, 08 Jul 2025 14:27:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/industrial-control-systems/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/industrial-control-systems/]]></link>
			<title>Industrial Control Systems</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 15:54:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/oil-and-gas-cybersecurity/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/oil-and-gas-cybersecurity/]]></link>
			<title>Oil and Gas Cybersecurity</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 15:25:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/applications/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/applications/]]></link>
			<title>Applications</title>
			<pubDate><![CDATA[Tue, 08 Jul 2025 10:48:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/privacy-policy/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 30 Jun 2025 15:49:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/shop/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/shop/]]></link>
			<title>Shop</title>
			<pubDate><![CDATA[Mon, 30 Jun 2025 15:39:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.tyrex-cyber.co.uk/]]></guid>
			<link><![CDATA[https://www.tyrex-cyber.co.uk/]]></link>
			<title>Home Revised</title>
			<pubDate><![CDATA[Fri, 17 Oct 2025 13:29:36 +0000]]></pubDate>
		</item>
				</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Lazy Loading
Minified using Disk

Served from: www.tyrex-cyber.co.uk @ 2026-03-16 12:31:14 by W3 Total Cache
-->