<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//attackiq.v11.site/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://attackiq.v11.site/glossary/apt29/</loc>
		<lastmod>2025-05-20T22:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/attackiq-academy/</loc>
		<lastmod>2025-05-20T22:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/blue-team/</loc>
		<lastmod>2025-05-20T22:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/breach-and-attack-simulation/</loc>
		<lastmod>2025-05-20T22:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/bug-bounty/</loc>
		<lastmod>2025-05-20T22:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/c-i-a-model-confidentiality-integrity-availability/</loc>
		<lastmod>2025-05-20T22:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/cio/</loc>
		<lastmod>2025-05-20T22:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/cisa/</loc>
		<lastmod>2025-05-20T22:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/ciso/</loc>
		<lastmod>2025-05-20T22:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/colonial-pipeline-ransomware-attack/</loc>
		<lastmod>2025-05-20T22:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/compliance/</loc>
		<lastmod>2025-05-20T22:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/detection/</loc>
		<lastmod>2025-05-20T22:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/cyberspace/</loc>
		<lastmod>2025-05-20T22:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/cyberspace-operations/</loc>
		<lastmod>2025-05-20T22:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/critical-infrastructure/</loc>
		<lastmod>2025-05-20T22:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/detection-engineering/</loc>
		<lastmod>2025-05-20T22:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/federal-bureau-of-investigation-cyber-division/</loc>
		<lastmod>2025-05-20T22:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/general-data-protection-regulation/</loc>
		<lastmod>2025-05-20T22:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/grc-governance-risk-and-compliance/</loc>
		<lastmod>2025-05-20T22:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/malware/</loc>
		<lastmod>2025-05-20T22:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/new-york-department-of-financial-services-dfs-cybersecurity-regulation/</loc>
		<lastmod>2025-05-20T22:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/nist-800-53/</loc>
		<lastmod>2025-05-20T22:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/opm-hack/</loc>
		<lastmod>2025-05-20T22:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/osi-model/</loc>
		<lastmod>2025-05-20T22:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/penetration-testing/</loc>
		<lastmod>2025-05-20T22:19:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/prevention/</loc>
		<lastmod>2025-05-20T22:19:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/red-team/</loc>
		<lastmod>2025-05-20T22:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/risk-management/</loc>
		<lastmod>2025-05-20T22:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/seven-layers-of-osi-model/</loc>
		<lastmod>2025-05-20T22:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/solarwinds/</loc>
		<lastmod>2025-05-20T22:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/tcp-ip/</loc>
		<lastmod>2025-05-20T22:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/u-s-national-cyber-director/</loc>
		<lastmod>2025-05-20T22:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/vulnerability/</loc>
		<lastmod>2025-05-20T22:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/vulnerability-scanning/</loc>
		<lastmod>2025-05-20T22:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/purple-teaming/</loc>
		<lastmod>2025-07-18T20:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/attack-graphs/</loc>
		<lastmod>2025-07-24T22:05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/attackiq-informed-defense-architecture-aida/</loc>
		<lastmod>2025-07-24T22:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/compliance-optimization/</loc>
		<lastmod>2025-07-24T22:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/blueprints/</loc>
		<lastmod>2025-07-24T22:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/automated-security-control-validation/</loc>
		<lastmod>2025-07-24T22:16:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/cloud-security-optimization/</loc>
		<lastmod>2025-07-24T22:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/dod-cmmc/</loc>
		<lastmod>2025-07-24T22:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/mitre-attck/</loc>
		<lastmod>2025-07-24T22:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/mitre-attck-matrix/</loc>
		<lastmod>2025-07-24T22:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/mitre-center-for-threat-informed-defense/</loc>
		<lastmod>2025-07-24T22:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/preactive-security/</loc>
		<lastmod>2025-07-24T22:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/preactive-security-exchange-pse/</loc>
		<lastmod>2025-07-24T22:43:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/purple-team/</loc>
		<lastmod>2025-07-24T22:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/pyramid-of-pain-2/</loc>
		<lastmod>2025-07-24T22:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-pyramid-pain-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/scenarios/</loc>
		<lastmod>2025-07-24T23:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/tactic-technique-procedure-ttps/</loc>
		<lastmod>2025-07-24T23:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/the-attackiq-security-optimization-platform/</loc>
		<lastmod>2025-07-24T23:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/u-s-cyber-command/</loc>
		<lastmod>2025-07-24T23:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/security-control-rationalization/</loc>
		<lastmod>2025-07-24T23:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/security-optimization/</loc>
		<lastmod>2025-07-24T23:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/security-control-quantification/</loc>
		<lastmod>2025-07-24T23:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/what-is-nist/</loc>
		<lastmod>2025-07-24T23:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/security-control-failure/</loc>
		<lastmod>2025-07-24T23:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/ransomware/</loc>
		<lastmod>2025-07-24T23:39:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/threat-informed-defense/</loc>
		<lastmod>2025-07-25T22:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/ctem-vs-vulnerability-management/</loc>
		<lastmod>2025-07-28T22:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/page-header.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/glossary/aev-vs-bas/</loc>
		<lastmod>2025-07-30T16:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/page-header.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->