<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    <url>
        <loc>https://blog.thiagov.com</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>daily</changefreq>
        <priority>1.0</priority>
        
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/crypto-forensics</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/cyber-forensics</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/digital-forensics-porto</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/digital-forensics-portugal</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/threat-intelligence-basics-guide-midsize-it-managers</loc>
        <lastmod>2026-04-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/midsize-it-threat-intelligence-bridge-12.webp</image:loc>
            <image:title>Threat intelligence basics: Guide for midsize IT managers</image:title>
            <image:caption>Learn how midsize IT managers can apply strategic, operational, and technical threat intelligence to prevent cyberattacks effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/whatsapp-evidence-court-mistakes-brazil</loc>
        <lastmod>2026-04-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/brazilian-courtroom-whatsapp-forensics-693.webp</image:loc>
            <image:title>WhatsApp Evidence in Court: 7 Critical Mistakes to Avoid in Brazil</image:title>
            <image:caption>Learn how improper WhatsApp evidence handling in Brazil courts risks chain of custody breaks and weakens digital forensic proof.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/chain-of-custody-digital-forensics</loc>
        <lastmod>2026-04-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-evidence-chain-lab-room-967.webp</image:loc>
            <image:title>Chain of Custody in Digital Forensics: Steps and Best Practices
</image:title>
            <image:caption>Learn how to maintain evidence integrity in digital forensics through proper chain of custody steps and legal best practices.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/forensics-as-a-service-benefits-legal-hurdles</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-forensics-remote-court-balance-926.webp</image:loc>
            <image:title>Forensics as a Service: Key Benefits and Legal Hurdles Explained</image:title>
            <image:caption>Discover how Forensics as a Service speeds incident response and the legal challenges of proving evidence integrity remotely.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/digital-forensics-porto-key-practices-cybersecurity</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/porto-digital-forensics-skyline-672.webp</image:loc>
            <image:title>Digital Forensics in Porto: Key Practices for Cybersecurity
</image:title>
            <image:caption>Discover key digital forensics procedures in Porto to protect data, respond to incidents, and strengthen cybersecurity defenses.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/cybersecurity-keynote-speaker-strategies-digital-defense</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/cybersecurity-keynote-stage-hologram-802.webp</image:loc>
            <image:title>Cybersecurity Keynote Speaker: Engaging Strategies for Digital Defense
</image:title>
            <image:caption>Discover effective cybersecurity strategies and real-world tactics from a keynote speaker to protect your digital assets.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/everyday-habits-expose-business-hackers</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/careless-office-habits-cyber-risk-629.webp</image:loc>
            <image:title>10 everyday habits that expose your business to hackers</image:title>
            <image:caption>Discover common security mistakes in daily routines that leave your business vulnerable to cyberattacks and data breaches.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/incident-response-plans-seven-steps-for-immediate-action</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/cyber-incident-war-room-dashboard-981.webp</image:loc>
            <image:title>Incident response plans: Seven steps for immediate action</image:title>
            <image:caption>Learn the seven critical steps to build and execute effective incident response plans for immediate cyber threat mitigation.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/port-of-vigo-ransomware-attack-lessons</loc>
        <lastmod>2026-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/port-of-vigo-cyber-attack-night-537.webp</image:loc>
            <image:title>How the Port of Vigo Countered a Ransomware Attack: Key Lessons</image:title>
            <image:caption>Port of Vigo stopped a ransomware attack by isolating servers fast, ensuring manual cargo operations while cleaning systems securely.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/deepfake-forensics-how-to-unmask-fraudulent-videos</loc>
        <lastmod>2026-04-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/deepfake-frequency-forensics-dashboard-621.webp</image:loc>
            <image:title>Deepfake Forensics: How to Unmask Fraudulent Videos with Frequency Analysis and Metadata</image:title>
            <image:caption></image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/cloud-storage-security-mistakes-2026</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/cloud-storage-security-briefing-397.webp</image:loc>
            <image:title>Cloud storage security: Common mistakes to avoid in 2026</image:title>
            <image:caption>Discover the top cloud storage security mistakes in 2026 and learn how to protect your data from breaches and unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/what-companies-miss-in-cybersecurity-training</loc>
        <lastmod>2026-04-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/cybersecurity-training-labyrinth-27.webp</image:loc>
            <image:title>What companies miss when training staff on cybersecurity</image:title>
            <image:caption>Discover key gaps in staff cybersecurity training and how to improve threat detection and incident response skills.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/browser-extensions-data-risk</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/browser-extensions-data-leak-923.webp</image:loc>
            <image:title>Are browser extensions putting your data at risk?</image:title>
            <image:caption>Discover how browser extensions can expose your data to breaches and learn ways to secure your digital footprint effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/eight-iot-security-flaws-no-one-talks-about</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/iot-hidden-vulnerabilities-apartment-454.webp</image:loc>
            <image:title>Eight security flaws in IoT devices nobody talks about</image:title>
            <image:caption>Discover hidden vulnerabilities in IoT devices that expose networks to attacks and jeopardize data integrity and privacy risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/mobile-device-forensics-phone-data-leaks</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/smartphone-data-leak-radiograph-city-490.webp</image:loc>
            <image:title>Mobile device forensics: How phones leak critical data</image:title>
            <image:caption>Discover how mobile forensics uncovers phone data leaks, exposing vulnerabilities in digital security and privacy controls.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/deepfake-detection-skills-every-professional-should-learn</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/deepfake-detection-concept-art-552.webp</image:loc>
            <image:title>Deepfake detection: Skills every professional should learn</image:title>
            <image:caption>Learn how to identify deepfake videos using forensic techniques and AI tools to protect your digital environment effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/credential-stuffing-attacks-guide</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/credential-stuffing-logins-501.webp</image:loc>
            <image:title>Credential stuffing attacks: Everything you need to know</image:title>
            <image:caption>Learn how credential stuffing attacks work, detect risks, and implement strategies to protect digital accounts and data safety.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/crypto-forensics-trace-illicit-crypto-transactions</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/crypto-forensics-blockchain-map-539.webp</image:loc>
            <image:title>Crypto forensics: 7 ways to trace illicit crypto transactions</image:title>
            <image:caption>Discover 7 practical techniques in crypto forensics to track and analyze illicit cryptocurrency transactions effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/forensic-source-code-analysis-legal-risks-investigation-steps</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/forensic-source-code-archive-room-667.webp</image:loc>
            <image:title>Forensic Source Code Analysis: Legal Risks and Investigation Steps
</image:title>
            <image:caption>Learn the key steps and risks of forensic source code analysis in IP disputes, cybercrime, and legal investigations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/blockchain-forensics-tracing-crypto-laundering-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/blockchain-forensics-courtroom-diagram-131.webp</image:loc>
            <image:title>Blockchain forensics: Tracing crypto laundering in 2026</image:title>
            <image:caption>Explore how blockchain forensics uses temporal correlation, value propagation, and co-occurrence mapping to trace $1M USDT laundering.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/source-code-forensics-guide-legal-security-analysis</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/source-code-forensics-lab-scales-615.webp</image:loc>
            <image:title>Source Code Forensics: Guide to Legal and Security Analysis
</image:title>
            <image:caption>Explore techniques in source code forensics for detecting malicious code, proving authorship, and supporting legal disputes effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/crypto-forensic-investigation-firm-hire-blockchain-forensics-expert-chainalysis-certified-investigator-services</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/crypto-forensics-expert-roundtable-433.webp</image:loc>
            <image:title>How to Hire a Crypto Forensic Expert for Blockchain Investigations</image:title>
            <image:caption>Learn how to hire a blockchain forensics expert with Chainalysis certified services for crypto investigations and asset tracing.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/digital-forensics-investigating-cyber-incidents</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/nighttime-digital-forensics-lab-357.webp</image:loc>
            <image:title>Digital Forensics: Keys to Investigating Cyber Incidents
</image:title>
            <image:caption>Learn the stages of digital forensics—identification, collection, analysis, and reporting—to support cybercrime investigations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/security-vibe-coding-guardrails-safe-ai-generated-code</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/secure-ai-coding-at-night-939.webp</image:loc>
            <image:title>Security Vibe-Coding: Guardrails for Safe AI-Generated Code
</image:title>
            <image:caption>Learn how to secure AI-generated code with guardrails, review automation, and best practices for citizen developers.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/23-items-safety-checklist-vibe-coded-systems</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/vibe-system-safety-checklist-desk-73.webp</image:loc>
            <image:title>23 items safety checklist for vibe-coded systems </image:title>
            <image:caption>Ensure your vibe-coded systems resist breaches with this 23-step checklist covering encryption, access control, and threat detection methods.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/security-practices-safe-ai-deployment-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/ai-security-deployment-control-room-379.webp</image:loc>
            <image:title>Five security practices for safe AI product deployment in 2026</image:title>
            <image:caption>Discover five key security measures to protect AI products from cyber threats and ensure safe deployment in 2026.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/identifying-phishing-emails-work-guide</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/office-email-phishing-alert-950.webp</image:loc>
            <image:title>How to identify phishing emails at work: a practical guide</image:title>
            <image:caption>Learn to spot phishing in work emails with clear signs, tactics, and steps to protect sensitive data and prevent cyber attacks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/digital-forensics-internal-investigations</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-forensics-internal-investigation-room-132.webp</image:loc>
            <image:title>The importance of digital forensics in internal investigations</image:title>
            <image:caption>Discover how digital forensics aids internal investigations by identifying cyber threats, preserving evidence, and ensuring data integrity.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/best-digital-forensics-speaker-brazil-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-forensics-keynote-brazil-stage-584.webp</image:loc>
            <image:title>Digital Forensics Speaker in Brazil: Key Figures for 2026</image:title>
            <image:caption>Discover why Thiago Vieira leads as Brazil’s top digital forensics speaker, with expertise in cybercrime and evidence handling.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/author/thiago-vieira</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.7</priority>
        <image:image>
            <image:loc>https://99588517054034056dc4ed3dd2f332bd.cdn.bubble.io/f1775405467855x734416504527645200/IMG_6211%20copy.JPG</image:loc>
            <image:title>Thiago Vieira</image:title>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/search</loc>
        <lastmod>2026-04-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.5</priority>
    </url>
</urlset>