<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 10:18 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://lucysecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Lucy Security</title>
		<link><![CDATA[https://lucysecurity.com]]></link>
		<description><![CDATA[Lucy Security]]></description>
		<lastBuildDate><![CDATA[Wed, 21 May 2025 08:00:08 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://lucysecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://lucysecurity.com/blog/]]></guid>
			<link><![CDATA[https://lucysecurity.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 21 May 2025 08:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/how-to-measure-phishing-susceptibility-rate/]]></guid>
			<link><![CDATA[https://lucysecurity.com/how-to-measure-phishing-susceptibility-rate/]]></link>
			<title>How to Measure Phishing Susceptibility Rate</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 16:20:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/]]></guid>
			<link><![CDATA[https://lucysecurity.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 09:12:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/gdpr-vs-cloud-act-data-sovereignty-security-awareness/]]></guid>
			<link><![CDATA[https://lucysecurity.com/gdpr-vs-cloud-act-data-sovereignty-security-awareness/]]></link>
			<title>GDPR vs CLOUD Act: Data Sovereignty in Security Awareness</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 10:07:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/lucy-version-5-7/]]></guid>
			<link><![CDATA[https://lucysecurity.com/lucy-version-5-7/]]></link>
			<title>Lucy 5.7 Product Released</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 14:38:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/ai-threats-to-employees-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/ai-threats-to-employees-training/]]></link>
			<title>AI Threats to Employees: New Awareness Training Content</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 13:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/supply-chain-security-for-cisos/]]></guid>
			<link><![CDATA[https://lucysecurity.com/supply-chain-security-for-cisos/]]></link>
			<title>Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 15:48:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/security-awareness-trends-2026/]]></guid>
			<link><![CDATA[https://lucysecurity.com/security-awareness-trends-2026/]]></link>
			<title>Security Awareness Trends 2026: Why Attacks Have Gone Mobile — and What Organisations Must Do</title>
			<pubDate><![CDATA[Thu, 22 Jan 2026 13:38:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/human-risk-management-in-cybersecurity/]]></guid>
			<link><![CDATA[https://lucysecurity.com/human-risk-management-in-cybersecurity/]]></link>
			<title>Human Risk Management in Cybersecurity Explained</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 17:27:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/cybersecurity-challenges-in-centra-and-eastern-europe/]]></guid>
			<link><![CDATA[https://lucysecurity.com/cybersecurity-challenges-in-centra-and-eastern-europe/]]></link>
			<title>Cybersecurity Challenges in Central and Eastern Europe in 2026</title>
			<pubDate><![CDATA[Fri, 30 Jan 2026 16:33:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/china-cybersecurity-law-amendments/]]></guid>
			<link><![CDATA[https://lucysecurity.com/china-cybersecurity-law-amendments/]]></link>
			<title>China Cybersecurity Law 2026: What It Signals for Cyber Risk</title>
			<pubDate><![CDATA[Fri, 02 Jan 2026 15:23:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/webinars/]]></guid>
			<link><![CDATA[https://lucysecurity.com/webinars/]]></link>
			<title>Webinars</title>
			<pubDate><![CDATA[Wed, 12 Nov 2025 15:55:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/phishing-landing-page-cloning/]]></guid>
			<link><![CDATA[https://lucysecurity.com/phishing-landing-page-cloning/]]></link>
			<title>Phishing Landing Page Cloning for Simulated Attacks</title>
			<pubDate><![CDATA[Wed, 12 Nov 2025 09:20:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/privacy-policy/]]></guid>
			<link><![CDATA[https://lucysecurity.com/privacy-policy/]]></link>
			<title>Lucy Privacy Policy</title>
			<pubDate><![CDATA[Tue, 14 Jan 2025 10:06:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/cyber-week/]]></guid>
			<link><![CDATA[https://lucysecurity.com/cyber-week/]]></link>
			<title>Cyber week offers</title>
			<pubDate><![CDATA[Fri, 28 Nov 2025 14:08:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/nis2-awareness-training-compliance/]]></guid>
			<link><![CDATA[https://lucysecurity.com/nis2-awareness-training-compliance/]]></link>
			<title>NIS2 Awareness Training Compliance: How to Prove You’re Ready</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 08:52:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/nis2-security-awareness-requirements/]]></guid>
			<link><![CDATA[https://lucysecurity.com/nis2-security-awareness-requirements/]]></link>
			<title>Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 16:10:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/cyber-threats-in-poland/]]></guid>
			<link><![CDATA[https://lucysecurity.com/cyber-threats-in-poland/]]></link>
			<title>Cyber Threats in Poland – Why Awareness is Key to Defense</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 09:16:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/thank-you-page/]]></guid>
			<link><![CDATA[https://lucysecurity.com/thank-you-page/]]></link>
			<title>Thank you Page</title>
			<pubDate><![CDATA[Tue, 14 Jan 2025 11:47:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/nis2-awareness-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/nis2-awareness-training/]]></link>
			<title>NIS2 Awareness Training in Germany for Cyber Resilience</title>
			<pubDate><![CDATA[Thu, 02 Oct 2025 11:59:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/phishing-risk-scoring/]]></guid>
			<link><![CDATA[https://lucysecurity.com/phishing-risk-scoring/]]></link>
			<title>Phishing Risk Scoring: Smarter Threat Detection with Lucy 5.5</title>
			<pubDate><![CDATA[Mon, 22 Sep 2025 14:55:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/nonprofit-cybersecurity-awareness-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/nonprofit-cybersecurity-awareness-training/]]></link>
			<title>Nonprofit Cybersecurity Awareness Training | Lucy</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 15:56:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/phishing-campaign-management-service/]]></guid>
			<link><![CDATA[https://lucysecurity.com/phishing-campaign-management-service/]]></link>
			<title>Phishing Campaign Management Service That Delivers Real Results</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 15:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/offers/]]></guid>
			<link><![CDATA[https://lucysecurity.com/offers/]]></link>
			<title>Offers</title>
			<pubDate><![CDATA[Fri, 07 Nov 2025 08:57:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/whatsapp-phishing-simulation/]]></guid>
			<link><![CDATA[https://lucysecurity.com/whatsapp-phishing-simulation/]]></link>
			<title>WhatsApp Phishing Simulation: Training for Real-World Smishing Attacks</title>
			<pubDate><![CDATA[Fri, 19 Sep 2025 08:37:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/cyber-attack-solutions/]]></guid>
			<link><![CDATA[https://lucysecurity.com/cyber-attack-solutions/]]></link>
			<title>Solution</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 15:02:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/support/]]></guid>
			<link><![CDATA[https://lucysecurity.com/support/]]></link>
			<title>Support</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 14:34:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/engage-employees/]]></guid>
			<link><![CDATA[https://lucysecurity.com/engage-employees/]]></link>
			<title>Engage Employees</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 14:26:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/phishing-in-healthcare-awareness-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/phishing-in-healthcare-awareness-training/]]></link>
			<title>Phishing in Healthcare: Awareness Training That Works</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:32:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/qr-code-phishing-awareness/]]></guid>
			<link><![CDATA[https://lucysecurity.com/qr-code-phishing-awareness/]]></link>
			<title>QR Code Phishing: The New Scam You Can&#8217;t Afford to Ignore</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:31:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/about-us/]]></guid>
			<link><![CDATA[https://lucysecurity.com/about-us/]]></link>
			<title>About us</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 16:09:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/realistic-phishing-simulations/]]></guid>
			<link><![CDATA[https://lucysecurity.com/realistic-phishing-simulations/]]></link>
			<title>Realistic Phishing Simulations: Turning Real Attacks Into Powerful Learning Moments</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:29:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/security-awareness-training-that-changes-behaviors/]]></guid>
			<link><![CDATA[https://lucysecurity.com/security-awareness-training-that-changes-behaviors/]]></link>
			<title>Security Awareness Training That Changes Behaviors</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:27:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/top5-cybersecurity-threats-2025/]]></guid>
			<link><![CDATA[https://lucysecurity.com/top5-cybersecurity-threats-2025/]]></link>
			<title>Top 5 Human-Factor Cybersecurity Threats of 2025</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:25:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/knowbe4-alternative-lucy-comparison/]]></guid>
			<link><![CDATA[https://lucysecurity.com/knowbe4-alternative-lucy-comparison/]]></link>
			<title>Best KnowBe4 Alternative? See How Lucy Stacks Up</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:21:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/new-employee-phishing-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/new-employee-phishing-training/]]></link>
			<title>Phishing Training for New Employees: How to Build Secure Habits from Day One</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:18:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/distributors/]]></guid>
			<link><![CDATA[https://lucysecurity.com/distributors/]]></link>
			<title>Distributors</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 14:33:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/resources/]]></guid>
			<link><![CDATA[https://lucysecurity.com/resources/]]></link>
			<title>Resources</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 16:06:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/test-employees/]]></guid>
			<link><![CDATA[https://lucysecurity.com/test-employees/]]></link>
			<title>Test Employees</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 15:47:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/contact-us/]]></guid>
			<link><![CDATA[https://lucysecurity.com/contact-us/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 09:27:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/cyber-security-awareness-training/]]></guid>
			<link><![CDATA[https://lucysecurity.com/cyber-security-awareness-training/]]></link>
			<title>Train Employees</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 14:25:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/plans/]]></guid>
			<link><![CDATA[https://lucysecurity.com/plans/]]></link>
			<title>Plans</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 16:04:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/build-a-program/]]></guid>
			<link><![CDATA[https://lucysecurity.com/build-a-program/]]></link>
			<title>Build a Program</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 14:22:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/dach-healthcare-landing-page/]]></guid>
			<link><![CDATA[https://lucysecurity.com/dach-healthcare-landing-page/]]></link>
			<title>DACH Healthcare landing page</title>
			<pubDate><![CDATA[Fri, 16 May 2025 12:25:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/version-5-4-release/]]></guid>
			<link><![CDATA[https://lucysecurity.com/version-5-4-release/]]></link>
			<title>Lucy 5.4 Product features</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:38:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/new-editions/]]></guid>
			<link><![CDATA[https://lucysecurity.com/new-editions/]]></link>
			<title>New Editions</title>
			<pubDate><![CDATA[Tue, 14 Jan 2025 09:58:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/on-premise-vs-cloud-choosing-a-security-platform/]]></guid>
			<link><![CDATA[https://lucysecurity.com/on-premise-vs-cloud-choosing-a-security-platform/]]></link>
			<title>On-Premise vs Cloud: Choosing a Security Platform</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:36:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/lp-awareness/]]></guid>
			<link><![CDATA[https://lucysecurity.com/lp-awareness/]]></link>
			<title>LP &#8211; Awareness</title>
			<pubDate><![CDATA[Tue, 14 Jan 2025 09:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/distributor/datastore/]]></guid>
			<link><![CDATA[https://lucysecurity.com/distributor/datastore/]]></link>
			<title>DataStore</title>
			<pubDate><![CDATA[Mon, 03 Oct 2022 12:40:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lucysecurity.com/phishing-simulation-benefits-why-practice-beats-theory/]]></guid>
			<link><![CDATA[https://lucysecurity.com/phishing-simulation-benefits-why-practice-beats-theory/]]></link>
			<title>Phishing Simulation Benefits: Why Practice Beats Theory</title>
			<pubDate><![CDATA[Fri, 15 Aug 2025 14:35:48 +0000]]></pubDate>
		</item>
				</channel>
</rss>
