<?xml version="1.0" encoding="UTF-8"?>
<!-- Ta mapa witryny została wygenerowana dynamicznie 2026-04-03 o 20:26 przez wtyczkę All in One SEO v4.8.9 – oryginalną wtyczkę SEO do WordPressa. -->

<?xml-stylesheet type="text/xsl" href="https://axman.pl/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Axman - Nowoczesne Usługi IT</title>
		<link><![CDATA[http://axman.pl]]></link>
		<lastBuildDate><![CDATA[Tue, 16 Dec 2025 06:11:37 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://axman.pl/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://axman.pl/blog/elementor-hf/footer-3/]]></guid>
			<link><![CDATA[https://axman.pl/blog/elementor-hf/footer-3/]]></link>
			<title>footer-3</title>
			<pubDate><![CDATA[Tue, 16 Dec 2025 06:11:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/2025/08/30/skan-podatnosci-dla-msp-jak-czesto-czym-i-co-latac-najpierw/]]></guid>
			<link><![CDATA[https://axman.pl/blog/2025/08/30/skan-podatnosci-dla-msp-jak-czesto-czym-i-co-latac-najpierw/]]></link>
			<title>Skan podatności dla MŚP: jak często, czym skanować i co łatać najpierw?</title>
			<pubDate><![CDATA[Sun, 31 Aug 2025 18:44:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/2025/08/30/jak-uniknac-8-najczestszych-wpadek-it-z-rodo/]]></guid>
			<link><![CDATA[https://axman.pl/blog/2025/08/30/jak-uniknac-8-najczestszych-wpadek-it-z-rodo/]]></link>
			<title>RODO w praktyce IT &#8211; Jak uniknąć 8 najczęstszych wpadek IT z RODO i zgodnością</title>
			<pubDate><![CDATA[Sun, 31 Aug 2025 13:48:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/2024/08/12/assess-and-mitigate-risks-your-it-environment/]]></guid>
			<link><![CDATA[https://axman.pl/blog/2024/08/12/assess-and-mitigate-risks-your-it-environment/]]></link>
			<title>EDR vs &#8220;zwykły antywirus &#8211; czym to się naprawdę różni i kiedy ma znaczenie?</title>
			<pubDate><![CDATA[Sun, 31 Aug 2025 12:07:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/2024/08/06/spf-dkim-dmarc-jak-przestac-byc-latwym-celem-spoofingu/]]></guid>
			<link><![CDATA[https://axman.pl/blog/2024/08/06/spf-dkim-dmarc-jak-przestac-byc-latwym-celem-spoofingu/]]></link>
			<title>SPF, DKIM, DMARC w jedno popołudnie &#8211; jak przestać być łatwym celem spoofingu</title>
			<pubDate><![CDATA[Sun, 31 Aug 2025 12:04:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/2025/08/30/zdalny-dostep-dla-10‑osobowej-firmy-klasyczny-vpn-czy-zero-trust-access/]]></guid>
			<link><![CDATA[https://axman.pl/blog/2025/08/30/zdalny-dostep-dla-10‑osobowej-firmy-klasyczny-vpn-czy-zero-trust-access/]]></link>
			<title>Zdalny dostęp dla małych firm: klasyczny VPN czy Zero Trust Access?</title>
			<pubDate><![CDATA[Sat, 30 Aug 2025 20:21:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/bezpieczny-blog/]]></guid>
			<link><![CDATA[https://axman.pl/bezpieczny-blog/]]></link>
			<title>Bezpieczny blog</title>
			<pubDate><![CDATA[Mon, 01 Sep 2025 05:29:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/polityka-prywatnosci/]]></guid>
			<link><![CDATA[https://axman.pl/polityka-prywatnosci/]]></link>
			<title>Polityka prywatności</title>
			<pubDate><![CDATA[Fri, 08 Aug 2025 15:04:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/wirtualny-doradca-ds-cyberbezpieczenstwa/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/wirtualny-doradca-ds-cyberbezpieczenstwa/]]></link>
			<title>Wirtualny Doradca ds. Cyberbezpieczeństwa</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:29:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/wdrozenia-narzedzi-cybersecurity/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/wdrozenia-narzedzi-cybersecurity/]]></link>
			<title>Wdrożenia narzędzi Cybersecurity</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:17:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-6/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-6/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:44:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/usluga-szablon/]]></guid>
			<link><![CDATA[https://axman.pl/usluga-szablon/]]></link>
			<title>Usługa &#8211; szablon</title>
			<pubDate><![CDATA[Wed, 09 Apr 2025 11:37:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/szkolenia-dla-zespolow/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/szkolenia-dla-zespolow/]]></link>
			<title>Szkolenia dla zespołów</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:15:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/monitoring-systemow-oraz-zdarzen/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/monitoring-systemow-oraz-zdarzen/]]></link>
			<title>Monitoring systemów oraz zdarzeń</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/hardening-systemow-informatycznych/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/hardening-systemow-informatycznych/]]></link>
			<title>Hardening systemów Informatycznych</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:14:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/cyber-ochrona/]]></guid>
			<link><![CDATA[https://axman.pl/cyber-ochrona/]]></link>
			<title>CyberOchrona</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 14:10:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/]]></link>
			<title>Usługi</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 09:33:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/nasza-misja/]]></guid>
			<link><![CDATA[https://axman.pl/nasza-misja/]]></link>
			<title>Nasza misja</title>
			<pubDate><![CDATA[Sun, 16 Mar 2025 17:18:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/uslugi-cybersecurity/audyty-i-analizy-bezpieczenstwa/]]></guid>
			<link><![CDATA[https://axman.pl/uslugi-cybersecurity/audyty-i-analizy-bezpieczenstwa/]]></link>
			<title>Audyty i analizy bezpieczeństwa</title>
			<pubDate><![CDATA[Sun, 08 Jun 2025 20:05:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/zamow-konsultacje/]]></guid>
			<link><![CDATA[https://axman.pl/zamow-konsultacje/]]></link>
			<title>Konsultacje</title>
			<pubDate><![CDATA[Mon, 09 Jun 2025 05:33:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/kontakt/]]></guid>
			<link><![CDATA[https://axman.pl/kontakt/]]></link>
			<title>Kontakt</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 12:22:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-5/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-5/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:43:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-4/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-4/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:42:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-3/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-3/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:41:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design-2/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:39:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/business-card-design/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Wed, 22 Jan 2025 04:36:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/threat-detected-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/threat-detected-2/]]></link>
			<title>Threat Detected</title>
			<pubDate><![CDATA[Wed, 01 Jan 2025 01:40:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/vision-gurard-system-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/vision-gurard-system-2/]]></link>
			<title>Vision Gurard System</title>
			<pubDate><![CDATA[Wed, 01 Jan 2025 01:39:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/business-card-design-3/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/business-card-design-3/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Sun, 12 Jan 2025 10:19:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/business-card-design-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/business-card-design-2/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Sun, 12 Jan 2025 10:18:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/business-card-design/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/business-card-design/]]></link>
			<title>Business Card Design</title>
			<pubDate><![CDATA[Sun, 12 Jan 2025 10:17:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/vision-gurard-system/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/vision-gurard-system/]]></link>
			<title>Vision Gurard System</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 15:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/threat-detected/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/threat-detected/]]></link>
			<title>Threat Detected</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 15:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/web-application-firewall-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/web-application-firewall-2/]]></link>
			<title>Web Application Firewall</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:41:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/high-efficiency-robotics-automotion/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/high-efficiency-robotics-automotion/]]></link>
			<title>High Efficiency Robotics Automotion</title>
			<pubDate><![CDATA[Thu, 21 Nov 2024 08:51:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization-2/]]></link>
			<title>Successful Digital Content Before Transformation</title>
			<pubDate><![CDATA[Sun, 01 Dec 2024 09:39:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/anti-malware-software/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/anti-malware-software/]]></link>
			<title>Anti-Malware Software</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:41:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/password-strength-analyzer/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/password-strength-analyzer/]]></link>
			<title>Password Strength Analyzer</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization-2-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization-2-2/]]></link>
			<title>Trekking Through the Cyber Of security Domain</title>
			<pubDate><![CDATA[Sun, 01 Dec 2024 09:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/vulnerability-scanner/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/vulnerability-scanner/]]></link>
			<title>Vulnerability Scanner</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:39:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/database-security-2/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/database-security-2/]]></link>
			<title>Database Security</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:37:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/web-application-firewall/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/web-application-firewall/]]></link>
			<title>Web Application Firewall</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/database-security/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/database-security/]]></link>
			<title>Database Security</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:14:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/phishing-detection-system/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/phishing-detection-system/]]></link>
			<title>Phishing Detection System</title>
			<pubDate><![CDATA[Mon, 30 Dec 2024 09:11:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/]]></guid>
			<link><![CDATA[https://axman.pl/]]></link>
			<title>Axman.pl</title>
			<pubDate><![CDATA[Mon, 15 Dec 2025 19:17:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/machine-learning-chronicles/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/machine-learning-chronicles/]]></link>
			<title>Machine Learning Chronicles</title>
			<pubDate><![CDATA[Thu, 21 Nov 2024 08:49:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/smarter-systems-better-solutions/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/smarter-systems-better-solutions/]]></link>
			<title>Smarter Systems, Better Solutions</title>
			<pubDate><![CDATA[Thu, 21 Nov 2024 08:48:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_portfolios/future-driven-by-algorithms/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_portfolios/future-driven-by-algorithms/]]></link>
			<title>Future-Driven by Algorithms</title>
			<pubDate><![CDATA[Thu, 21 Nov 2024 08:47:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization/]]></guid>
			<link><![CDATA[https://axman.pl/blog/em_case_study/the-complete-guide-technical-on-page-optimization/]]></link>
			<title>The Complete Guide Technical  On-Page Optimization</title>
			<pubDate><![CDATA[Thu, 14 Nov 2024 10:12:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://axman.pl/?page_id=5371]]></guid>
			<link><![CDATA[https://axman.pl/?page_id=5371]]></link>
			<title>Blog List</title>
			<pubDate><![CDATA[Thu, 13 Mar 2025 13:37:11 +0000]]></pubDate>
		</item>
				</channel>
</rss>
