<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://localhost:3000/about</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/alternatives/bolster-alternatives</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/alternatives/checkphish-alternatives</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/blog/best-brand-protection-platforms</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/blog/best-phishing-detection-and-takedown-platforms</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/blog</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/blog/takedown-metrics-that-matter-2026</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/blog/why-centralize-digital-risk-2026</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/case-studies/b2b-saas-phishing-surge</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/case-studies/global-retail-typosquat-response</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/case-studies</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/domain-monitoring-software-vs-managed-service</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/evaluating-brand-protection-platforms</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-bolster</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-brandshield</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-checkphish</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-cloudsek</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-cybelangel</loc>
<lastmod>2026-04-25T08:59:24.738Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-doppel</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-flare</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-netcraft</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-phishfort</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-phishlabs</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-recorded-future</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/comparisons/phisheye-vs-zerofox</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/contact</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/demo</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/documenting-evidence-for-abuse-reports</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/executive-impersonation-response-playbook</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/fake-app-monitoring-brand-programs</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/how-phishing-takedowns-work</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/how-typosquat-detection-works</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/guides/prioritizing-digital-risk-alerts</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/help</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/pricing</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/privacy</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/reports/digital-risk-brief-2026</loc>
<lastmod>2026-04-25T08:59:24.742Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/reports</loc>
<lastmod>2026-04-25T08:59:24.746Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/resources</loc>
<lastmod>2026-04-25T08:59:24.746Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions</loc>
<lastmod>2026-04-25T08:59:24.746Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/terms</loc>
<lastmod>2026-04-25T08:59:24.746Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/trust</loc>
<lastmod>2026-04-25T08:59:24.746Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products/phishing-scam-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products/brand-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products/typosquatting-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products/digital-risk-protection-services</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/products/executive-impersonation-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform/domain-monitoring-takedowns</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform/social-media-monitoring-takedowns</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform/app-store-monitoring-takedowns</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform/dark-web-ai-monitoring</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/platform/automated-takedowns</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions/financial-services</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions/ecommerce</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions/saas</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions/brands</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/solutions/executive-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/digital-risk-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/brand-abuse</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/phishing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/typosquatting</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/bec</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/executive-impersonation</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/takedown</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/lookalike-domain</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/homoglyph-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/domain-monitoring</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/whois-rdap</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/certificate-transparency</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/smishing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/vishing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/credential-harvesting</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/phishing-kit</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/watering-hole-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/malvertising</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/fake-app</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/social-impersonation</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/marketplace-abuse</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/abuse-desk</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/abuse-report</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/evidence-package</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-intel-enrichment</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/recycle-rate</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cybersquatting</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/udrp</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/digital-supply-chain-risk</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/vendor-sla-takedown</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/account-takeover-fraud</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/advanced-persistent-threat</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/ai-in-threat-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/anti-money-laundering</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/botnet</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/brand-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/brand-threat-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/ceo-fraud</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/computer-emergency-response-team</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/credential-stuffing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/credit-card-monitoring</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cyber-fusion-center</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cyber-risk-monitoring-and-digital-threat-monitoring</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cyber-security-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cyber-threat-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/cyberattack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/dark-web</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/data-breach</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/data-broker</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/data-leak</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/ddos-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/decision-intelligence-platform</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/deep-web</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/digital-executive-protection</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/disinformation-and-misinformation-in-threat-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/dissemination-of-intelligence-data</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/dns-spoofing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/email-spoofing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/extended-detection-and-response</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/external-threat-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/finished-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/five-eyes</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/fraud</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/fraud-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/geopolitical-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/geopolitics</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/hacktivism</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/identity-fraud</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/impersonation-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/incident-response-team</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/indicators-of-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/indicators-of-compromise</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/information-sharing-and-analysis-centers</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/insider-threat</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/intelligence-analysis-software</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/intelligence-cycle</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/intelligence-requirements</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/kinetic-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/know-your-customer</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/machine-learning</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/malware</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/man-in-the-middle-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/mitre-att-and-ck-framework</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/open-source-security-intelligence-osint</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/operational-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/osint-collection-plan</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/paste-sites</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/penetration-testing</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/personally-identifiable-information</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/pharming</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/physical-security-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/priority-intelligence-requirements</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/protective-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/ransomware</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/remote-code-execution</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/reputational-damage</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/secops-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/security-information-and-event-managment</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/security-operations</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/shadow-it</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/soar</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/social-engineering</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/specific-intelligence-requirements</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/stix-taxii</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/strategic-political-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/supply-chain-attack</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/tactical-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/third-party-risk</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-actor</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-hunting-team</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-intelligence-feed</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-intelligence-lifecycle</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/threat-intelligence-platform</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/trademark-monitoring</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/ttps</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/unified-risk-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/unstructured-data</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/vulnerability-analysis</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/vulnerability-intelligence</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/vulnerability-scanning</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
<url>
<loc>http://localhost:3000/glossary/whaling</loc>
<lastmod>2026-04-25T08:59:24.745Z</lastmod>
</url>
</urlset>
