<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//attackiq.v11.site/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-appoints-of-carl-wright-as-chief-revenue-officer/</loc>
		<lastmod>2017-08-17T23:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/carl-wright-joins-attackiq/</loc>
		<lastmod>2017-08-17T23:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-3-billion-yahoo-accounts-hacked-in-2013-data-breach-says-verizon/</loc>
		<lastmod>2017-10-04T23:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-3-billion-yahoo-users-were-hacked-in-2013-data-breach/</loc>
		<lastmod>2017-10-04T23:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-2013-yahoo-breach-affected-all-3-billion-of-its-users/</loc>
		<lastmod>2017-10-04T23:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/yahoo-says-all-3-billion-accounts-compromised-in-breach/</loc>
		<lastmod>2017-10-04T23:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/yahoo-breach-hit-3-billion-records/</loc>
		<lastmod>2017-10-05T23:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/yahoo-data-breach-found-to-affect-all-3-billion-users/</loc>
		<lastmod>2017-10-05T23:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitek-top-10-sparkling-startups-in-san-diego-2/</loc>
		<lastmod>2017-10-25T23:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-infosec-products-of-the-week-october-27-2017/</loc>
		<lastmod>2017-10-27T23:38:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-enhances-cybersecurity-attack-simulation-platform/</loc>
		<lastmod>2017-10-30T23:36:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-report-median-price-for-diy-ransomware-kit-is-10-50/</loc>
		<lastmod>2017-10-31T23:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-form-of-ransomware-used-to-hide-previous-hacking-campaign/</loc>
		<lastmod>2017-11-01T23:31:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-form-of-ransomware-used-to-hide-previous-hacking-campaign-2/</loc>
		<lastmod>2017-11-01T23:33:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/oni-ransomware/</loc>
		<lastmod>2017-11-01T23:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-devil-targets-japan-with-bad-rabbit-like-wiper-ransomware/</loc>
		<lastmod>2017-11-01T23:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-new-member-of-the-ransomware-family-black-rabbit-strikes-japan/</loc>
		<lastmod>2017-11-04T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/oni-attacks-how-should-mssps-handle-wipers-ransomware-or-both/</loc>
		<lastmod>2017-11-07T00:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uber-supposedly-paid-hackers-100000-to-keep-quiet-about-a-2016-data-breach-2/</loc>
		<lastmod>2017-11-21T00:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uber-fires-chief-security-officer-over-cover-up-of-hack-involving-57m-customer-records/</loc>
		<lastmod>2017-11-22T00:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uber-supposedly-paid-hackers-100000-to-keep-quiet-about-a-2016-data-breach/</loc>
		<lastmod>2017-11-22T00:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-executives-respond-to-uber-breach-news/</loc>
		<lastmod>2017-11-23T00:19:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/executive-insights-on-the-uber-hack/</loc>
		<lastmod>2017-11-28T00:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/top-secret-spy-data-exposed-on-misconfigured-amazon-cloud-instance/</loc>
		<lastmod>2017-11-29T00:13:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cloud-security-fail-classified-u-s-military-data-exposed-in-amazon-s3-bucket/</loc>
		<lastmod>2017-11-30T00:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-central-car-astrophe-wrecks-uber/</loc>
		<lastmod>2017-11-30T00:10:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uber-hack/</loc>
		<lastmod>2017-11-30T00:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/nsa-data-leak-exposed-army-inscom-project-information/</loc>
		<lastmod>2017-12-01T00:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/11-tips-to-prevent-customer-data-breaches/</loc>
		<lastmod>2017-12-09T00:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/newly-discovered-russian-hacking-group-steals-10m-from-banks/</loc>
		<lastmod>2017-12-12T00:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/report-moneytaker-hackers-stole-10-million-from-u-s-russia-banks-using-stealthy-malware/</loc>
		<lastmod>2017-12-12T23:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/russian-bank-hack/</loc>
		<lastmod>2017-12-12T23:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/millions-of-california-voter-records-exposed-in-unprotected-mongodb/</loc>
		<lastmod>2017-12-15T23:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/federal-data-breach-highlights-the-importance-of-cloud-security/</loc>
		<lastmod>2017-12-19T23:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/whew-did-all-that-just-happen/</loc>
		<lastmod>2017-12-22T23:52:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/heres-what-enterprises-should-do-to-prepare-for-meltdown-and-spectre-attacks/</loc>
		<lastmod>2018-01-04T23:50:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/spectre-meltdown-hit-on-prem-windows-servers-hardest/</loc>
		<lastmod>2018-01-23T23:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/fedex-exposes-confidential-customer-data-via-misconfigured-aws-storage-2/</loc>
		<lastmod>2018-02-15T23:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/fedex-exposes-confidential-customer-data-via-misconfigured-aws-storage/</loc>
		<lastmod>2018-02-16T23:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/l-a-times-website-injected-with-cryptocurrency-mining-script/</loc>
		<lastmod>2018-02-26T23:41:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/la-times-hit-with-crypto-mining-software/</loc>
		<lastmod>2018-02-26T23:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/equifax-breach-findings-show-why-we-need-gdpr/</loc>
		<lastmod>2018-02-27T23:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/interview-with-stephan-chenette-ceo-and-co-founder-at-attackiq/</loc>
		<lastmod>2018-02-28T23:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-and-navilogic-partner-to-bring-continuous-validation-and-attack-simulation-to-customers/</loc>
		<lastmod>2018-03-07T23:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-08-march-2018/</loc>
		<lastmod>2018-03-09T23:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitek-top-10-sparkling-startups-in-san-diego/</loc>
		<lastmod>2018-03-09T23:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/expedia-owned-orbitz-hacked-and-880000-customer-records-likely-stolen/</loc>
		<lastmod>2018-03-20T22:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-steal-banking-personal-data-of-800000-orbitz-customers/</loc>
		<lastmod>2018-03-20T22:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/st-louis-hospital-operator-the-latest-to-expose-data-via-misconfigured-cloud-storage/</loc>
		<lastmod>2018-03-20T22:32:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-is-mitres-attck-framework-what-red-teams-need-to-know/</loc>
		<lastmod>2018-04-03T22:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gartner-security-summit-enterprises-vendors-respond-to-cybercriminals/</loc>
		<lastmod>2018-04-12T22:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-adds-cyber-hunt-exercise-module-to-firedrill-platform-built-on-the-mitre-attck-matrix/</loc>
		<lastmod>2018-06-06T22:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/rethinking-security/</loc>
		<lastmod>2018-06-08T22:23:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/marketing-firm-exposes-340m-records-via-misconfigured-cloud-storage/</loc>
		<lastmod>2018-06-27T22:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/exactis-breach-exposes-340m-records-may-compel-gdpr-like-reg-in-u-s/</loc>
		<lastmod>2018-06-28T22:17:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/exactis-breach-exposes-340m-records-may-compel-gdpr-like-reg-in-u-s-2/</loc>
		<lastmod>2018-06-28T22:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-is-exactis-and-how-could-it-have-the-data-of-nearly-every-american/</loc>
		<lastmod>2018-06-28T22:21:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/https-www-scmagazineuk-com-exactis-breach-exposes-340m-records-may-compel-gdpr-like-regulation-in-us-article-777186/</loc>
		<lastmod>2018-06-29T22:12:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-is-exactis-and-how-could-it-have-leaked-the-data-of-nearly-every-american/</loc>
		<lastmod>2018-06-29T22:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/breach-and-attack-simulation-find-vulnerabilities-before-the-bad-guys-do/</loc>
		<lastmod>2018-08-08T22:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-startup-attackiq-raises-5-5m-in-salesforce-ventures-led-deal/</loc>
		<lastmod>2018-08-14T22:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-closes-5-5m-financing-round/</loc>
		<lastmod>2018-08-19T22:06:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-will-californias-consumer-privacy-law-impact-the-data-privacy-landscape/</loc>
		<lastmod>2018-08-20T22:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/popular-government-payment-solution-exposes-14m-records/</loc>
		<lastmod>2018-09-18T22:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/10-san-diego-startups-to-compete-at-regions-top-pitch-competition/</loc>
		<lastmod>2018-10-02T00:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-firedrill/</loc>
		<lastmod>2018-10-02T00:01:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/dan-sibille-joins-attackiq-as-vice-president-of-global-alliances-and-channels/</loc>
		<lastmod>2018-10-02T12:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-03-october-2018/</loc>
		<lastmod>2018-10-03T23:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/entrepreneur-gordon-preps-cloud-range-cyber-nashville-cyber-range/</loc>
		<lastmod>2018-10-04T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-promotes-brandt-mackey-to-vice-president-of-field-engineering/</loc>
		<lastmod>2018-10-16T12:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/carl-wright-ceo-of-attackiq-speaking-at-inaugural-mitre-attckcon-event/</loc>
		<lastmod>2018-10-18T12:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-names-brett-d-galloway-as-ceo/</loc>
		<lastmod>2018-11-20T12:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-startup-attackiq-hires-new-bay-area-based-ceo/</loc>
		<lastmod>2018-11-21T00:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/amazon-website-glitch-exposes-customer-data/</loc>
		<lastmod>2018-11-22T00:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-business-report-nov-21-2018/</loc>
		<lastmod>2018-11-22T00:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-daily-briefing/</loc>
		<lastmod>2018-11-22T00:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/amazon-stays-quiet-on-cybersecurity-breach/</loc>
		<lastmod>2018-11-27T00:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-26-november-2018/</loc>
		<lastmod>2018-11-27T00:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/industry-leaders-reaction-on-marriott-data-breach-exposing-500m-customers/</loc>
		<lastmod>2018-12-04T00:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/100-million-quora-customers-hit-by-data-breach/</loc>
		<lastmod>2018-12-06T00:37:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/industry-leaders-reaction-on-quora-breach/</loc>
		<lastmod>2018-12-06T00:39:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/magecart-delivers-malware-to-1-800-flowers/</loc>
		<lastmod>2018-12-06T00:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-experts-weigh-in-the-major-digital-threats-of-2019/</loc>
		<lastmod>2018-12-07T00:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/second-google-bug-hastens-shutdown/</loc>
		<lastmod>2018-12-11T00:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/fresh-google-bug-exposed-52-2-million-users-data/</loc>
		<lastmod>2018-12-12T00:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/second-google-breach-sees-data-of-52-5-million-users-exposed/</loc>
		<lastmod>2018-12-12T00:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/second-google-data-exposure-leads-to-earlier-service-shutdown/</loc>
		<lastmod>2018-12-12T00:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/11-top-breach-and-attack-simulation-bas-vendors/</loc>
		<lastmod>2018-12-14T00:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-bas-product-overview-and-insight/</loc>
		<lastmod>2018-12-14T00:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/report-boomoji-app-developer-leaves-customer-data-exposed-on-open-database/</loc>
		<lastmod>2018-12-15T00:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/data-sheet-are-the-first-customers-of-5g-the-winners-or-losers/</loc>
		<lastmod>2018-12-19T00:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-experts-weigh-in-the-recent-nasa-data-breach/</loc>
		<lastmod>2018-12-20T00:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/nasa-reveals-employee-data-stolen-in-october-hack/</loc>
		<lastmod>2018-12-20T00:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/houston-we-have-a-problem-nasa-suffers-data-breach/</loc>
		<lastmod>2018-12-21T00:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/justice-department-indicts-two-chinese-nationals-over-global-hacking-campaign/</loc>
		<lastmod>2018-12-21T00:15:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/nasa-confirmed-data-breach-after-an-internal-server-was-hacked/</loc>
		<lastmod>2018-12-21T00:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/nasa-data-breach-included-employee-social-security-numbers/</loc>
		<lastmod>2018-12-21T00:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/chinese-hackers-behind-global-hacking-campaign/</loc>
		<lastmod>2018-12-22T00:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/credit-unions-should-worry-about-another-nasa-breach/</loc>
		<lastmod>2018-12-22T00:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/industry-reactions-to-u-s-charging-apt10-hackers-feedback-friday/</loc>
		<lastmod>2018-12-22T00:08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/doj-indicts-two-chinese-nationals-for-apt10-group-cyberattacks/</loc>
		<lastmod>2018-12-22T00:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/amazon-blames-technical-issue-for-exposing-customer-names-and-email-addresses/</loc>
		<lastmod>2018-12-22T00:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-names-new-ceo/</loc>
		<lastmod>2018-12-23T00:50:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/prepare-for-the-new-royal-wedding-of-it-ai-and-cyber-security/</loc>
		<lastmod>2018-12-25T00:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/a-look-into-2019-cyber-threat-trends/</loc>
		<lastmod>2018-12-26T23:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/top-10-trends-in-cybersecurity-2019-user-experience-and-machine-learning/</loc>
		<lastmod>2019-01-03T23:55:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/marriotts-data-breach-hits-fewer-records-than-predicted-but-brand-is-bruised/</loc>
		<lastmod>2019-01-07T23:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/best-security-software-2019-lab-tested-reviews-of-todays-top-tools/</loc>
		<lastmod>2019-01-08T23:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/review-attackiq-firedrill-watches-the-watchers/</loc>
		<lastmod>2019-01-08T23:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/three-top-trends-that-will-impact-cyber-security-strategies-in-2019/</loc>
		<lastmod>2019-01-08T23:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-2019-predictions-data-privacy-regulations-convergence-of-threat-and-risk-teams-and-cloud-misconfigurations/</loc>
		<lastmod>2019-01-15T23:47:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-database-exposes-millions-of-texts-call-logs/</loc>
		<lastmod>2019-01-16T23:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-data-leak-unprotected-server-left-calls-logs-sms-exposed/</loc>
		<lastmod>2019-01-17T23:37:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-database-exposed-millions-of-call-logs-and-personal-data/</loc>
		<lastmod>2019-01-17T23:37:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-database-exposes-millions-of-call-logs-and-text-messages-online/</loc>
		<lastmod>2019-01-17T23:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-left-7-million-logs-unencrytped-with-no-passwords/</loc>
		<lastmod>2019-01-17T23:39:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/collection-1-breach-data-includes-773-million-unique-emails/</loc>
		<lastmod>2019-01-18T23:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-mega-breach-lottery-jackpot-773-million-records/</loc>
		<lastmod>2019-01-18T23:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/voipo-misconfiguration/</loc>
		<lastmod>2019-01-18T23:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/108m-online-casino-customer-records-exposed-in-latest-case-of-misconfigured-database/</loc>
		<lastmod>2019-01-21T23:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/108m-records-exposed-via-misconfigured-elasticsearch-server/</loc>
		<lastmod>2019-01-22T23:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-taps-vinod-peris-as-vice-president-of-engineering/</loc>
		<lastmod>2019-01-23T12:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/christopher-kennedy-joins-attackiq-as-ciso-vp-customer-success/</loc>
		<lastmod>2019-01-24T12:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-startup-attackiq-hires-two-executives/</loc>
		<lastmod>2019-01-24T23:23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-business-report-jan-25-2019/</loc>
		<lastmod>2019-01-25T23:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/northrop-vet-christopher-kennedy-named-attackiq-ciso/</loc>
		<lastmod>2019-01-25T23:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-taps-vinod-peris-as-vice-president-of-engineering-2/</loc>
		<lastmod>2019-01-28T23:16:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/christopher-kennedy-joins-attackiq-as-ciso-and-vice-president-of-customer-success/</loc>
		<lastmod>2019-01-28T23:17:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cyber-security-startup-attackiq-launches-partner-program-with-guaranteed-margins/</loc>
		<lastmod>2019-01-28T23:18:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-announces-global-accelerate-channel-program-2/</loc>
		<lastmod>2019-01-29T23:13:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-debuts-new-accelerate-channel-program/</loc>
		<lastmod>2019-01-29T23:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-7/</loc>
		<lastmod>2019-01-30T23:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-service-provier-mssp-news-30-january-2019/</loc>
		<lastmod>2019-01-30T23:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-reaction-on-state-bank-of-india-exposes-millions-of-customers-data-more-leaks-trading-on-the-dark-web/</loc>
		<lastmod>2019-01-31T23:06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/leading-bas-vendors-providing-high-end-security-2/</loc>
		<lastmod>2019-01-31T23:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/state-bank-of-india-leaves-millions-of-customer-messages-exposed/</loc>
		<lastmod>2019-01-31T23:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/leading-bas-vendors-providing-high-end-security/</loc>
		<lastmod>2019-02-01T23:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/userful-taps-partners-to-manage-digital-signage-systems/</loc>
		<lastmod>2019-02-01T23:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/after-fed-government-shutdown-time-to-rethink-your-it-security/</loc>
		<lastmod>2019-02-04T23:39:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-announces-global-channel-program-3/</loc>
		<lastmod>2019-02-06T23:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-changing-channel-programs-avaya-intelisys-more/</loc>
		<lastmod>2019-02-08T23:32:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-announces-global-channel-program/</loc>
		<lastmod>2019-02-11T23:27:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-announces-global-channel-program-2/</loc>
		<lastmod>2019-02-11T23:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/report-details-on-617-million-user-accounts-up-for-sale-on-dark-web/</loc>
		<lastmod>2019-02-12T23:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/617-million-accounts-from-16-hacked-websites-is-being-sold-on-dark-web/</loc>
		<lastmod>2019-02-13T23:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-dump-sensitive-info-from-617-million-accounts-dubsmash-15-other-sites-exposed/</loc>
		<lastmod>2019-02-13T23:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/paythink-new-development-tools-pose-a-new-data-breach-threat/</loc>
		<lastmod>2019-02-14T23:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/qa-how-to-respond-to-the-latest-big-data-breach/</loc>
		<lastmod>2019-02-16T23:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-appoints-david-mihelcic-to-advisory-board/</loc>
		<lastmod>2019-02-28T12:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/dow-jones-database-holding-2-4-million-records-of-politically-exposed-persons/</loc>
		<lastmod>2019-02-28T23:07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/dow-jones-loses-proprietary-info-in-massive-data-leak/</loc>
		<lastmod>2019-02-28T23:09:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/dow-jones-watchlist-found-exposed-to-open-internet/</loc>
		<lastmod>2019-02-28T23:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2-4-million-dow-jones-high-risk-watchlist-clients-exposed/</loc>
		<lastmod>2019-03-01T23:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/dow-jones-watchlist-database-found-exposed-online/</loc>
		<lastmod>2019-03-01T23:05:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/former-disa-cto-david-mihelcic-joins-attackiq-advisory-board/</loc>
		<lastmod>2019-03-01T23:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-and-blackberry-cylance-join-forces-to-deliver-enterprise-endpoint-security-validation/</loc>
		<lastmod>2019-03-05T12:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/blackberry-cylance-unveils-behavioral-analytics-solution/</loc>
		<lastmod>2019-03-05T23:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-6/</loc>
		<lastmod>2019-03-06T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/rsa-conference-2019-and-mssp-cybersecurity-news-06-march-2019/</loc>
		<lastmod>2019-03-06T23:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gearbest-data-breach-easily-preventable-as-1-5-million-shoppers-affected/</loc>
		<lastmod>2019-03-15T22:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gearbest-misconfiguration-exposes-1-5m-records/</loc>
		<lastmod>2019-03-15T22:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-case-for-continuous-automated-security-validation/</loc>
		<lastmod>2019-04-05T22:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/top-10-global-cybersecurity-hubs-for-2019/</loc>
		<lastmod>2019-04-23T22:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/why-local-governments-are-a-hot-target-for-cyberattacks/</loc>
		<lastmod>2019-05-01T22:49:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-vice-president-cyber-security-toolchain-needs-to-evaluate-and-improve-efficiency/</loc>
		<lastmod>2019-05-03T22:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/orpak-gas-stations-easily-hackable-thanks-to-hardcoded-passwords/</loc>
		<lastmod>2019-05-03T22:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/san-diego-sees-another-record-breaking-quarter-of-tech-investment/</loc>
		<lastmod>2019-05-03T22:48:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-should-not-be-democratization-anymore/</loc>
		<lastmod>2019-05-09T22:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uniqlo-hacked-with-460000-customer-records-stolen/</loc>
		<lastmod>2019-05-14T22:41:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-access-steal-info-from-460k-uniqlo-japan-online-accounts/</loc>
		<lastmod>2019-05-15T22:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-access-steal-info-from-460k-uniqlo-japan-online-accounts-2/</loc>
		<lastmod>2019-05-15T22:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uniqlo-customer-data-stolen-through-credential-stuffing-attack/</loc>
		<lastmod>2019-05-16T22:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/from-apes-to-bespoke-security-automated-as-a-service/</loc>
		<lastmod>2019-05-21T22:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uniqlo-data-breach-commentary/</loc>
		<lastmod>2019-05-21T22:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-secures-17-6-million-in-series-b-financing/</loc>
		<lastmod>2019-05-29T12:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-announces-17-6-million-in-series-b-funding/</loc>
		<lastmod>2019-05-29T20:35:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-raises-17-6-million-for-continuous-enterprise-security-monitoring/</loc>
		<lastmod>2019-05-29T20:36:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-raises-17-6-million-in-series-b-funding-round/</loc>
		<lastmod>2019-05-29T20:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-raises-17-6m-in-series-b-financing/</loc>
		<lastmod>2019-05-29T20:37:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-raises-usd-17-6m-series-b-led-by-khosla-ventures/</loc>
		<lastmod>2019-05-29T20:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-secures-17-6-million-in-series-b-financing-3/</loc>
		<lastmod>2019-05-29T22:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-startup-attackiq-raises-17-6m-in-funding/</loc>
		<lastmod>2019-05-29T22:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-29-may-2019/</loc>
		<lastmod>2019-05-29T22:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/term-sheet-wednesday-may-29-endeavor-ipo-women-and-robinhood/</loc>
		<lastmod>2019-05-29T22:33:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/san-diego-startups-attackiq-esub-net-additional-venture-capital-funding/</loc>
		<lastmod>2019-05-30T20:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-raises-17-6-million-in-series-b-funding/</loc>
		<lastmod>2019-05-30T20:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-secures-17-6-million-in-series-b-financing-2/</loc>
		<lastmod>2019-05-30T20:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/continuous-security-validation-company-attackiq-raises-17-6-million/</loc>
		<lastmod>2019-05-30T20:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/crowdstrike-sets-ipo-share-price-targets-414-million/</loc>
		<lastmod>2019-05-30T20:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-5/</loc>
		<lastmod>2019-05-30T20:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/private-equity-reshapes-mssp-managed-security-services-provider-market/</loc>
		<lastmod>2019-05-30T20:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/deciphering-cyber-increased-interest-in-vulnerability-testing-could-leave-companies-susceptible-to-dealmaking/</loc>
		<lastmod>2019-05-30T20:25:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-recruiting-tech-lead-b2b-vc/</loc>
		<lastmod>2019-05-31T20:15:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/continuous-security-funding-attackiq-raises-17-6-million/</loc>
		<lastmod>2019-06-04T20:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mega-funding-rounds-continue/</loc>
		<lastmod>2019-06-05T20:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/u-s-cities-are-under-attack-from-ransomware-and-its-going-to-get-much-worse/</loc>
		<lastmod>2019-06-17T20:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/these-series-of-ransomware-attacks-is-more-than-just-for-ransom-and-the-government-should-listen-and-investigate/</loc>
		<lastmod>2019-06-18T20:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mongodb-database-breach-what-the-experts-are-saying/</loc>
		<lastmod>2019-06-20T20:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-tool-sprawl-leaves-security-gaps-cuts-margins-for-channel/</loc>
		<lastmod>2019-06-20T20:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/exactis-breach-exposes-340m-records-may-compel-gdpr-like-regulation-in-us/</loc>
		<lastmod>2019-06-29T22:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/ponemon-study-53-percent-of-it-security-leaders-dont-know-if-cybersecurity-tools-are-working-despite-an-average-of-18-4-million-annual-spend/</loc>
		<lastmod>2019-06-30T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/trapx-security-raises-18-million-to-thwart-cyberattacks-with-decoy-assets/</loc>
		<lastmod>2019-07-01T20:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/separate-incidents-expose-third-party-security-risks/</loc>
		<lastmod>2019-07-03T00:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gdpr-bites-again-marriott-facing-123-6m-fine-for-2018-data-breach/</loc>
		<lastmod>2019-07-10T20:18:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/marriott-to-contest-124-million-fine-imposed-by-uk-data-protection-regulator/</loc>
		<lastmod>2019-07-10T20:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-views-on-ico-fines-for-ba-and-marriott/</loc>
		<lastmod>2019-07-10T20:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-views-on-ico-fines-for-ba-and-marriott-2/</loc>
		<lastmod>2019-07-10T20:21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-organizations-are-bridging-the-cyber-risk-management-gap/</loc>
		<lastmod>2019-07-12T20:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/incompetent-local-governments-are-being-paralyzed-by-cyber-hackers-using-ransomware/</loc>
		<lastmod>2019-07-15T20:17:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/facebook-marriott-face-fines-over-privacy-missteps-will-it-matter/</loc>
		<lastmod>2019-07-16T20:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gdpr-the-good-the-bad-and-the-uncertain/</loc>
		<lastmod>2019-07-17T20:16:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-commentary-on-equifax-settlement/</loc>
		<lastmod>2019-07-23T20:12:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/equifax-agrees-to-pay-up-to-700m-to-settle-hacking-lawsuits/</loc>
		<lastmod>2019-07-23T20:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/blind-leading-the-blind-the-rise-of-test-centric-security/</loc>
		<lastmod>2019-07-24T20:11:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-facebooks-5b-ftc-settlement-means-for-zuckerberg-third-parties-and-corporate-structure/</loc>
		<lastmod>2019-07-25T20:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/1-big-thing-even-it-doesnt-know-if-their-security-software-works/</loc>
		<lastmod>2019-07-26T20:08:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/exclusive-users-in-dark-about-security-products-effectiveness/</loc>
		<lastmod>2019-07-26T20:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-investments-increasing-but-53-leaders-unsure-of-effectiveness/</loc>
		<lastmod>2019-07-30T20:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/more-than-half-of-enterprises-dont-know-if-their-security-tools-are-working/</loc>
		<lastmod>2019-07-30T20:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/12-reasons-why-data-breaches-still-happen/</loc>
		<lastmod>2019-07-30T20:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/over-half-of-enterprise-firms-dont-have-a-clue-if-their-cybersecurity-solutions-are-working/</loc>
		<lastmod>2019-07-30T20:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/53-of-enterprises-have-no-idea-if-their-security-tools-are-working/</loc>
		<lastmod>2019-07-31T19:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/half-of-companies-dont-know-if-their-security-is-working/</loc>
		<lastmod>2019-07-31T19:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/financial-services-top-cyber-attack-target/</loc>
		<lastmod>2019-07-31T20:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/equifax-700-million-data-breach-settlement-a-sign-of-things-to-come/</loc>
		<lastmod>2019-07-31T20:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/53-of-enterprises-have-no-idea-if-their-security-tools-are-working-2/</loc>
		<lastmod>2019-07-31T20:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-4/</loc>
		<lastmod>2019-07-31T20:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/53-of-enterprises-have-no-idea-if-their-security-tools-are-working-3/</loc>
		<lastmod>2019-07-31T20:11:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/53-of-enterprises-have-no-idea-if-their-security-tools-are-working-4/</loc>
		<lastmod>2019-07-31T20:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/ponemon-study-53-percent-of-it-security-leaders-dont-know-if-cybersecurity-tools-are-working-despite-an-average-of-18-4-million-annual-spend-2/</loc>
		<lastmod>2019-07-31T20:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/enterprise-firms-spend-on-cyber-but-struggle-with-security-awareness/</loc>
		<lastmod>2019-08-01T20:07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/why-complexity-issues-persist-in-siem-and-cybersecurity/</loc>
		<lastmod>2019-08-01T20:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/week-in-review-capital-one-breach-visa-payment-limit-bypass-flaw-vxworks-rtos-vulnerabilities/</loc>
		<lastmod>2019-08-04T20:07:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/survey-shines-light-on-chronic-need-for-actionable-cybersecurity-intelligence/</loc>
		<lastmod>2019-08-13T20:06:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/moviepass-exposes-161m-records/</loc>
		<lastmod>2019-08-15T20:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/moviepass-customer-credit-card-data-exposed-in-unsecured-database-2/</loc>
		<lastmod>2019-08-15T20:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/700k-customer-records-leaked-choice-hotels-data-breach/</loc>
		<lastmod>2019-08-15T20:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/700000-choice-hotels-customer-records-stolen-held-for-ransom/</loc>
		<lastmod>2019-08-15T20:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-weigh-in-the-oklahoma-securities-commission-breach/</loc>
		<lastmod>2019-08-17T22:35:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-deepens-leadership-bench-appoints-dariush-afshar-as-vp-business-development-and-corporate-strategy/</loc>
		<lastmod>2019-08-21T12:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/thousands-of-moviepass-subscriber-payment-card-numbers-exposed/</loc>
		<lastmod>2019-08-21T19:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/moviepass-database-exposes-161-million-records/</loc>
		<lastmod>2019-08-21T19:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-integrates-with-microsoft-to-validate-endpoint-configuration-and-controls-of-microsoft-defender-advanced-threat-protection-atp/</loc>
		<lastmod>2019-08-22T12:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-deepens-leadership-bench-appoints-dariush-afshar-as-vp-business-development-and-corporate-strategy-2/</loc>
		<lastmod>2019-08-22T19:53:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-news-22-august-2019/</loc>
		<lastmod>2019-08-22T19:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-3/</loc>
		<lastmod>2019-08-22T19:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-can-the-government-improve-its-cyber-posture/</loc>
		<lastmod>2019-08-23T22:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-automates-the-evaluation-of-microsoft-defender-atp/</loc>
		<lastmod>2019-08-23T22:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-roundup-bitglass-kaspersky-cisco-jask-microsoft-attackiq/</loc>
		<lastmod>2019-08-23T22:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/christopher-kennedy-joins-attackiq-as-ciso-and-vice-president-of-customer-success-2/</loc>
		<lastmod>2019-08-25T22:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-bluehexagon-and-coalfire-esw-151/</loc>
		<lastmod>2019-08-29T22:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-bluehexagon-and-coalfire-esw-151-2/</loc>
		<lastmod>2019-08-29T22:09:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/whats-changing-in-the-cyber-domain-we-ask-industry-experts/</loc>
		<lastmod>2019-08-30T22:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-to-know-if-your-cybersecurity-tools-are-actually-working/</loc>
		<lastmod>2019-08-30T22:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-is-mitre-attck-and-how-is-it-useful/</loc>
		<lastmod>2019-09-03T22:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-to-plug-the-latest-supermicro-server-security-hole/</loc>
		<lastmod>2019-09-06T21:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-to-plug-the-latest-supermicro-server-security-hole-2/</loc>
		<lastmod>2019-09-06T22:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/calls-to-bring-back-role-that-was-scrapped-by-departing-u-s-security-advisor/</loc>
		<lastmod>2019-09-11T21:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-comments-personal-records-of-most-of-ecuadors-population-leaked/</loc>
		<lastmod>2019-09-16T21:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-a-platform-for-verifying-corporate-security-tools-and-proposing-improvements/</loc>
		<lastmod>2019-09-19T21:48:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/lion-air-breach-hits-millions-of-passengers/</loc>
		<lastmod>2019-09-19T21:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cloud-computing-what-it-is-and-what-it-is-not/</loc>
		<lastmod>2019-09-22T21:45:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cloud-computing-levels-the-playing-field-for-small-businesses/</loc>
		<lastmod>2019-09-22T21:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/leaks-breaches-creating-chaos-globally-domestically/</loc>
		<lastmod>2019-09-23T21:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cyber-risk-management-is-about-to-get-easier/</loc>
		<lastmod>2019-09-27T21:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/facts-and-commentary-on-the-2019-doordash-breach/</loc>
		<lastmod>2019-09-27T21:36:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/should-the-national-security-council-restore-the-cybersecurity-coordinator-role/</loc>
		<lastmod>2019-09-27T21:39:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/doordash-data-breach-impacts-4-9m-users-experts-comments/</loc>
		<lastmod>2019-09-27T21:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-recognized-as-honoree-in-crns-2019-cloud-partner-program-guide/</loc>
		<lastmod>2019-10-01T12:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/scary-security-stats/</loc>
		<lastmod>2019-10-01T21:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-strengthens-leadership-team-with-the-appointment-of-chief-financial-officer/</loc>
		<lastmod>2019-10-02T12:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/here-is-why-endpoint-security-is-important-for-your-enterprise/</loc>
		<lastmod>2019-10-02T21:27:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/surge-of-cybersecurity-problems-reported-in-recent-days/</loc>
		<lastmod>2019-10-02T21:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/scary-security-stats-from-2019/</loc>
		<lastmod>2019-10-02T21:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-2/</loc>
		<lastmod>2019-10-03T21:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-news-3-october-2019/</loc>
		<lastmod>2019-10-03T21:26:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cfos-on-the-move-week-ending-october-4/</loc>
		<lastmod>2019-10-04T21:22:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-opening-new-offices-in-australia-to-better-serve-partners-in-apac/</loc>
		<lastmod>2019-10-08T12:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-expands-in-australia/</loc>
		<lastmod>2019-10-08T21:12:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-news-8-october-2019/</loc>
		<lastmod>2019-10-08T21:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year-2/</loc>
		<lastmod>2019-10-08T21:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-giants-join-forces-to-combat-cyberthreats-under-oasis-umbrella/</loc>
		<lastmod>2019-10-08T21:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-opening-new-offices-in-australia-to-better-serve-partners-in-apac-2/</loc>
		<lastmod>2019-10-09T21:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-10-9-19/</loc>
		<lastmod>2019-10-09T21:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/76-percent-of-us-businesses-have-experienced-a-cyberattack-in-the-past-year/</loc>
		<lastmod>2019-10-14T21:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/ponemon-study-only-28-percent-of-enterprises-say-ceo-and-board-approves-acceptable-level-of-cyber-risk-demonstrating-clear-lack-of-accountability/</loc>
		<lastmod>2019-10-15T12:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-makes-first-overseas-expansion/</loc>
		<lastmod>2019-10-15T20:59:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/bracing-for-holy-crap-zero-day-exploits/</loc>
		<lastmod>2019-10-15T21:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/40-percent-of-security-practitioners-dont-report-to-the-board/</loc>
		<lastmod>2019-10-15T21:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing/</loc>
		<lastmod>2019-10-16T20:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/majority-of-it-security-pros-say-their-infrastructure-has-gaps-2/</loc>
		<lastmod>2019-10-16T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/majority-of-it-security-pros-say-their-infrastructure-has-gaps/</loc>
		<lastmod>2019-10-17T20:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/250000-resumes-exposed-in-latest-case-of-misconfigured-cloud-storage/</loc>
		<lastmod>2019-10-17T20:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/executives-are-not-actively-engaged-in-ensuring-the-effectiveness-of-cybersecurity-strategy/</loc>
		<lastmod>2019-10-17T20:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/executives-are-not-actively-engaged-in-ensuring-the-effectiveness-of-cybersecurity-strategy-2/</loc>
		<lastmod>2019-10-17T20:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/only-28-percent-of-us-enterprises-say-ceo-and-board-approves-acceptable-level-of-cyber-risk/</loc>
		<lastmod>2019-10-18T20:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-roundup-scary-stats-vade-secure-esentire-and-forcepoint/</loc>
		<lastmod>2019-10-18T20:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/ponemon-study-only-28-percent-of-enterprises-say-ceo-and-board-approves-acceptable-level-of-cyber-risk-demonstrating-clear-lack-of-accountability-2/</loc>
		<lastmod>2019-10-18T20:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/data-leak-exposes-more-than-200k-job-seeker-cvs/</loc>
		<lastmod>2019-10-21T20:25:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/scary-security-stats-roundup-from-2019/</loc>
		<lastmod>2019-10-21T20:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-and-the-chertoff-group-partner-to-enable-enterprises-to-measure-cyber-risk-train-talent-and-justify-security-investments-with-unprecedented-transparency/</loc>
		<lastmod>2019-10-22T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-big-cybersecurity-stories-you-need-to-know-about/</loc>
		<lastmod>2019-10-22T20:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-22-october-2019/</loc>
		<lastmod>2019-10-22T20:23:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-and-the-chertoff-group-help-enterprise-customers-build-and-sustain-security-programs/</loc>
		<lastmod>2019-10-23T20:19:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-ethical-hacking-can-strengthen-your-data-center-security/</loc>
		<lastmod>2019-10-24T20:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-ethical-hacking-can-strengthen-your-data-center-security-2/</loc>
		<lastmod>2019-10-24T20:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-october-25-2019/</loc>
		<lastmod>2019-10-25T20:16:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/it-security-leaders-board-members-need-to-accept-more-responsibility-for-cybersecurity-risk/</loc>
		<lastmod>2019-10-28T20:14:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-chertoff-collaborate-on-new-security-diagnostic-service/</loc>
		<lastmod>2019-10-29T20:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-industry-gets-wrong-about-cyber-insurance/</loc>
		<lastmod>2019-10-31T20:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/weekly-news-roundup-october-27-november-1-2019/</loc>
		<lastmod>2019-11-01T22:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/emerging-products-breach-and-attack-simulation-technologies/</loc>
		<lastmod>2019-11-01T22:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-platform-v2-15/</loc>
		<lastmod>2019-11-01T22:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/technical-debt-a-data-center-security-risk-you-cant-afford/</loc>
		<lastmod>2019-11-06T22:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-cold-truth-about-cyber-insurance/</loc>
		<lastmod>2019-11-07T22:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-engenuity-to-strengthen-critical-infrastructure/</loc>
		<lastmod>2019-11-11T22:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/headcount-firings-hirings-and-retirings-october/</loc>
		<lastmod>2019-11-11T22:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-joins-new-collaborative-research-program-to-advance-understanding-of-cyber-adversaries-and-improve-the-effectiveness-of-defenses-against-cyber-attacks/</loc>
		<lastmod>2019-11-12T12:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-engenuity-announces-the-center-for-threat-informed-defense/</loc>
		<lastmod>2019-11-13T22:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-mergers-and-acquistions-list/</loc>
		<lastmod>2019-11-13T22:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-seeks-to-drive-critical-infrastructure-security-through-new-foundation-jason-providakes-quoted/</loc>
		<lastmod>2019-11-13T22:45:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/morning-cybersecurity/</loc>
		<lastmod>2019-11-13T22:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-november-13-2019/</loc>
		<lastmod>2019-11-13T22:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-engenuity-sets-cyber-defense-rd-project/</loc>
		<lastmod>2019-11-14T22:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/critical-siem-statistics-your-enterprise-needs-to-understand/</loc>
		<lastmod>2019-11-15T22:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-engenuity-center-for-threat-informed-defense-improves-cyber-defense-at-scale/</loc>
		<lastmod>2019-11-15T22:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/infosecna-video-interview-christopher-kennedy/</loc>
		<lastmod>2019-11-19T22:34:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managing-cyberthreats-on-a-tight-budget/</loc>
		<lastmod>2019-11-19T22:36:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/everything-we-know-about-the-macys-data-breach/</loc>
		<lastmod>2019-11-20T22:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-comments-on-macys-customer-payment-info-stolen-in-magecart-breach/</loc>
		<lastmod>2019-11-21T22:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-acquire-fullz-in-recent-data-breaches/</loc>
		<lastmod>2019-11-21T22:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-mitre-foundation-aims-to-boost-critical-infrastructure/</loc>
		<lastmod>2019-11-21T22:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-reaction-on-1-2-billion-records-were-found-online-on-an-exposed-unsecure-single-server/</loc>
		<lastmod>2019-11-22T22:21:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitres-attck-finds-a-home-in-the-cybersecurity-community/</loc>
		<lastmod>2019-11-28T00:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackerones-breach-highlights-security-business-partner-risk/</loc>
		<lastmod>2019-12-05T22:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/secret-cso-chris-kennedy-attackiq/</loc>
		<lastmod>2019-12-12T22:18:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/honda-exposes-customer-data-on-unsecured-elasticsearch-database-for-the-second-time-this-year/</loc>
		<lastmod>2019-12-18T22:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/https-journalofcyberpolicy-com-2019-12-19-2020-predictions-biometrics-facial-recognition-cybersecurity/</loc>
		<lastmod>2019-12-19T21:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2020-predictions-for-secops-cybersecurity-human-resources-and-organizations/</loc>
		<lastmod>2019-12-19T22:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2020-predictions-election-security/</loc>
		<lastmod>2019-12-19T22:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/leaky-honda-database-exposes-976m-records-expert-commentary/</loc>
		<lastmod>2019-12-19T22:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2346/</loc>
		<lastmod>2019-12-19T22:07:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2020-predictions-defense-wins-championships-rise-of-mid-tier-mssps/</loc>
		<lastmod>2019-12-19T22:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-recognized-as-a-microsoft-security-20-20-partner-awards-finalist-for-emerging-isv-disruptor/</loc>
		<lastmod>2019-12-20T12:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/year-in-review-cyber-incidents-in-2019-predictions-for-2020-3/</loc>
		<lastmod>2019-12-20T21:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-top-20-security-predictions-for-2020/</loc>
		<lastmod>2019-12-20T21:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/honda-north-america-left-user-data-exposed-on-web-researcher/</loc>
		<lastmod>2019-12-20T21:57:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/year-in-review-cyber-incidents-in-2019-predictions-for-2020/</loc>
		<lastmod>2019-12-23T21:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/year-in-review-cyber-incidents-in-2019-predictions-for-2020-2/</loc>
		<lastmod>2019-12-23T21:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-deep-fakes-can-hurt-your-business-and-what-to-do-about-it/</loc>
		<lastmod>2019-12-24T21:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/honda-opens-breach-lane-facebook-reveals-more-names/</loc>
		<lastmod>2019-12-26T21:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/scams-continue-in-year-of-1000-data-breaches/</loc>
		<lastmod>2019-12-27T23:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-mergers-and-acquisitions-list-28-managed-security-buyouts-to-note/</loc>
		<lastmod>2020-01-06T21:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-mergers-and-acquisitions-list-28-managed-security-buyouts-to-note-2/</loc>
		<lastmod>2020-01-06T21:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2020-predictions/</loc>
		<lastmod>2020-01-08T21:21:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-hires-cylance-veteran-pedro-vidal-as-vp-of-north-america-sales/</loc>
		<lastmod>2020-01-08T21:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-8-jan-2020/</loc>
		<lastmod>2020-01-08T21:25:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-january-8-2020/</loc>
		<lastmod>2020-01-08T21:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-appoints-pedro-vidal-vp-of-north-america-to-drive-company-growth-and-sales/</loc>
		<lastmod>2020-01-08T21:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-attack-on-our-networks-is-the-war-we-really-need-to-worry-about/</loc>
		<lastmod>2020-01-09T21:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/pedro-vidal-joins-attackiqs-executive-team-as-vice-president-of-north-america-sales/</loc>
		<lastmod>2020-01-09T21:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-appoints-cylance-vet-to-vp-of-north-america-sales/</loc>
		<lastmod>2020-01-10T21:11:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/raising-cyberthreat-alerts-to-fis-amid-heightened-tensions-with-iran/</loc>
		<lastmod>2020-01-10T21:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/what-does-the-hack-back-bill-mean-to-your-business/</loc>
		<lastmod>2020-01-10T21:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/expert-comments-iranian-hackers-have-been-password-spraying-us-electric-utilities/</loc>
		<lastmod>2020-01-10T21:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/iranian-hackers-hit-bahrains-national-oil-company/</loc>
		<lastmod>2020-01-11T21:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-to-prepare-your-business-for-iranian-retaliation-cyberattacks/</loc>
		<lastmod>2020-01-13T21:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-continues-to-grow-executive-team-promoting-stacey-meyer-to-vp-of-federal-operations/</loc>
		<lastmod>2020-01-14T12:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-selected-by-ntt-ltd-as-a-strategic-technology-partner-to-provide-a-holistic-predictive-threat-intelligence-solution/</loc>
		<lastmod>2020-01-15T12:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/customer-data-stolen-in-hack-of-western-australias-pn-bank/</loc>
		<lastmod>2020-01-15T21:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-briefing-january-15-2020/</loc>
		<lastmod>2020-01-15T21:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/stacey-meyer-promoted-to-attackiq-federal-operations-vp/</loc>
		<lastmod>2020-01-15T21:05:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-15-january-2020-mssp-alert/</loc>
		<lastmod>2020-01-15T21:06:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/aussie-pn-bank-suffers-data-breach/</loc>
		<lastmod>2020-01-16T21:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/credit-unions-should-increase-phishing-identification-in-2020/</loc>
		<lastmod>2020-01-16T21:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-promotes-stacey-meyer-to-vice-president-of-federal-operations/</loc>
		<lastmod>2020-01-16T21:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/managed-security-services-provider-mssp-news-17-january-2020/</loc>
		<lastmod>2020-01-17T20:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/gardner-to-bring-cybersecurity-sales-and-channel-expertise-to-saasmax/</loc>
		<lastmod>2020-01-17T23:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-2020-predictions-election-security-hack-back-bill-and-the-resistance-of-technology/</loc>
		<lastmod>2020-01-20T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/4-expert-perspectives-on-the-collection-1-data-breach/</loc>
		<lastmod>2020-01-21T23:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/counter-point-why-compliance-doesnt-guarantee-security-strategies-vs-far-from-a-security-guarantee/</loc>
		<lastmod>2020-01-27T23:23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cybersecurity-and-the-problem-of-interoperability/</loc>
		<lastmod>2020-01-27T23:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-the-scariest-attack-on-the-us-will-come-through-the-internet/</loc>
		<lastmod>2020-01-28T23:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cyber-insurance-policies-evolving-to-meet-emerging-risks-and-premiums-reflect-it/</loc>
		<lastmod>2020-01-28T23:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/lab-testing-firm-labcorp-exposes-patient-data-via-unsecured-crm-system/</loc>
		<lastmod>2020-01-28T23:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-the-scariest-attack-on-the-us-will-come-through-the-internet-2/</loc>
		<lastmod>2020-01-28T23:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-global-accelerate-channel-program/</loc>
		<lastmod>2020-01-29T12:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/labcorp-exposes-thousands-of-medical-documents-commentary/</loc>
		<lastmod>2020-01-29T23:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-selected-by-ntt-ltd-as-a-strategic-cybersecurity-partner/</loc>
		<lastmod>2020-02-03T23:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/channel-people-on-the-move-vonage-telarus-star2star/</loc>
		<lastmod>2020-02-03T23:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/is-clearview-ais-facial-recognition-legal-we-need-to-figure-it-out-soon/</loc>
		<lastmod>2020-02-06T23:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/is-clearview-ais-facial-recognition-legal-we-need-to-figure-it-out-soon-2/</loc>
		<lastmod>2020-02-06T23:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/headcount-firings-hirings-and-retirings-january-2020-pt-1/</loc>
		<lastmod>2020-02-07T22:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-vp-of-worldwide-channels-dan-sibille-recognized-on-crns-2020-channel-chiefs-list/</loc>
		<lastmod>2020-02-10T12:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/chinese-firm-working-on-facial-recognition-that-can-identify-you-under-a-mask/</loc>
		<lastmod>2020-02-10T22:55:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-enhances-accelerate-partner-program/</loc>
		<lastmod>2020-02-10T22:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/cyber-insurance-and-its-place-in-business-security-strategy-qa/</loc>
		<lastmod>2020-02-11T22:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/scythe-prepares-to-launch-marketplace-of-pwns-for-security-testing-platform/</loc>
		<lastmod>2020-02-13T22:50:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/pwns-for-sale-scythe-prepares-a-marketplace-for-sharing-simulated-hacks-2/</loc>
		<lastmod>2020-02-13T22:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/pwns-for-sale-scythe-prepares-a-marketplace-for-sharing-simulated-hacks-3/</loc>
		<lastmod>2020-02-13T22:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/pwns-for-sale-scythe-prepares-a-marketplace-for-sharing-simulated-hacks/</loc>
		<lastmod>2020-02-14T22:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-2020-predictions/</loc>
		<lastmod>2020-02-15T22:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-report-on-ponemon-surveydespite-spending-an-average-of-18-4-million-on-cybersecurity-solutions-organizations-still-get-breached/</loc>
		<lastmod>2020-02-16T22:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/defending-against-state-sponsored-hackersac/</loc>
		<lastmod>2020-02-17T22:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uncanny-face-id-mask-can-deter-the-spread-of-germs-but-wont-unlock-your-phone-2/</loc>
		<lastmod>2020-02-19T22:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/uncanny-face-id-mask-can-deter-the-spread-of-germs-but-wont-unlock-your-phone/</loc>
		<lastmod>2020-02-21T22:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/youve-encrypted-your-data-in-the-cloud-but-are-your-keys-safe-2/</loc>
		<lastmod>2020-02-24T22:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mcafee-helps-partners-build-competitive-edge-with-open-platform-approach-to-cloud-security/</loc>
		<lastmod>2020-02-24T22:31:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mcafee-stresses-benefits-of-open-approach-to-partners/</loc>
		<lastmod>2020-02-24T22:33:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/youve-encrypted-your-data-in-the-cloud-but-are-your-keys-safe/</loc>
		<lastmod>2020-02-25T22:06:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mcafee-announces-eight-new-partnerships-and-seven-newly-certified-integrations/</loc>
		<lastmod>2020-02-25T22:08:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mcafee-announces-eight-new-partnerships-and-seven-newly-certified-integrations-2/</loc>
		<lastmod>2020-02-25T22:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-recognized-as-a-microsoft-security-20-20-partner-award-winner-for-emerging-isv-disruptor/</loc>
		<lastmod>2020-02-27T12:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/12-hot-cybersecurity-startups-you-need-to-know-about-at-rsa-2020/</loc>
		<lastmod>2020-02-27T22:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/experts-weigh-in-on-dow-jones-proprietary-info-data-leak/</loc>
		<lastmod>2020-02-27T23:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-recognized-as-a-microsoft-security-20-20-partner-award-winner/</loc>
		<lastmod>2020-02-28T22:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/boeing-and-tesla-manufacturer-in-ransomware-attack/</loc>
		<lastmod>2020-03-05T21:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mssp-mergers-and-acquisitions-list-30-managed-security-buyouts-to-note/</loc>
		<lastmod>2020-03-06T21:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/fragmented-security-patches-prevailing-issue-for-cios/</loc>
		<lastmod>2020-03-06T21:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/compliance-competency-improving-security-strategies-vs-far-from-a-security-guarantee/</loc>
		<lastmod>2020-03-09T21:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/emergency-response-how-contractors-should-react-to-a-hack-screen-reader-support-enabled/</loc>
		<lastmod>2020-03-11T21:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/intel-security-gap-hard-to-exploit-without-physical-data-center-access-2/</loc>
		<lastmod>2020-03-11T21:54:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/intel-security-gap-hard-to-exploit-without-physical-data-center-access/</loc>
		<lastmod>2020-03-12T21:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/2-cybersecurity-considerations-for-a-remote-workforce/</loc>
		<lastmod>2020-03-19T21:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/crn-2020-partner-program-guide/</loc>
		<lastmod>2020-03-27T21:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards/</loc>
		<lastmod>2020-03-29T21:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards-2/</loc>
		<lastmod>2020-03-29T21:39:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards-3/</loc>
		<lastmod>2020-03-29T21:40:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards-4/</loc>
		<lastmod>2020-03-29T21:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards-5/</loc>
		<lastmod>2020-03-29T21:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/all-the-winners-from-microsofts-20-20-security-awards-6/</loc>
		<lastmod>2020-03-29T21:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-delivers-breach-and-attack-simulation-solutions-to-government-agencies-through-rockiteks-gsa-schedule/</loc>
		<lastmod>2020-03-31T12:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-to-offer-cybersecurity-products-on-rockiteks-federal-supply-schedule-contract/</loc>
		<lastmod>2020-04-01T21:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-added-to-the-department-of-homeland-securitys-continuous-diagnostics-and-mitigation-approved-products-list/</loc>
		<lastmod>2020-04-09T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/telework-guidance-operation-pinball-itunes-fleeceware-notes-on-covid-19-and-cybersecurity/</loc>
		<lastmod>2020-04-09T21:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-strengthens-leadership-team-with-new-chief-marketing-officer-and-senior-director-of-cybersecurity-strategy-and-policy/</loc>
		<lastmod>2020-04-13T12:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/daily-ai-roundup-the-coolest-things-on-earth-today/</loc>
		<lastmod>2020-04-13T21:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-strengthens-leadership-team-with-new-chief-marketing-officer-and-senior-director-of-cybersecurity-strategy-and-policy-2/</loc>
		<lastmod>2020-04-13T21:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/channel-futures/</loc>
		<lastmod>2020-04-13T21:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/prank-or-vendetta-but-in-any-case-a-wiper-sfo-hacked-ransomware-updates-ddos-for-hire-busts-covid-19-and-cybersecurity/</loc>
		<lastmod>2020-04-13T21:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-attackiq-academy/</loc>
		<lastmod>2020-04-14T20:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/newcomers-to-the-2020-midas-list/</loc>
		<lastmod>2020-04-14T21:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/ross-brewer-joins-attackiq-as-a-strategic-advisor-focused-on-emea/</loc>
		<lastmod>2020-04-21T12:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/new-attackiq-emulation-plan-empowers-enterprises-to-assess-risks-against-apt29-cyberattacks/</loc>
		<lastmod>2020-04-22T12:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/hackers-access-steal-info-from-460k-uniqlo-japan-online-accounts-3/</loc>
		<lastmod>2020-05-16T05:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-simulations-now-available-in-microsoft-defender-atp-evaluation-lab/</loc>
		<lastmod>2020-05-20T12:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-new-architecture-and-products-to-help-enterprises-fully-automate-continuous-security-validation-and-remediation/</loc>
		<lastmod>2020-05-28T12:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-academy-unveils-new-cybersecurity-courses-and-guest-lecturer-series/</loc>
		<lastmod>2020-06-18T12:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-expands-leadership-bench-with-new-vice-president-of-product/</loc>
		<lastmod>2020-07-07T12:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-joins-forces-with-ackcent-to-deliver-breach-and-attack-simulation-services-across-europe/</loc>
		<lastmod>2020-07-23T22:30:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-security-optimization-platform-helps-cybersecurity-leaders-navigate-new-era-of-increased-attacks-heightened-business-risk-and-scrutinized-spending/</loc>
		<lastmod>2020-08-03T12:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-pr-sop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-preactive-security-exchange-pse-to-improve-security-controls-effectiveness-for-customers/</loc>
		<lastmod>2020-08-03T05:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-pr-pse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-platform-v2-17/</loc>
		<lastmod>2020-08-03T17:25:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/logo-sc-media.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/emerging-products-breach-and-attack-simulation-technologies-2/</loc>
		<lastmod>2020-08-19T20:09:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/logo-sc-media.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/techstrong-tv-brett-galloway/</loc>
		<lastmod>2020-08-28T23:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/ft-video-techstrong-tv-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/mitre-engenuity-center-for-threat-informed-defense-releases-fin6-adversary-emulation-plan/</loc>
		<lastmod>2020-09-15T12:30:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/mitre-engenuity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-integration-with-logrhythm-nextgen-siem-platform/</loc>
		<lastmod>2020-09-22T12:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/attackiq-logrhythm-pr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/new-criticalstart-and-attackiq-offering-helps-security-teams-find-potential-gaps-and-prevent-hackers-from-breaching-them/</loc>
		<lastmod>2020-10-06T12:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/pr-criticalstart-attackiq-sm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-wins-breach-and-attack-simulation-solution-of-the-year-award-in-2020-cybersecurity-breakthrough-awards-program/</loc>
		<lastmod>2020-10-14T12:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/Cybersecurity-Breakthrough-Awards-Web.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/its-time-for-a-better-approach-to-cybersecurity/</loc>
		<lastmod>2020-10-19T21:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/bg-itn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/new-attackiq-solution-integrates-with-microsoft-azure-sentinel-to-strengthen-cyber-threat-detection-and-investigation-for-security-customers/</loc>
		<lastmod>2020-10-27T12:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/col-pr-msft-azure-sentinel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/new-attackiq-solution-integrates-with-microsoft-azure-sentinel-to-strengthen-cyber-threat-detection-and-investigation-for-security-customers-2/</loc>
		<lastmod>2020-10-27T15:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/col-ns-security-boulevard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-new-informed-defenders-executive-council-to-share-expertise-and-improve-cybersecurity-effectiveness/</loc>
		<lastmod>2020-10-28T12:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/id-council.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/westcon-signs-distribution-agreement-with-breach-attack-simulation-leader-attackiq/</loc>
		<lastmod>2020-11-04T12:19:58+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/11/Westcon-Press-Release-Feature-Image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-named-a-finalist-for-2020-crn-tech-innovator-award/</loc>
		<lastmod>2020-11-09T16:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/11/col-ns-crn-tech-innovator-2020.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-current-announces-winners-of-inaugural-ciso-choice-awards/</loc>
		<lastmod>2020-11-18T12:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/11/col-ns-ciso-choice-award-2.5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-mitre-attack-for-dummies/</loc>
		<lastmod>2020-11-18T12:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/11/rs-pr-mad-generic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-security-optimization-platform-validates-nist-800-53-security-controls-against-mitre-attck-verifying-effective-compliance-and-aligning-preeminent-cybersecurity-frameworks/</loc>
		<lastmod>2020-12-15T15:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/NIST_CMMC-PR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/five-accelerating-digital-trends-that-will-impact-risk-management-in-2021/</loc>
		<lastmod>2020-12-17T00:59:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/Homeland-Security-Tody.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/if-you-dont-hire-robots-to-attack-your-networks-youre-not-doing-security-right/</loc>
		<lastmod>2020-12-17T18:10:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/03/col-blg-defenseone-robots.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-hackers-could-undermine-a-successful-vaccine-rollout/</loc>
		<lastmod>2020-12-18T19:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-ns-fortune-covid-vaccine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/credit-suisse-names-disruptive-technology-recognition-winners/</loc>
		<lastmod>2021-01-12T15:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/col-news-cs-award-pr-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-academys-10000th-student/</loc>
		<lastmod>2021-01-13T17:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/col-blog-10000-academy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/Academy_2020_Stats.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-named-one-of-fortunes-best-workplaces-in-the-bay-area-2021/</loc>
		<lastmod>2021-01-14T17:20:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/col-rs-news-best-places-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-academy-earns-silver-in-cyber-security-global-excellence-awards/</loc>
		<lastmod>2021-03-09T13:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/03/col-pr-academy-silver-csea-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-major-platform-innovations-to-bolster-informed-defense-architecture/</loc>
		<lastmod>2021-03-23T12:55:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/03/col-pr-aida.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/virtually-testing-foundation-partners-with-attackiq-academy-to-launch-enterprise-testing-internship-program/</loc>
		<lastmod>2021-04-07T12:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/vt-aiq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-appoints-new-general-manager-and-vice-president-of-emea-and-apj-regions/</loc>
		<lastmod>2021-04-13T07:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/Ross-Brewer-PR-Resources-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-introduces-new-partner-academy-to-help-channel-partners-around-the-world-accelerate-adoption-of-threat-informed-defense-practice/</loc>
		<lastmod>2021-05-20T12:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/col-pr-partner-academy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-helps-vmware-nsx-customers-validate-efficacy-of-their-network-security-controls/</loc>
		<lastmod>2021-06-10T12:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/AIQ-VMWare-Website-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-44-million-in-series-c-funding-to-fuel-global-growth-and-vision-of-security-optimization/</loc>
		<lastmod>2021-07-13T11:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/col-pr-series-c.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-introduces-new-vanguard-managed-security-validation-service/</loc>
		<lastmod>2021-09-30T12:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/col-pr-vanguard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-academy-named-ciso-choice-award-winner-in-security-education-training-category/</loc>
		<lastmod>2021-10-26T12:50:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-pr-ciso-award-eductation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-expands-leadership-team-with-appointment-of-ken-schock-as-chief-revenue-officer/</loc>
		<lastmod>2021-11-09T13:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/11/col-pr-ken-schock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/measure-the-effectiveness-of-your-microsoft-security-with-attackiq/</loc>
		<lastmod>2022-01-27T20:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/MSFT-CLOUD.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/russian-invasion-of-ukraine-could-redefine-cyber-warfare/</loc>
		<lastmod>2022-01-28T22:58:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Jonathan-Politico.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/white-house-creates-board-to-review-cybersecurity-incidents-members-to-start-with-log4j/</loc>
		<lastmod>2022-02-03T22:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-state-and-local-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/achieving-evidence-based-security-with-threat-informed-defense/</loc>
		<lastmod>2022-02-11T21:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/col-ns-chris-frenz-hitn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/bidens-sanctions-face-energy-reality/</loc>
		<lastmod>2022-02-23T09:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Jonathan-Politico.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/u-s-army-and-other-leading-u-s-government-agencies-take-proactive-stance-against-cyberattacks-with-attackiq/</loc>
		<lastmod>2022-02-23T21:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/col-pr-us-gov.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/why-the-impact-of-russian-cyberattacks-on-ukraine-could-be-felt-around-the-world/</loc>
		<lastmod>2022-02-23T21:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Russia-Ukraine.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/the-center-for-threat-informed-defense-impacting-the-public-good/</loc>
		<lastmod>2022-02-25T17:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-6.13.13-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/reporting-mandates-to-clear-up-feds-hazy-look-into-threat-landscape-podcast/</loc>
		<lastmod>2022-03-21T16:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/height_360_width_664_overlay_TP_small.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-second-annual-purple-hats-conference/</loc>
		<lastmod>2022-03-28T15:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/wwd-ph.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-hard-truth-behind-bidens-cyber-warnings/</loc>
		<lastmod>2022-03-28T20:38:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/biden-politico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/attackiq-included-in-the-2022-crn-partner-program-guide-for-the-accelerate-partner-program/</loc>
		<lastmod>2022-03-29T15:05:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/2022-CRN-Partner-Program-Guide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-announces-integration-with-vectra-ai-threat-detection-and-response-platform-to-help-customers-optimize-their-security-control-effectiveness/</loc>
		<lastmod>2022-04-20T15:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/AttackIQ-Vectra-960x540-PR-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/evolving-role-of-the-ciso/</loc>
		<lastmod>2022-05-04T14:48:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/col-pr-ross-brewer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/decipher-podcast-jonathan-reiber/</loc>
		<lastmod>2022-05-04T19:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/05/decipher-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/kcc-resumes-operations-post-ransomware-attack/</loc>
		<lastmod>2022-05-06T03:41:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/ransomware.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/ransomware-and-criminal-cyberthreats-how-to-counter-using-mitre-attck/</loc>
		<lastmod>2022-05-17T03:17:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/05/cyber-security-hub.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/attackiq-ceo-reveals-how-to-achieve-an-assume-breach-mindset/</loc>
		<lastmod>2022-06-08T17:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/Brett-CEOWorld-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/the-best-form-of-defense/</loc>
		<lastmod>2022-06-23T23:31:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/col-pr-ross-brewer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-experts-are-bracing-for-major-cyberattacks/</loc>
		<lastmod>2022-07-05T04:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/a-red-black-and-white-illustration-of-a-computer-screen-with-a-lock-on-it.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/channel-4s-the-undeclared-war-cyber-fact-or-tv-fiction/</loc>
		<lastmod>2022-07-06T05:13:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/undeclared-final-1-750x375-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-becomes-first-breach-and-attack-simulation-provider-to-secure-authority-to-operate-from-the-united-states-army/</loc>
		<lastmod>2022-08-17T13:01:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/08/col-pr-us-army.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-study-finds-edr-controls-in-customer-environments-only-stopped-top-seven-adversary-techniques-39-percent-of-the-time/</loc>
		<lastmod>2022-09-14T15:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-pr-edr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-grows-leadership-team-with-appointment-of-george-tomic-as-chief-development-officer/</loc>
		<lastmod>2022-09-21T13:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-pr-edr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/biden-wants-to-reboot-americas-cyber-defenses/</loc>
		<lastmod>2023-03-02T13:13:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-ns-foreign-policy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-breach-and-attack-simulation-as-a-service/</loc>
		<lastmod>2023-03-30T12:56:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-pr-ready.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-now-available-in-the-microsoft-azure-marketplace/</loc>
		<lastmod>2023-04-04T14:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/col-pr-mfst-azure-mp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-to-deliver-breach-and-attack-simulation-solutions-to-government-agencies-through-four-inc-s-gsa-schedule/</loc>
		<lastmod>2023-06-06T16:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-pr-edr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-new-products-that-democratize-testing-for-everyone/</loc>
		<lastmod>2023-08-03T12:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-flex-gains-over-10000-new-users/</loc>
		<lastmod>2023-08-08T14:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-flex-helps-organizations-improve-security-posture/</loc>
		<lastmod>2023-11-07T14:02:20+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/flex-pr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/mm-isac-and-attackiq/</loc>
		<lastmod>2023-11-29T13:55:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-pr-mmisac.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-appoints-new-vice-president-of-business-development/</loc>
		<lastmod>2024-02-06T14:01:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-pr-rupen-shah.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-becomes-first-bas-provider-to-secure-cato-from-the-mcrc/</loc>
		<lastmod>2024-02-08T13:58:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-pr-usmc-cato.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/2023-impact-report/</loc>
		<lastmod>2024-02-13T16:51:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-wp-mitre-impact-report-2023.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-launches-new-mssp-partner-program/</loc>
		<lastmod>2024-03-05T14:09:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-pr-mssp.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-unveils-ready-2/</loc>
		<lastmod>2024-03-21T12:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-pr-ready-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-partners-with-cyber-poverty-line-institute/</loc>
		<lastmod>2024-05-06T12:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-pr-cpli.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-academy-launches-online-ai-security-course/</loc>
		<lastmod>2024-05-15T12:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-pr-academy-ai.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-and-trium-cyber-partnership/</loc>
		<lastmod>2024-06-19T13:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-pr-trium.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/introducing-attackiq-mission-control/</loc>
		<lastmod>2024-07-09T12:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-pr-mission-control.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/introducing-flex-2/</loc>
		<lastmod>2024-08-01T12:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-pr-flex-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/introducing-dora-automated-assessments/</loc>
		<lastmod>2024-08-06T12:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-pr-dora-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/introducing-nist-csf-automated-assessments/</loc>
		<lastmod>2024-08-08T12:30:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-pr-nist-csf.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-becomes-first-bas-provider-to-sign-cisa-secure-by-design-pledge/</loc>
		<lastmod>2024-08-27T12:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-pr-cisa-pledge.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-appoints-new-vps/</loc>
		<lastmod>2024-09-10T12:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-pr-vps.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-and-ey-join-forces/</loc>
		<lastmod>2024-10-02T12:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/col-pr-ey.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-and-ai-hosting-hub-join-forces/</loc>
		<lastmod>2024-10-17T12:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/col-pr-ai-hosting-hub.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-available-in-aws-marketplace/</loc>
		<lastmod>2024-11-12T13:50:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-pr-aws-marketplace.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-flex-3/</loc>
		<lastmod>2024-12-03T13:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-pr-flex-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-appoints-paul-craft-as-senior-advisor/</loc>
		<lastmod>2024-12-10T13:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-pr-paul-craft.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-acquires-deepsurface/</loc>
		<lastmod>2025-02-04T12:55:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/02/col-pr-deepsurface.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/academy-enterprise/</loc>
		<lastmod>2025-05-28T13:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-pr-academy-enterprise.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/press-release/attackiq-named-a-cool-vendor-in-monitoring-and-management-of-threats-to-applications-and-data-2017-by-gartner/</loc>
		<lastmod>2025-06-20T18:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/06/ft-pr-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-academy/</loc>
		<lastmod>2025-07-01T21:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ds-attackiq-academy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-flex-datasheet/</loc>
		<lastmod>2025-07-01T21:42:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-ds-flex.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-misson-control/</loc>
		<lastmod>2025-07-01T21:44:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-ds-mission-control.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-products-datasheet/</loc>
		<lastmod>2025-07-01T21:50:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-ds-products.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-ready-datasheet/</loc>
		<lastmod>2025-07-01T21:52:07+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-ds-ready.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-security-validation-service/</loc>
		<lastmod>2025-07-01T21:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ds-svs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/implement-the-prime-ministers-cyber-security-guidance-with-mitre-attck-and-attackiq/</loc>
		<lastmod>2025-07-01T21:56:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ds-mitre-attack-and-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/preactive-partner-overview-for-mssps/</loc>
		<lastmod>2025-07-01T21:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-ds-preactive.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/validating-dod-cmmc-compliance-effectiveness/</loc>
		<lastmod>2025-07-01T22:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-cmmc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/attackiq-vanguard-advantage-ava-service-catalog/</loc>
		<lastmod>2025-07-01T22:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/col-ds-ave.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/industry-brief/the-federal-government-defends-critical-infrastructure-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2025-07-01T22:26:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-ib-federal.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/industry-brief/state-and-local-government-boost-defenses-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2025-07-01T22:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ib-state-and-local-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/industry-brief/the-financial-industry-protects-client-assets-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2025-07-01T22:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ib-financial-industry.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/industry-brief/the-healthcare-industry-secures-sensitive-data-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2025-07-01T22:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ib-healthcare-industry.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/solution-brief/attackiq-and-logrhythm-integration-enables-routine-continuous-testing-and-validation-of-siem-effectiveness/</loc>
		<lastmod>2025-07-02T19:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/attackiq-logrhythm-sb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/solution-brief/cylanceoptics-and-cylanceprotect/</loc>
		<lastmod>2025-07-02T19:32:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-sb-cylance-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/solution-brief/how-attackiq-platform-integrates-with-microsoft-defender-atp/</loc>
		<lastmod>2025-07-02T19:33:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-sb-microsoft-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/solution-brief/palo-alto-networks-and-attackiq/</loc>
		<lastmod>2025-07-02T19:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-sb-palo-alto-networks-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/a-healthcare-technology-company-gains-confidence-in-its-security-through-automated-adversary-emulations/</loc>
		<lastmod>2025-07-02T19:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/col-cs-hctech.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/ahead-of-the-2020-elections-attackiq-is-a-force-multiplier-for-one-states-ciso/</loc>
		<lastmod>2025-07-02T19:37:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-state-blind-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/amerisourcebergen-boosts-cybersecurity-health-through-continuous-testing/</loc>
		<lastmod>2025-07-02T19:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/col-cs-amerisourcebergen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/case-study-esed/</loc>
		<lastmod>2025-07-02T19:44:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/col-cs-esed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/communications-firm/</loc>
		<lastmod>2025-07-02T19:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-communications-firm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/dimensional-fund-advisors/</loc>
		<lastmod>2025-07-02T19:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/col-cs-dfa-security-optimization-at-a-top-asset-manager.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/fortune-50-retailer-relies-on-attackiq/</loc>
		<lastmod>2025-07-02T19:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-cs-fortune-50-retailer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/government-services-contractor-for-dod/</loc>
		<lastmod>2025-07-02T19:51:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-government-services-contractor-for-dod.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/hedge-fund-financial-services/</loc>
		<lastmod>2025-07-02T19:52:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-hedge-fund-financial-services-industry.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/case-study-iss-world-services/</loc>
		<lastmod>2025-07-02T19:53:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/col-cs-iss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/law-firm/</loc>
		<lastmod>2025-07-02T19:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-law-firm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/non-profit-financial-institution/</loc>
		<lastmod>2025-07-02T19:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-non-profit-financial-institution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/case-study/state-and-local-government/</loc>
		<lastmod>2025-07-02T20:02:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-cs-state-and-local-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/six-success-tips-for-new-cisos/</loc>
		<lastmod>2025-07-02T20:31:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/col-rp-6-tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/guides/preactive-cyber-hygiene-the-mitre-attck-dirty-dozen-ttps-by-jose-barajas-and-john-fung/</loc>
		<lastmod>2025-07-02T20:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/apt29-and-threat-informed-defense/</loc>
		<lastmod>2025-07-02T20:42:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/pod-hs-jose-barajas-new.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/best-practices-in-threat-informed-defense/</loc>
		<lastmod>2025-07-02T20:42:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/pod-hs-ben-opel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/fin6-mitre-emulation-plan/</loc>
		<lastmod>2025-07-02T20:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/pod-hs-jose-barajas-new.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/how-to-achieve-cybersecurity-effectiveness/</loc>
		<lastmod>2025-07-02T20:43:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/pod-hs-adam-isles.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/attackiq-and-mitre-attck/</loc>
		<lastmod>2025-07-03T19:08:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/attackiq-breach-and-attack-simulation-platform/</loc>
		<lastmod>2025-07-03T19:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/attackiq-integrates-with-microsoft-defender-atp/</loc>
		<lastmod>2025-07-03T19:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/attackiq-wins-afcea-shark-tank-innovation/</loc>
		<lastmod>2025-07-03T19:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/cybersnacks-ep-1-attackiq-mitre-attck/</loc>
		<lastmod>2025-07-03T19:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-vd-cybersnacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/cybersnacks-episode-2-microsoft-defender-atp/</loc>
		<lastmod>2025-07-03T19:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-vd-cybersnacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/cybersnacks-episode-3-mitre-attck-and-nist-800-53/</loc>
		<lastmod>2025-07-03T19:12:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-vd-cybersnacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/how-the-attackiq-platform-works/</loc>
		<lastmod>2025-07-03T19:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/partnering-with-attackiq/</loc>
		<lastmod>2025-07-03T19:14:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/the-attackiq-security-optimization-platform/</loc>
		<lastmod>2025-07-03T19:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/vd-sop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/what-to-expect-in-the-attackiq-academy-foundations-for-operationalizing-mitre-attck-course/</loc>
		<lastmod>2025-07-03T19:16:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/col-vd-academy-foundation-mitre-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/video/why-choose-attackiq/</loc>
		<lastmod>2025-07-03T19:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-videos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/attackiq-enterprise-co-managed-breach-and-attack-simulation-101/</loc>
		<lastmod>2025-07-15T20:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/attackiq-flex-pcap-replay-you-say-tell-me-more/</loc>
		<lastmod>2025-07-15T20:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-pcap.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/bas-as-a-service-its-true/</loc>
		<lastmod>2025-07-15T20:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-basaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/batton-down-the-hatches-against-emotet-with-attack-graphs/</loc>
		<lastmod>2025-07-15T22:45:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-emotet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/attackiq-flex-boost-your-security-for-free/</loc>
		<lastmod>2025-07-15T22:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-boost.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/cloud-security-done-right-attackiqs-game-plan/</loc>
		<lastmod>2025-07-15T22:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/combating-chinese-threat-actors-with-advanced-attack-graphs/</loc>
		<lastmod>2025-07-15T22:50:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-chinese.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/unwrapping-cybersecurity-confidence-with-attackiq-flex/</loc>
		<lastmod>2025-07-15T22:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-unwrapping.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/emulating-the-iranian-nation-state-threat-group-apt35/</loc>
		<lastmod>2025-07-15T22:54:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-apt35.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/jupyter-notebooks-101-getting-started/</loc>
		<lastmod>2025-07-15T22:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-jupyter-notebooks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/jupyterhub-your-gateway-to-data-adventures/</loc>
		<lastmod>2025-07-15T22:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-jupyterhub.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/how-to-level-up-your-threat-intel-with-attack-flows/</loc>
		<lastmod>2025-07-15T22:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-attack-flows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/measuring-security-control-effectiveness-with-attack-graph-stages/</loc>
		<lastmod>2025-07-15T23:01:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-attack-graph.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/strengthening-your-cyberdefenses/</loc>
		<lastmod>2025-07-15T23:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-strengthening.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/harnessing-chaos-with-multi-test-point-attack-graphs/</loc>
		<lastmod>2025-07-15T23:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-multi-test.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/operationalizing-mitre-attck-with-attackiq-ready-and-enterprise/</loc>
		<lastmod>2025-07-15T23:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-mitre.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/rhysidas-ruthless-ransomware-regime/</loc>
		<lastmod>2025-07-15T23:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-rhysida.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/sigma-attackiq-detection-engineering-for-all/</loc>
		<lastmod>2025-07-15T23:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-sigma.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/test-your-defenses-against-russian-fsb-turla-malware/</loc>
		<lastmod>2025-07-15T23:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-turla.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/attackiq-ready-flex-testing-for-everyone/</loc>
		<lastmod>2025-07-15T23:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-ready.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/breach-and-attack-simulation-with-attackiq-enterprise/</loc>
		<lastmod>2025-07-15T23:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-webinar-v2-bas-with-enterprise.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/consulting-with-attackiq-ready/</loc>
		<lastmod>2025-07-15T23:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-webinar-v2-consulting-ready.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/more-attackiq-content-customization-and-you/</loc>
		<lastmod>2025-07-15T23:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-webinar-v2-content-customization.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/leadership-spotlight-series-cti-blueprints/</loc>
		<lastmod>2025-07-15T23:33:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-cti-blueprints.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/exploring-attackiq-ready-2-0-testing-for-everyone/</loc>
		<lastmod>2025-07-15T23:37:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-webinar-v2-ready-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/foundations-of-ai-security-key-takeaways-from-new-attackiq-academy-course/</loc>
		<lastmod>2025-07-15T23:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-webinar-v2-foundations-ai-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/foundations-of-operationalizing-mitre-attck/</loc>
		<lastmod>2025-07-15T23:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-webinar-v2-foma.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/kibana-meters-gauges/</loc>
		<lastmod>2025-07-15T23:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-webinar-v2-kibana.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/simplifying-security-control-testing-for-small-and-midsize-businesses/</loc>
		<lastmod>2025-07-15T23:50:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-webinar-v2-simplifing-sct-smb.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/unveiling-attackiqs-mssp-partner-program/</loc>
		<lastmod>2025-07-15T23:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-webinar-v2-mssp.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/ransomware-reloaded-breaking-down-2025s-latest-threats/</loc>
		<lastmod>2025-07-16T00:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-webinar-v2-ransomware.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/how-the-board-can-get-involved-with-the-cyber-security-program-and-cisos/</loc>
		<lastmod>2025-07-17T17:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/FT-Specialist.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/purple-teaming/</loc>
		<lastmod>2025-07-17T17:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-uc-purple-teaming.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/red-team-augmentation/</loc>
		<lastmod>2025-07-17T17:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/rs-col-red-team-augmentation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/security-control-technology-validation/</loc>
		<lastmod>2025-07-17T18:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-uc-security-control-technology-validation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/news/threat-emulation/</loc>
		<lastmod>2025-07-17T18:38:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-uc-threat-emulation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/solution-brief/attackiq-flex-solution-brief/</loc>
		<lastmod>2025-07-21T19:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/col-pd-flex.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/datasheet/pdf-seamless-splunk-integration/</loc>
		<lastmod>2025-07-21T19:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/smg-ready.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/next-gen-threat-informed-defense-human-assisted-intelligent-agents/</loc>
		<lastmod>2025-07-21T20:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-webinar-v2-next-gen-tid.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/guides/breach-attack-simulation-101-guide/bas-101-ty/</loc>
		<lastmod>2025-07-21T21:57:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/ready3/</loc>
		<lastmod>2025-07-21T22:05:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/smg-ready3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/hs-joe-mastromarino.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/ctem-vs-traditional-methods/great-exposure-ty/</loc>
		<lastmod>2025-07-21T22:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/enhancing-ctem-with-mitre-attack/enhancing-ctem-ty/</loc>
		<lastmod>2025-07-21T22:16:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/enhancing-ctem-with-mitre-attack/</loc>
		<lastmod>2025-07-21T22:16:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/col-webinar-v2-ctem-ma.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-carl-wright.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/hs-chris-kennedy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/implementing-ctem-a-technical-guide-for-security-teams/implementing-ctem-ty/</loc>
		<lastmod>2025-07-21T22:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/nist-csf-2-0-the-future-of-cybersecurity-risk-management/nist-csf-2-0-ty/</loc>
		<lastmod>2025-07-21T22:24:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/trust-but-verify-adversarial-exposure-validation-for-third-party-risk/trust-but-verify-ty/</loc>
		<lastmod>2025-07-21T22:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/the-strategic-imperative-of-adversarial-exposure-validation-aev/the-strategic-imperative-of-aev-ty/</loc>
		<lastmod>2025-07-21T22:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/the-strategic-imperative-of-adversarial-exposure-validation-aev/</loc>
		<lastmod>2025-07-21T22:32:42+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/02/col-webinar-v2-aev.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-carl-wright.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-jon-baker.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/ebook/mitre-attack-for-dummies/mitre-attack-for-dummies-ty/</loc>
		<lastmod>2025-07-21T23:06:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/ebook/purple-teaming-for-dummies/purple-teaming-for-dummies-ty/</loc>
		<lastmod>2025-07-21T23:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/guides/the-definitive-guide-to-selecting-a-csv-platform/csv-platform-ty/</loc>
		<lastmod>2025-07-22T00:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/guides/the-definitive-guide-to-selecting-a-csv-platform/</loc>
		<lastmod>2025-07-22T00:27:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-definitive-guide-to-selecting-a-csv-platform.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/guides/threat-informed-defense-101-guide/threat-guide-ty/</loc>
		<lastmod>2025-07-22T00:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/using-automated-attack-emulation-for-continuous-cybersecurity-control-validation/automated-attack-emulation-ty/</loc>
		<lastmod>2025-07-22T00:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/validated-zero-trust-101-guide/zero-trust-101-guide-ty/</loc>
		<lastmod>2025-07-22T00:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/your-101-guide-to-countering-ransomware-with-mitre-attck/countering-ransomware-ty/</loc>
		<lastmod>2025-07-22T00:39:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/snapshot-idc-the-business-value-of-attacklq-security-optimization-platform/</loc>
		<lastmod>2025-07-22T19:27:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/attackiq-idc-business-value-snapshot-960x540-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/attackiq-idc-business-value-snapshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/ending-the-era-of-security-control-failure/security-control-failure-ty/</loc>
		<lastmod>2025-07-22T19:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/validation-of-cybersecurity-controls-with-attackiq/continuous-validation-ty/</loc>
		<lastmod>2025-07-22T19:44:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/the-case-for-continuous-security-validation/ponemon-study-ty/</loc>
		<lastmod>2025-07-22T19:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/enterprise-security-remains-reactive-download-the-ponemon-report/cybersecurity-illusion-ty/</loc>
		<lastmod>2025-07-22T19:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/enterprise-security-remains-reactive-download-the-ponemon-report/</loc>
		<lastmod>2025-07-22T19:52:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-rp-enterprise-security-remains-reactive.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/the-case-for-continuous-security-validation/</loc>
		<lastmod>2025-07-22T19:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-rp-continuous-security-validation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/report/validation-of-cybersecurity-controls-with-attackiq/</loc>
		<lastmod>2025-07-22T19:59:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-rp-validation-of-cybersecurity-controls-with-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/a-cisos-guide-to-mitre-attck/cisos-guide-to-mitre-attack-ty/</loc>
		<lastmod>2025-07-22T20:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/a-cisos-guide-to-mitre-attck/</loc>
		<lastmod>2025-07-22T20:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-wp-ciso-guide-to-mitre-attack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/breach-and-attack-simulation-use-cases-with-mitre-attck/breach-and-attack-simulation-use-cases-with-mitre-attck/</loc>
		<lastmod>2025-07-22T20:45:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/cisos-guide-to-leveraging-mitre-attck-in-healthcare-and-public-health/cisos-guide-healthcare-ty/</loc>
		<lastmod>2025-07-22T20:49:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/cisos-guide-to-using-attack-graphs-and-mitre-attck/guide-attack-graphs-ty/</loc>
		<lastmod>2025-07-22T20:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/cisos-guide-to-using-attack-graphs-and-mitre-attck/</loc>
		<lastmod>2025-07-22T20:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/cisos-guide-to-using-attack-graphs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-better-vulnerability-management-using-mitre-attck/guide-vulnerability-management-ty/</loc>
		<lastmod>2025-07-22T20:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-breach-and-attack-simulation/guide-breach-and-attack-ty/</loc>
		<lastmod>2025-07-22T21:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-breach-and-attack-simulation/</loc>
		<lastmod>2025-07-22T21:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-breach-and-attack-simulation-case-studies.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-cybersecurity-readiness/guide-cybersecurity-readiness-ty/</loc>
		<lastmod>2025-07-22T21:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-mitre-attck-for-the-financial-services-sector/guide-financial-services-ty/</loc>
		<lastmod>2025-07-22T21:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-mitre-attck-for-the-financial-services-sector/</loc>
		<lastmod>2025-07-22T21:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/cvr-ciso-guide-ma-fin-serv.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-mitre-attck-in-the-energy-sector/guide-energy-sector-ty/</loc>
		<lastmod>2025-07-22T21:07:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-purple-teaming/guide-to-purple-teaming-ty/</loc>
		<lastmod>2025-07-22T21:09:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-dirty-dozen-ttps/guide-dirty-dozen-ttps-ty/</loc>
		<lastmod>2025-07-22T21:12:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-dirty-dozen-ttps/</loc>
		<lastmod>2025-07-22T21:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-the-dirty-dozen-ttps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-five-toughest-bod-questions/guide-five-toughest-bod-ty/</loc>
		<lastmod>2025-07-22T21:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-five-toughest-bod-questions/</loc>
		<lastmod>2025-07-22T21:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-the-five-toughest-bod-questions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-cloud-security-using-attck/guide-cloud-security-ty/</loc>
		<lastmod>2025-07-22T21:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-security-control-rationalization/guide-security-control-rationalization-ty/</loc>
		<lastmod>2025-07-22T21:19:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-security-control-rationalization/</loc>
		<lastmod>2025-07-22T21:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-security-control-rationalization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-security-optimization-with-attackiq/guide-security-optimization-ty/</loc>
		<lastmod>2025-07-22T21:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-top-cybersecurity-frameworks/guide-cybersecurity-frameworks-ty/</loc>
		<lastmod>2025-07-22T21:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-the-top-cybersecurity-frameworks/</loc>
		<lastmod>2025-07-22T21:24:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-the-top-cybersecurity-frameworks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/adopting-a-threat-informed-defense-with-christopher-frenz/</loc>
		<lastmod>2025-07-22T22:22:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Christopher-Frenz.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Christopher-Frenz.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Christopher-Frenz.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/what-to-know-how-to-prevent-menupass/</loc>
		<lastmod>2025-07-22T22:37:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/pod-hs-jose-barajas-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/pod-hs-jose-barajas-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/pod-hs-jose-barajas-new.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/confronting-the-disinformation-age/</loc>
		<lastmod>2025-07-22T22:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/col-tbdg-ep18-smg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/hs-renee-di-resta.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/hs-renee-di-resta.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/how-to-build-and-scale-a-successful-cybersecurity-company/</loc>
		<lastmod>2025-07-22T22:42:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-tbdg-ep16-sm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/Marcus-Bartram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/Marcus-Bartram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/not-your-normal-ciso/</loc>
		<lastmod>2025-07-22T22:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/tbdg-ep15-sm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/Rob-Hornbuckle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/Rob-Hornbuckle.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/preparing-for-disaster-and-achieving-cybersecurity-readiness/</loc>
		<lastmod>2025-07-22T22:49:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/tbdg-ep14-sm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/Juliette-Kayyem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/Juliette-Kayyem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/the-state-of-the-cyberinsurance-market-today/</loc>
		<lastmod>2025-07-22T22:52:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/col-tbdg-ep17-sm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/hs-josephine-wolff.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/adopting-a-threat-informed-defense-with-attackiq-vanguard/</loc>
		<lastmod>2025-07-22T22:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-think-bad-do-good.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/Uma-Reddy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/Uma-Reddy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/pete-luban-of-dimensional-fund-advisors-on-mitre-attck-and-security-optimization/</loc>
		<lastmod>2025-07-22T22:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/hs-pete-luban.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/hs-pete-luban.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/hs-pete-luban.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/preparing-for-russian-state-sponsored-cyberthreats/</loc>
		<lastmod>2025-07-22T23:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/podcast-flags.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/podcast-flags.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/julia-voo-and-the-national-cyber-power-index/</loc>
		<lastmod>2025-07-22T23:03:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/pod-hs-ep-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/pod-hs-ep-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/pod-hs-ep-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/defending-digital-democracy/</loc>
		<lastmod>2025-07-22T23:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/pod-hs-ep5-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/pod-hs-ep5-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/pod-hs-maria-lynch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/pod-hs-robby-mook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/pod-hs-siobhan-gorman.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/podcast/ransomware-security-readiness-and-resilience/</loc>
		<lastmod>2025-07-22T23:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/hs-ted-harrington.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/hs-ted-harrington.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/hs-ted-harrington.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/the-cisos-guide-to-security-optimization-with-attackiq/</loc>
		<lastmod>2025-07-24T23:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-wp-cisos-guide-to-security-optimization-with-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/trust-but-verify-adversarial-exposure-validation-for-third-party-risk/</loc>
		<lastmod>2025-07-28T23:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-webinar-v2-tbv.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-carl-wright.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/hs-jose-barajas.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/gartner-aev-market-guide/</loc>
		<lastmod>2025-07-29T22:24:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/from-research-to-reality/</loc>
		<lastmod>2025-07-29T23:14:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/smg-from-research-to-reality-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/hs-pete-luban-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-paul-reid.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/ai-vs-ai/</loc>
		<lastmod>2025-07-30T03:24:39+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/smg-ai-vs-ai-clr.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/hs-pete-luban-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/hs-jason-lord-color.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/mind-the-security-gap/</loc>
		<lastmod>2025-07-30T05:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/webinars/ctem-vs-traditional-methods/</loc>
		<lastmod>2025-07-30T14:37:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/smg-exposure-validation-showdown.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/hs-jim-mason.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/resources/white-paper/third-party-risk-violation/</loc>
		<lastmod>2025-07-30T14:40:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/smg-third-party-risk-white-paper-1a.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->