<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.threatngsecurity.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/09f14197-5f7a-40a2-8cb3-e3bd35231f38/ThreatNG+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings+Blog</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/mapping-external-vulnerabilities-dpdpa-statutes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/axios-attack-connectorless-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/agentless-dpdpa-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/defending-identity-perimeter-stryker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/brand-monitoring-tool-lying-security-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/unauthenticated-discovery-neutralizing-2026-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/reddit-zero-day-multi-vector-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/web3-risk-quantification-brand-damage-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/stop-translating-cve-decisive-security-insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/c-suite-identity-reclamation-prophylactic-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/brand-protection-certainty-control-restored</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/preemptive-control-human-attack-surface-neutralization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/web3-extortion-trap-proactive-brand-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/reddit-discovery-strategic-risk-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-reconnaissance-equalizer-triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/linkedin-discovery-mitigation-mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/licensing-shell-game-eliminated</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/unified-external-risk-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/security-no-connectors-no-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/security-without-intrusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/defeat-ai-clone-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/anatomy-exposed-service-account</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/94cb0f4f-1f8a-40d6-9ab6-614b02ef5f89/Attacker+Gathering+External+Intelligence</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>“… unseen adversary, patiently gathering intelligence on your organization…”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/110a5f32-adbb-41d4-a2db-6f6020bf13f0/Non+Human+Identity+NHI+Email+Service+Account</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>“billing-svc@yourcompany.com—a critical service account for the finance department… Non-Human Identity (NHI)”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/25319bdf-3c65-48ff-b5f0-2af04da4668c/Adversary+External+Attack+on+NHI+Email+Service+Account</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9ae909c2-c47a-4e05-9106-b5dfd2a05b4e/Security+Analyst+NHI+Non+Human+Identity</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>“… Sarah, a sharp security analyst…”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d41d68b5-bc04-487e-97e6-2340650c488b/Security+Analyst+Non+Human+Identity+NHI+Email+Service+Account</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fd2b5156-a050-4dd1-9b03-52f9f2d2d2f0/Security+Analyst+Non+Human+Identity+NHI+Email+Service+Account</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/72ca5ed6-397c-4c02-aa83-aa1d77002191/External+Adversary+Access+Denied</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62655e4f-aee8-4d2c-a918-b6b876818b25/Security+Analyst+Non+Human+Identity+NHI+Email+Service+Account</image:loc>
      <image:title>Blog - Anatomy of an Attack: A Story of an Exposed Service Account and a Cyber-Hero - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/exposed-service-accounts-non-human-identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatngsecuritycom/blog/brand-protection-domain-permutations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/vetting-partners-domain-permutations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/proactive-easm-domain-permutation-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/expanding-qsa-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pci-grc-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pci-scope-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pci-qsa-hidden-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pci-dss-supply-chain-extended-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2424587b-79a9-42e3-89fd-35f497592c45/PCI+DSS+Requirements+and+Supply+Chain+Relevance</image:loc>
      <image:title>Blog - PCI DSS and The Supply Chain: Unmasking Your Extended Risk with ThreatNG - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/072cc6e4-c515-4fdc-8f6c-4a3845bfdd3c/ThreatNG+Capabilities+Mapping+to+PCI+DSS+Supply+Chain+Compliance</image:loc>
      <image:title>Blog - PCI DSS and The Supply Chain: Unmasking Your Extended Risk with ThreatNG - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/no-connectors-means-unparalleled-external-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pci-dss-compliance-external-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/assessing-and-prioritizing-api-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-third-party-security-maturity-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/proactively-securing-the-api-frontier</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-asset-inventory-for-cybersecurity-audits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-vulnerability-assessment-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/api-documentation-landscape-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/positive-security-indicators-for-cybersecurity-audits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cloud-and-saas-security-external-auditing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/fortify-security-with-positive-indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/pentesting-efficiency-with-threatng-security-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/mitigating-external-supply-chain-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/security-ratings-easm-and-digital-risk-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/easm-digital-risk-investigation-modules</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/subdomain-intelligence-for-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/mssp-subdomain-infrastructure-exposure-empowerment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/world-economic-forum-2025-cybersecurity-concerns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/bug-bounty-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/risk-intelligence-with-darcache-8-k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/darcache-intelligence-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/canadian-cyber-centre-assessment-2025-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/owasp-top-10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/exposed-apis-and-the-owasp-top-10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/new-york-state-cybersecurity-requirements-with-threatng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/reasons-cybersecurity-pros-are-thankful-for-threatng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00684e4b-6267-4d1c-8a5e-fc4a2fbcdb70/10+Reasons+Why+Cybersecurity+Pros+Are+Thankful+for+ThreatNG</image:loc>
      <image:title>Blog - Ten Reasons Why Cybersecurity Pros Are Thankful for ThreatNG - Check out the playlist on YouTube!</image:title>
      <image:caption>youtube.com/@threatng</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/microsoft-entra-security-why-the-outside-view-matters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/integrate-external-discovery-for-complete-api-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/enhanced-security-visibility-with-threatng-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/easm-beatdown-on-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d00880d1-2210-40a2-a43f-e0d10141fc94/Beatdown+on+Ransomware%3A+How+EASM+is+Dropping+the+Bass+on+Cyber+Threats</image:loc>
      <image:title>Blog - Beatdown on Ransomware: How EASM is Dropping the Bass on Cyber Threats - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/unmasking-the-shadows-a-fourth-wave-ska-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d8c27e1b-b600-4444-a0c8-42edfcf3e4d1/Unmasking+the+Shadows%3A+A+Fourth+Wave+Ska+Playlist</image:loc>
      <image:title>Blog - Unmasking the Shadows: A Fourth Wave Ska Playlist - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-tech-landscape-a-garage-rock-revival-soundtrack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/82e7d73f-9120-4794-80fa-23a778e80e39/Screenshot+2024-10-16+at+4.20.40%E2%80%AFPM.png</image:loc>
      <image:title>Blog - Unlocking the External Tech Landscape: A Garage Rock Revival Soundtrack - Unlocking the External Tech Landscape:</image:title>
      <image:caption>A Garage Rock Revival Soundtrack (YouTube Playlist)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/ransomware-monitoring-game-changer-in-proactive-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/predictive-risk-prioritization-redefines-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-third-party-tech-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/kool-thing-for-easm-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7c42b271-6ab0-4cd3-a146-83429a3fe4d9/Cut+Through+the+Noise+of+Cyber+Threats%3A+ThreatNG%27s+%27Kool+Thing%27+for+EASM</image:loc>
      <image:title>Blog - Cut Through the Noise of Cyber Threats: ThreatNG's 'Kool Thing' for EASM - Cut Through the Noise of Cyber Threats:</image:title>
      <image:caption>ThreatNG's 'Kool Thing' for EASM</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/wave-of-mutilation-pixies-inspired-playlist-for-modern-cybersecurity-challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6c28660f-563c-44ac-8f70-b5bee8f89b47/Wave+of+Mutilation%3A+Sweeping+Risks+Off+Your+Digital+Landscape+%28A+Pixies-Inspired+Playlist+for+Modern+Cybersecurity+Challenges%29</image:loc>
      <image:title>Blog - Wave of Mutilation: Sweeping Risks Off Your Digital Landscape (A Pixies-Inspired Playlist for Modern Cybersecurity Challenges) - Wave of Mutilation:</image:title>
      <image:caption>Sweeping Risks Off Your Digital Landscape (A Pixies-Inspired Playlist for Modern Cybersecurity Challenges)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-deep-dive-into-the-latest-enisa-threat-landscape-report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/holistic-easm-with-mitre-attack-across-all-industries</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a4daf186-e6a5-443a-830e-b559039dbe45/MITRE%2BATT%26CK%2BExternal%2BAttack%2BSurface%2BManagement%2BEASM%2BDigital%2BRisk%2BProtection%2BDRP%2BSecurity%2BRatings%2BCybersecurity%2BRisk%2BRatings.png</image:loc>
      <image:title>Blog - Holistic External Attack Surface Management with MITRE ATT&amp;amp;CK: Strengthening Security Across All Industries with ThreatNG - Make it stand out</image:title>
      <image:caption>threatngsecurity.com/mitre-attack</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/weezer-guide-to-mitre-attack-and-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cd4c1ca5-d41f-4407-96fc-ffdd258507a6/Screenshot+2024-09-14+at+9.49.13%E2%80%AFAM.png</image:loc>
      <image:title>Blog - Undone (The Cybersecurity Song): Weezer's Guide to MITRE ATT&amp;amp;CK and External Attack Surface Management - Undone (The Cybersecurity Song): Weezer's Guide to MITRE ATT&amp;CK and External Attack Surface Management</image:title>
      <image:caption>YouTube Playlist</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cisa-fy23-rva-report-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/proactively-mitigate-cyber-threats-with-threatng-and-the-mitre-attack-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/beats-and-bytes-a-soundtrack-for-securing-microsoft-entra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/52570d52-2fe6-4bbb-b78d-fcff64996c6d/Beats+Bytes+Cybersecurity+Playlist</image:loc>
      <image:title>Blog - Beats and Bytes: A Soundtrack for Securing the Entra Kingdom - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/domain-intelligence-microsoft-entra-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/industrial-techno-playlist-for-threat-hunters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-harvests-emails-to-supercharge-threat-hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/ambient-electronica-for-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/enhanced-threatng-risk-scoring-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/saas-security-beastie-boys-mixtape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-saas-attack-surface-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/progressive-metal-for-cybersecurity-professionals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/technology-stack-categorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/industrial-music-web-application-security-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/web-application-firewall-identification-fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cybersecurity-sec-filings-punk-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cybersecurity-sec-filings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/playlist-for-mobile-app-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/mobile-app-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/reggae-inspires-a-new-era-of-risk-management-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/security-reputation-esg-threat-intelligence-sentiment-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/manchester-wave-web-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-and-your-current-web-application-defenses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/ransomware-cybersecurity-battle-anthems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/wrestling-ransomware-and-beyond-with-threatng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/ransomware-intelligence-inspired-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/ransomware-intelligence-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/supply-chain-third-party-exposure-playlist-powered-by-rush-yes-elp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/green-lantern-supply-chain-and-third-party-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/industrial-and-new-wave-playlist-inspired-by-subdomain-takeover-and-web-application-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/subdomain-takeover-web-application-hijack-susceptibility-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/maximizing-security-investments-hiphop-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/maximizing-security-investments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/data-leak-susceptibility-bruce-springsteen-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/xmas-rock-metal-cybersecurity-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aed3bc1f-e754-41d3-93bb-71e9e6ff71d3/YouTube+Christmas+Playlist</image:loc>
      <image:title>Blog - CyberSonic Xmas: A Rock and Metal Armor for Festive Cybersecurity - YouTube Playlist</image:title>
      <image:caption>YouTube</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/data-leak-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threat-exposure-management-inspired-ska-and-punk-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threat-exposure-management-enhancing-cybersecurity-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/brazilian-jiu-jitsu-threatng-ransomware-report-capabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1699653469346-4HM07W6QGDW531N5CHDX/Ransomware+Report+-+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings</image:loc>
      <image:title>Blog - Defending the Digital Arena: A Brazilian Jiu-Jitsu Approach to Tackling Ransomware with ThreatNG's Report Capabilities - Make it stand out</image:title>
      <image:caption>Ranswomare Report</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-security-ratings-to-assess-and-mitigate-threats-event-technology-ecosystem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/bec-and-phishing-susceptibility-security-ratings-neuromancer-ghost-in-the-shell-watchmen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/thanksgiving-cybersecurity-playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/brazilian-jiu-jitsu-approach-to-cyber-risk-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/due-diligence-correlation-evidence-questionnaire-in-private-equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threat-intelligence-repositories-event-technology-industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-security-and-cybersecurity-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/leveraging-susceptibility-and-exposure-ratings-for-private-equity-firms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/securing-event-technology-ecosystem-threatng-investigation-modules</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/private-equity-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/strengthening-event-technology-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cybersecurity-insights-for-private-equity-portfolio-companies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/fortifying-private-equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/overlooked-areas-of-investigation-exposed-code-repositories-paste-sites-and-web-archives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/incident-response-and-forensic-services-easm-drp-security-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-attack-surface-management-easm-assess-for-subdomain-takeover-and-web-application-hijacking-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/mdr-security-control-management-and-threat-hunting-with-threatng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/evaluating-data-leak-susceptibility-with-external-attack-surface-management-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/enhancing-offensive-security-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/are-you-capable-of-detecting-and-protecting-against-cyberthreats-phishing-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cloud-and-saas-in-external-attack-surface-management-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/empowering-cybersecurity-services-easm-drp-security-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/evaluating-your-entire-external-digital-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cloud-and-saas-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/33102f25-8f74-4daf-ac4f-274382b38fdb/Web_Blog_Post_3.jpg</image:loc>
      <image:title>Blog - ThreatNG Cloud and SaaS Discovery Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cloud-and-saas-easm-module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/free-evaluation-agentless-cloud-and-saas-discovery-and-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/third-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/external-subdomain-content-discovery-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/subdomain-takeover-susceptibility-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1659384059170-UAAZ4NWW6PQ14F7N1OC7/TNG_SUBDOMAINTAKEOVERICON_FINAL_CLRBLK.png</image:loc>
      <image:title>Blog - Subdomain Takeover Susceptibility Assessment for Digital Risk and External Attack Surface Management - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/layoff-chatter-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/risk-is-risk-and-risk-is-contextual</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/saas-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/95492413-1b35-40d3-a640-a61c002add7a/SaaS+Discovery+Digital+Risk+Protection+External+Attack+Surface+Management</image:loc>
      <image:title>Blog - SaaS Discovery Unlike Any Other: SaaSqwatch - SaaSqwatch</image:title>
      <image:caption>SaaS Quantification &amp; Watch Discover sanctioned, unsanctioned (Shadow IT), and look-alike (SaaSquatting) SaaS applications.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/third-party-risk-questionnaires-and-security-risk-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/cyber-risk-appetite-definition-scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/functional-assets-pillars-external-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e7ba84-6f24-42ae-bc77-f3436f7c87ab/SECURITYCENTRIC_TECHICON-01.png</image:loc>
      <image:title>Blog - Functional Assets &amp;amp; Pillars - Make it stand out</image:title>
      <image:caption>Technical</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2d597497-347b-4046-a422-f5864c4934e1/SECURITYCENTRIC_STRATEGICICON-01.png</image:loc>
      <image:title>Blog - Functional Assets &amp;amp; Pillars - Make it stand out</image:title>
      <image:caption>Strategic</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b0eee7b9-843d-4e10-af73-ce87cae558c5/SECURITYCENTRIC_OPSICON-01.png</image:loc>
      <image:title>Blog - Functional Assets &amp;amp; Pillars - Make it stand out</image:title>
      <image:caption>Operational</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1792a5a5-a3b1-483d-983c-f47181245420/SECURITYCENTRIC_FINANCIALICON-01.png</image:loc>
      <image:title>Blog - Functional Assets &amp;amp; Pillars - Make it stand out</image:title>
      <image:caption>Financial</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/threatng-threat-and-risk-analysis-tar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/what-is-the-technical-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/what-is-the-business-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-1-domain-information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-2-social-media</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-3-sensitive-code-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-4-search-engine-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-5-cloud-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-6-online-text-sharing-repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-number-seven-sentiment-and-financials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-8-archived-web-pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-9-dark-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-ten-10-technology-stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osint-top-10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-02-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/osintpoll</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/open-source-intelligence-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/darcsightlabs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/security-centric-not-security-exclusive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/we-are-the-protector-of-nouns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1599004694774-769PN7NVME26LYP2HVGS/PON_GRAPHIC_FINAL-01.png</image:loc>
      <image:title>Blog - We are the Protector of Nouns</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/what-is-up-with-that-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1599004589169-Q9N2JU4GBK299AV7CSQ1/LOGOwBG-01.png</image:loc>
      <image:title>Blog - What is the Story with that Name?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/from-out-of-the-dark-web-and-into-the-holistic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-04-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1599004129044-44UA93QLKZWOQAVH6TRB/image-asset.jpeg</image:loc>
      <image:title>Blog - From out of the Dark (Web), and into the Holistic</image:title>
      <image:caption>Stuff</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Brand+Damage+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Critical+Event+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/DRP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Continuous+Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Ransomware+Intelligence+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Active+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/ESG+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Governance+Risk+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cybersecurity+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Digital+Presence+Threat+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Subdomain+Takeover+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Subdomain+Content+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Data+Leak+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Risk+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cybersecurity+Risk+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/DRPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cybersecurity+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/SaaS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Technical+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Digital+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Supply+Chain+and+Third+Party+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Web+Application+Hijack+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Business+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Brand+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Third+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/ASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/BEC+and+Phishing+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Attack+Surface+Map</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/TaR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Intelligence+Repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Breach+and+Ransomware+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Situational+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/External+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Services+Empowerment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Threat+and+Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Top+Ten+List</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Open+Source+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/category/Cyber+Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Nine+Inch+Nails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Amazon+Web+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Rock</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Punk+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Differentiated+Capabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Green+Lantern+Corps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supplier+Security+Reviews</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Deep+Fake+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/LinkedIn+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/World+Economic+Forum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Source+Code+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ambient+Electronica</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Facing+Misconfigurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reddit+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sensitive+Code+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Certainty+and+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Management+Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Rock+On+With+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Path+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Single+Source+of+the+Truth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tech+Stack+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Budget</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Clarity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Threat+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Perimeter+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Defensive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Technical+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Forensics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Archive+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Security+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/InfoSec+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/No+Agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Protect+Your+Crown+Jewels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Finance+for+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Manchester+Soundscapes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Exposed+Code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Forensic+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Legal+Liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+App+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Source+Intelligence+Top+Ten</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/PasstheHash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tech+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Investments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Operational+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Content+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ethical+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Rocks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Consultancy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Sabotage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hack+the+Beat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DNS+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Archived+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/C-Suite+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Leadership</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Brand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevOpsVulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/BEC+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Breach+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Metadata+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Targeted+Assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Unauthenticated+Scan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hidden+Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Continuous+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/David+Bowie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Tolerance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Industrial+Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/AI+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Hero</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DNS+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Music+Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Proactive+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Login+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Healthcare+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Technical+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Private+Equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OperationsSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Licensing+Games</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Exploit+Dictionary+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Service+Level+Agreement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Shadow+Hunters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Susceptibility+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Due+Dilligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Jam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Breach+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reggae+for+Change</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Reclamation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Source+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Qualified+Security+Assessor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tool+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+API+Specification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Continuous+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Google+Tag+Manager</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Transformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hack+the+Planet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Business+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/India+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Conscious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Red+Teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Skanking+Good+TIme</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mobile+App+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SwaggerHub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Asset+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sustainable+Sounds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DFIR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ska+Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Quantitative+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Exploit+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Journey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/HUMINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Investment+Strategies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DArk+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Peace+of+Mind</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Correlation+Evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Well+Being</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Infosecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Metal+for+Nerds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Awareness+Training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/PCI+DSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Information+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mergers+and+Acquisition+Planning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Front+242</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Safe+Ticketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Administrator+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Prog+Metal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Resources</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DRP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/BEC+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NodeJS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Spear+Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Event+Management+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Anticipation+Relief</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Account+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Service+Provider+Policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Content+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Value+Creation+in+Private+Equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DigitalPresenceThreats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/APIs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Music+and+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/HIPAA+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Time+Saving</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Misconfiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Comprehensive+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Technical+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Employee+Sentiment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Consultancy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevOpsSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sonic+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Driven+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MFA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/More+Than+An+App</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ground+Truth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Soundtrack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Enterprise+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Pastebin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Dark+Web+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Financial+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Certificates+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tailored+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Defense+Beats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Rock+n+Roll+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SPVM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Unseen+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subsidiary+Security+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bing+Dorks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Vibes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reconnaissance+Hub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Per+Asset+Pricing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Continuous+Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Source+Code+Access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ManInTheChair</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Microsoft+Entra+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Software+as+a+Service+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DigitalThreats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Qualitative+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Productivity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Passive+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Admin+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MDR+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IAM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Continuous+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+App+Warriors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Attention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SecurityCentricNotExclusive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Government+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Drip+Feed+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DarcSightLabs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Board+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Event+Tech+Industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/QSA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Pricing+Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Efficiency+in+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Metal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Initial+Access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Presence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Precursor+Malware+Infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Regulations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Driven+Decisions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Amplified+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/PCI+v4</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Budget+Clarity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Agentless+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/RIsk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/InfoSec+Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Surface+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Critical+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Security+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Efficiency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Zero+Day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Breach+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Budget</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ENISA+Threat+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SEC+Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Managed+Service+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cname</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Whaling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bloodhound+Analysts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Major+Lazer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Infection+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/National+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Yes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OPSEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Insider+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Complexity+Over+Clarity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Trust+and+Business+Enablement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Shadow+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Application+Links</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Auditor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Symphony</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Joy+Division</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Contamination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Layoff+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit+Efficiency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Edge+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Situational+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability++Illuminated</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Connectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CAASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/GCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Agent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevOpsIssues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/High+Fidelity+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNGSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ProtectorOfNouns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Human+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Analysis+Burnout</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Belle+and+Sebastian</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Electronic+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Thanksgiving</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NIST+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Defense+Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Deep+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Source+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Credentials+Conundrum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Repository+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG+Music</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Gaps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OSINT+Top+10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Pricing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NSFW+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Beats+for+Bytes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Deepfake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Adversary+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Crosby+Stills+Nash+Young</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Securities+and+Exchange+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Licensing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyberwarfare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Enterprise+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Risk+Questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit+Findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Armor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Holistic+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Trust+Deficit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Damage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Dashboards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CyberResilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Fourth+Wave+Ska</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Hardcore</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reduce+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Presence+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Kool+Thing+for+EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Boardroom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Archive+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Holistic+Coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Adversary+Centric+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Canadian+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevSecOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Public+Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+and+Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Justice+Anthems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Key+Risk+Indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Compromised+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Buying</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Prophylactic+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MITRE+ATT%26CK</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Takeover+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SecOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Global+Unity+Vibes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Warriors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Software+as+a+Service+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Offensive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Queen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Appetite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Risk+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Information+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Secrets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/MSSP+Growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/WarGames</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Moods</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Simplicity+in+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mobile+Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Email+Security+Gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Nirvana</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Non+Human+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit+Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/AppSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Threat+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NIST+Framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit+Evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/HTML+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Secuirty+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Rush</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Human+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Loss+Aversion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Techno</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Financial+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Secure+Event+Industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Beastie+Boys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leak+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Proactive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hidden+Fees</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Stage+Dive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Unified+Domain+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DigitalPresence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tech+innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OSINT+Poll</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Decentralized+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Golden+Age+Hip+Hop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Archive+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/fintech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Awareness+Reggae</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DarcSight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Music+and+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Fragmentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Employee+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/HTTP+Errors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Archive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Dark+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Foothold+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Pricing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ITVRM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+RIsk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Streamline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Secure+Your+Future</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Fiduciary+Duty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Predictive+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/App+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/High+Fidelity+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Incident</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bruce+Springsteen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Common+Vulnerabilities+Exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Databases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hijacking+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Safety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SQLi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Zero+Deployment+Friction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CISA+Report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Service+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Transformation+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Google+Cloud+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Storage+Buckets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Conscious+Reggae</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Public+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG+Tunes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SSPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Customization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Enterprise+Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DarCache</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Listening</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Zero+Hour+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Misconfigurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Certificates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ELP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Taking+Control+Tracks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Complexity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Correlated+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reddit+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/KYC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Lawsuit+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Outside-In+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Infection+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Admin+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Search+Engine+Dorks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+App+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Event+Tech+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OpenAPI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reputation+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Skinny+Puppy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Insider+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Proactive+Security+Beats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Documentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Stay+Safe+Online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DJ+Un-G</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Email+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/VPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyberattack+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tag+Management+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CyberSecInsights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Online+Sharing+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Outside-In+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Grooves</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Device+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Onboarding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Operations+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Blind+Spots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Management+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/TMS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/The+Beatles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Investor+Confidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ENISA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Leak+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Critical+Event+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Preemptive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Audits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Anthems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Ners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/LOTL+Techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Security+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Endpoint+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DPDPA+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG+Thanksgiving</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/VRM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Email+Soofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Continuous+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Technology+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Incident+Response+Coordination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/TLD+Swaps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Dork+Searching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Pentesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Email+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Signal+to+Noise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Katrina+and+the+Waves</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Unmasking+The+Shadows</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Asset+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Revolution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+ROI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Soundtrack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Rock+Your+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Based+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Healthcare+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ERM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Name+Permutations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Infosec+Inspiration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Justification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Red+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Private+Equity+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Authorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Blindspots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Proactive+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Business+Impact+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Garage+Rock+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Protection+Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Economy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Code+Access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Google+Dorks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Guitar+Solo+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Content+Filtering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Health+Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hacking+Community</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sourcing%2C+Procurement%2C+and+Vendor+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Riding+Mower+Records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/publicdatasecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Audit+Ready</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Golden+SAML</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Strategies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/TPRM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Microsoft+Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bug+Bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Mitigation+Strategies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mitre+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Application+Errors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Vendor+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Revolutionize+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Breach+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Functional+Areas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Online+Safety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Credential+Stuffing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Exfiltration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Defense+Soundtrack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NHI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Credential+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+App+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Software+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bruno+Mars</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/BEC+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Erros</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Simplicity+and+Ease+of+Use</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Depeche+Mode</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Find+Your+App+Anthem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Operational+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Accountability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DPBI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Dust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Governance%2C+Risk%2C+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Auditing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mr.+Robot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Websight+Archives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Intrusion+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Attack+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Information+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sneakers+Movie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Hackers+Gonna+Hate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Fraud+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Software+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Gloria+Gaynor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SEC+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leak+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Weezer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Breach+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Methods+of+Infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Threat+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG+Sounds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CVE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/VPNs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CyberBeats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Resource+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Paste+Site+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ska+Meets+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Blue+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG+Tune+Up</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Search+Engine+Exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Private+Equity+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/New+Order</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Intelligence+Led</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Application+Hijack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DDoS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ASN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ASV</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Beyond+the+Perimeter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG+Investing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Business+Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Healthcare+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NIST+Cybersecurity+Framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyberthreats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Pixies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NY+Hospitals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DevOpsSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/AI+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Archived+Web+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Business+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Beyond+Perimeter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Strategic+Advantage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Forensic+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybercrime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/No+Connectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/App+Store+Adventure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Consolidation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Advisory+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Open+Source+Intelligence+Poll</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Yazoo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Exfilitration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internal+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Info+Tech+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Archives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Financial+Loss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Dictionary+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Technical+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Threat+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ThreatNG</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Johnny+Nash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DNS+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Web+Application+Hijack+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SEC+Filings+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Tech+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DPDPA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/NPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Protection+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sonic+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Fraud+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Incident+Response+Planning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Rebellion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Financial+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface+Map</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OpenSourceIntelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Centric+Not+Security+Exclusive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leakage+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/KMFDM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/opendatasecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DMARC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Proactive+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Developer+Environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Pentesting+Tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Infrastructure+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Soundscapes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Secure+Live+Streaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Environmental+Social+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyberinvestigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Subdomain+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ransomware+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Shadow+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Axios+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Managed+Security+Services+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Comprehensive+Security+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Risk+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Portfolio+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Extortion+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Facing+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Brand+Abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SEC+Filings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Investment+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/WAF+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Executive+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Future+Focused+Tracks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Internet+Facing+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Industrial+Techno</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Transparency+and+Clarity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mitigation+Mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/SaaS+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Github</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Development+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Text+Sharing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Sentiment+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Activism+Playlist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/DRPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cybersecurity+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Guardians</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Employee+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phishing+Scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Rockstars</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Dorks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Grooves</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Narrative+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Machester+Wave</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Governance+Risk+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/CISO+Life</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vulnerability+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Pricing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Unified+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+RIsk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/State+Sponsored+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Service+Dependency+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Present+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Paradox+of+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Bug+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Vendor+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Identity+and+Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/IT+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/PCI+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Azure+AD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Finance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyberpunk+Rock</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Secure+Coding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Storage+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Consolidation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Preemptive+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cut+Through+the+Noise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Ministry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Vendor+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Exposure+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/InfoSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Attack+Dictionary+Building</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Mitigate+Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Asset+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Reputational+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Domain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Watch+Watch+Dog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Emails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Regulatory+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Sounds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Threat+Insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Phone+Numbers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Git</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Mosh+Pit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/The+Prodigy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Paste+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/ESG+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Digital+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Social+Media</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Data+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/TEM+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/PE+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Budget</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Operational+Insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Curated+by+You</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+as+a+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Business+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/External+GRC+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Consulting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Corporate+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Third+Party+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Spin+Doctors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/JamesBondQ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Organizational+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Purple+Teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Music+and+Tech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Security+Maturity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Industrial+Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/OWASP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cloud+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Empowering+Beats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/blog/tag/Cyber+Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-as-intent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/verifiable-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/structural-precursors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/the-so-what-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-for-revops</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prescriptive-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-to-opportunity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/signal-as-a-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-pulse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intent-mirage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-led-growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/structural-telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-informed-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/disinformation-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering-attack-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-trust-erosion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/invisible-data-exfiltration-paths</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-first-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-external-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phaas-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/synthetic-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-domain-takedown-evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sec-form-8-k-cyber-reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/machine-identity-sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ghost-service-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/false-positive-tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/score-auditor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/recursive-unauthenticated-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-grc-evidence-streams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/knowledge-base-leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentic-framework-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentic-ai-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vector-database-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mcp-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-infrastructure-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-partner-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/qdrant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/playwright-mcp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ollama</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nextjs-mcp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/n8n</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/milvus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mcp-inspector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lm-studio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/litellm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/langflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/highbyte</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/general-sse-mcp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-mcp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/duckdb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/moltbot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/clawdbot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/anythingllm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-saas-visibility-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-tech-stack-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-saas-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unsanctioned-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/log-sync</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/alien-txtbase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sherlock1ubot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bugatti-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mfa-bypass-techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/primary-refresh-token</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-token-theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-stealer-log-ingestion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/credential-leak-channels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/telegram-log-clouds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/starlink-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/red-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/omega-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cuckoo-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/moon-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/observer-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pixel-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/daisy-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-bolstering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/forensic-refutation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/black-box-penalty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/context-blind-scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/algorithmic-misattribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-scanning-limitations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-insurance-premium-optimization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-rating-dispute-process</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-misinterpretation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-misattribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/misattribution-of-responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-protection-as-a-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/misconfigured-aws-s3-bucket-scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-google-cloud-storage-finder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-azure-data-lake-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-cloud-bucket-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-choke-points</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-reconnaissance-advantage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-ai-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-exhaust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-evidence-generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/registrar-evidentiary-friction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pre-emptive-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/takedown-tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-protection-oem-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/online-brand-protection-automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/managed-takedown-service-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-intelligence-api-for-mssp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobsf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/client-side-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cnapp-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/white-labeled-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconftw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rengine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/archerysec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easyeasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pivot-point</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-certainty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-governance-standard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/transparent-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/primary-source-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/democratized-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shame-as-a-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-scavenger-hunt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/black-box-fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-centric-not-security-exclusive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/global-cyber-governance-commons</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-reconnaissance-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-domain-digital-dna</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/primary-source-risk-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/verifiable-tprm-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-source-esg-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-choke-point-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-shadow-it-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentless-cloud-exposure-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connectorless-saas-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saasquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/visibility-chasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connector-trap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc-assessment-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/forensic-evidence-packaging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decision-ready-verdicts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/probability-paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connector-fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-convergence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/protector-of-nouns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-blind-spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/opsec-fails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentless-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-perspective-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/llm-supply-chain-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-ai-asset-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/incident-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internal-phishing-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-source-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pointer-and-validator-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decision-ready-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-architect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/silo-effect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/claims-based-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-confidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-perimeter-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-risk-certainty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-control-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pre-audit-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/personal-liability-for-cisos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/qualified-opinion-anxiety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/scope-creep-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/audit-surprise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it-liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/evidence-based-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it-audit-exceptions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-soc-2-evidence-collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/audit-ready-external-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-for-soc-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-soc-2-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-soc-2-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fiduciary-liability-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connector-tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/green-dashboard-fallacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-dpdpa-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it-dpdpa-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-dpdpa-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentless-vulnerability-scanning-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-audit-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-management-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-fiduciary-obligations-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-personal-data-protection-act-checklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dpdpa-compliance-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dpdpa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-centric-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cross-platform-identity-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/handle-squatting-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-persona-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-username-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/blackarch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/parrot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sherlock</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/kali</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/aircrack-ng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/grype</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/metasploit-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/john-the-ripper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hydra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/beef</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/soapui</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zap-by-checkmarx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-path-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/workflow-transformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zombie-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-attribution-engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-aware-cmdb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-truth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/discovery-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-footprint-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-cmdb-integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-cmdb-reconciliation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cmdb-reconciliation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/xspm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extended-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/active-exposure-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/confidence-architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/recursive-iterative-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-narratives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-risk-mitigation-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitable-paths</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/manual-triage-saturation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-narrative-modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dzone-security-zone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/the-hacker-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/wired-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-boulevard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bleepingcomputer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/the-register-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/graham-cluley</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/techrepublic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/schneier-on-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dark-reading</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/krebsonsecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/welivesecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/the-guardian-information-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/packet-storm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/software-composition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitable-path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/choke-point</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/multi-stage-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-string</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploit-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/chained-relationships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/combined-exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/linked-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pivot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/chained-findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-actor-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-arsenal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tooling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/step-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-stage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/kill-chain-phase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/step-action</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-tactics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-narrative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/path-description</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploit-path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-scenario</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/path-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-attack-path-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-hyper-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/right-of-the-boom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/left-of-the-boom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-cyber-kill-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-external-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-exploitability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-narrative-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/regulatory-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-driven-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/boardroom-ready-attribution-reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-attack-risk-contextual-hyper-analysis-insights-narrative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-contextual-attack-path-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-risk-shield</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-warfare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-nhi-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/claims-based-assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operational-remediation-mandates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/legal-financial-data-fusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-path-choke-points</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/verifiable-control-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliant-yet-vulnerable-paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-cloud-bucket-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-control-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/correlation-evidence-questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/context-engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-security-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromised-credentials-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certainty-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-exposure-security-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dasr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/denial-of-wallet-dow-exposure-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identity-exposure-for-llm-agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-technology-stack-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-model-theft-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-vector-database-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proprietary-prompt-template-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/leaked-ai-agent-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-bucket-poisoning-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-supply-chain-vendor-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-ai-training-data-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-prompt-injection-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nist-least-functionality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nist-boundary-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromised-credentials-dark-web-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/control-invalidation-loop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-blind-spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nist-800-53-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-monitoring-nist-800-53</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fedramp-ato-readiness-assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/underestimated-ato-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-technical-vulnerability-management-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-27001-supply-chain-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-27001-external-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-27001-control-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-27001-configuration-failure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/iso-27001-access-control-failure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-adversary-view-for-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-for-iso-27001</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-protection-assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-mandates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-exposure-enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/claims-based-attestation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/precision-driven-digital-risk-questionnaires</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-to-audit-translation-layer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-ai-models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-prompt-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/misconfigured-ai-endpoints</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unmanaged-ai-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nist-800-53-external-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/leaked-llm-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/leaked-ai-api-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/generative-ai-endpoints</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/genai-security-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-vector-database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/easm-for-genai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-protection-for-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-ai-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-training-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-supply-chain-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-model-footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-agent-drift</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-agent-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/grc-liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-account-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-score-for-non-human-identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/purely-external-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/programmatic-identity-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identity-risk-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-exposure-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-application-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/invisible-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hardcoded-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/devops-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/code-repository-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-credential-leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-key-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/agentless-security-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc-assessment-continuous-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-digital-presence-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/controlled-dark-web-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/false-positive-validation-time</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-rating-ambiguity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/crisis-of-context-in-cyber-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-violations-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sec-form-8-k-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exception-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customizable-and-granular-risk-configuration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/strategic-context-injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/irrefutable-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/irrefutable-supply-chain-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/multi-source-data-fusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sec-form-8-k-filing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/crisis-of-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hidden-tax-on-the-soc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attribution-chasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-certainty-deficit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hybrid-saas-discovery-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hybrid-saas-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-grc-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/legal-grade-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-saas-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saasqwatch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-driven-social-engineering-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customgpt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gospace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/metatrust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/read-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-hour-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-identity-portfolio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extortion-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fraud-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intellectual-property-leakage-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/username-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/precursor-intelligence-indicator</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-empathy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/objective-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/expected-loss-avoided</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-intelligence-fabric</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-identity-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unmanaged-shadow-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/loss-aversion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-driven-financial-raids</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/market-value-suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malicious-authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-voice-clone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-native-brand-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/initial-access-vector-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-awareness-training-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-led-edr-enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-led-mfa-enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/targeted-profile-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bec-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-media-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/merger-and-acquisition-security-risk-agility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/preventing-initial-access-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ineffective-social-engineering-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unquantified-human-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lack-of-external-employee-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering-reconnaissance-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-attack-surface-delta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prophylactic-registration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-summary-impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/defensive-domain-registration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prophylactic-domain-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-domain-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prophylactic-registration-mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-contamination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-damage-susceptibility-reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-reclamation-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance-equalizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nsfw-identity-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-extortion-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance-defense-phase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gi-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-media-username-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/velocity-paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-financial-materiality-reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-public-distress-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lawsuit-to-lure-risk-translation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/disjointed-risk-reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-information-blind-spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unmanaged-public-distress-as-a-lure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-materiality-grade</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-risk-correlation-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-legal-record-vetting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-distress-attack-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bec-lawsuit-lure-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-reputational-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-domain-squatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-negative-news-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adverse-media-vetting-automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-confidence-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputational-risk-quantification-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-centric-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/blockchain-domain-enforcement-challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-proactive-blocking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-permutations-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/board-oversight-of-cyber-risk-metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sec-8-k-cyber-incident-trigger</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-materiality-determination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fiduciary-duty-of-care</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/validated-exposure-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cdasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/context-driven-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dangling-dns-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cost-of-inaction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/historical-reconnaissance-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/long-term-market-value-suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-impersonation-fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance-gap-closure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-resilience-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-authenticity-collapse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-vulnerability-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reddit-security-monitoring-for-enterprises</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-phishing-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pre-breach-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc-compliance-evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering-risk-quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unified-external-risk-shield</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/targeted-reconnaissance-neutralization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decisive-security-insight-for-unstructured-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decisive-security-insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pre-compromise-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-social-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-risk-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/system-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/source-code-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lookalike-domains-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/infection-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/credential-dump-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/initial-access-broker-targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/initial-access-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/it-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/databases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-communications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/conversational-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-identity-crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-adversary-view</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputational-contamination-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-precursor-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-led-control-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gather-victim-identity-information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/travel-and-lifestyle-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-and-messaging-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shopping-and-e-commerce-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/news-and-information-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gaming-and-entertainment-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/forum-and-community-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/finance-and-business-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-and-mail-services-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/development-and-tech-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dating-and-adult-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/creative-and-portfolio-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/archiving-and-utilities-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-validation-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-remediation-orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-based-security-priority-engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem-program-reporting-and-oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem-remediation-mobilization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem-validation-and-prioritization-metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem-scoping-and-discovery-automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-view-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dspm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-threat-exposure-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/marketing-and-sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hosting-and-content-delivery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/finance-and-payments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/general-it-productivity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-certificate-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/devops</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-products</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/elevenlabs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pinecone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/langchain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gpt-trainer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gentrace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cassidyai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/weights-and-biases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/stability-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/openai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hugging-face</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cohere</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/anthropic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-ml-miscofiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-ai-readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mlops-security-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-model-exposure-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-ai-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-ai-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ai-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/machine-learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/artificial-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-digital-risk-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-erp-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/erp-zero-day-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/erp-supply-chain-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-erp-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/oracle-ebs-external-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/architectural-foresight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/architectural-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/networking-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/impersonation-scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/frontline-fraud-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/early-scam-warning-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/early-fraud-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak-scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/advanced-threat-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/url-based-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/counterfeit-fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-transposition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-omissions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-substitutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threat-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/real-world-exploit-scenarios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/verified-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-proof-of-concept-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proof-of-concept-exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-day-exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-trend-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/preemptive-vulnerability-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-exposure-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-vulnerability-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/autonomous-risk-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-kill-chain-visualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextualized-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-relationship-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-identity-unification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-graph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-actor-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-remediation-tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-vulnerability-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-risk-scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/national-vulnerability-database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nvd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploit-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/common-vulnerability-scoring-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cvss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-landscape-awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitability-prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/epss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-posture-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-breach-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-exposure-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-discovery-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-rating-drilldown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-aware-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/black-box-security-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attacker-centric-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unauthenticated-asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-attack-surface-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-exposure-contextualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/progressive-footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attacker-centric-asset-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/autonomous-attack-surface-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-input-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/seedless-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rogue-mobile-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rogue-mobile-apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-cyber-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compliance-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/evidence-based-audits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-audit-findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connectorless-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-audit-readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-auditing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/information-disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unintended-api-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-exposure-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/managed-swaggerhub-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-api-footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-exposure-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-definition-harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-documentation-retrieval</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-endpoint-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-api-surface-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-associated-api-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/openapi-specification-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-specification-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/swaggerhub-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/swaggerhub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/app-store-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/marketplace-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/evidence-based-risk-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/initial-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/integrated-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rating-transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/evidence-based-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-security-measures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-hardening</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-reduction-efficacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-control-effectiveness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attacker-relevant-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/out-of-band-indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/in-band-indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/observable-security-characteristics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-control-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/positive-security-indicator</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-hardening-recommendations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromise-session-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-vulnerability-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-session-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-session-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-prioritization-for-session-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-session-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-session-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-protection-for-session-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-hijacking-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/session-takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unified-external-threat-surface-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-cyber-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-risk-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malicious-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deceptive-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fraudulent-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/imitation-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/clone-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fake-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/spoofed-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-attack-path-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-attack-path-visualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-driven-attack-path-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-pathway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-path-simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-path-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-chaining</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-vector-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privilege-escalation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lateral-movement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitability-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/general-governance-and-ethical-breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/safety-and-security-violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/healthcare-compliance-violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/government-contracting-irregularities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-misconduct</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/environmental-violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/labor-and-employment-violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/consumer-protection-violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/anticompetitive-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/credentialless-external-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-footprint-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-cyber-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-external-security-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-external-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-threat-intelligence-for-external-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/autonomous-system-number</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover-scanner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e9488a9-58f2-46b6-8e87-5d4cc46a2517/Subdomain+Takeover+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Subdomain Takeover Scanner - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technical-data-sheets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/beyond-perimeter-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-external-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/metadata-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ctem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authorization-bearer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/artifactory-password</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/artifactory-api-token</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/amazon-aws-access-key-id</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-mobile-app-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-attack-surface-reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/app-store-scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/in-app-secret-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/credential-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/8-k-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/appcake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/abandoned-asset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/abandoned-digital-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/access-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/active-directory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/10-q-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/active-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/10-k-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/access-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/account-takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/acquisition-life-cycle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/acquisition-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/activerecon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/activity-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-exploit-insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-threat-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/actionable-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/active-subdomain-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/admin-pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/administration-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/advanced-persistent-threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-emulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/advocate-marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversarial-exposure-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/8-k-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-exposure-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/adversary-centric-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/aha</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ahmia-dark-web-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/amass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/amazon-appstore</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/amplitude</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/analytics-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/analytics-and-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/apkcombo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/apkpure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-attack-surface-management-aasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-authorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-security-testing-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-lifecycle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/appdb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-programming-interface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/appbrain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-detection-and-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/api-security-testing-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-data-exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-marketplaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-security-hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/application-layer-denial-of-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/aptoide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/app-stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/apple-app-store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/archived-web-pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/approved-scanning-vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/arin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asana</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-business-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-classification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-types</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asset-inventory-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/asv</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authentication-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attestation-of-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authentication-authorization-tokens-and-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authentication-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authentication-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authentication-tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authorization-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-identity-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/authorization-tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/atlassian</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-complexity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-interaction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-path-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-expansion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attackers-eye-view-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automatic-https-redirect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/availability-impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/automated-security-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/axonious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/azure-active-directory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/azure-ad-connect-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bamboohr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bitsquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bfsi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/black-seo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/black-hat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/blind-spots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/board-cybersecurity-oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/board-oversight-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/box</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-and-phishing-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-and-reputation-damage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brandfolder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brandjacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-impersonation-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-misuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-monitoring-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-protection-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/brand-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/breach-and-attack-simulation-bas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/breach-readiness-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/breach-notification-clause-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-authentication-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-object-level-authorization-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-function-level-authorization-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-access-controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-object-property-level-authorization-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/broken-user-authentication-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-intelligence-and-data-analytics-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/attack-surface-control-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bruteforce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/buffer-overflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bug-bounty-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bug-bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/bug-bounty-award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/burp-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-impact-analysis-bia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/business-software-and-operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/caasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cassandra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cde-attack-surface-inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cde-exposure-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cdp-carbon-disclosure-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate-authority-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate-transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/certificate-transparency-logs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-additions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-insertions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-repetition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/character-replacements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cidr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/clear-site-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/clickjacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-access-security-broker-casb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-account-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-and-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-based-code-sharing-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cmdb-enrichment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-based-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-based-presentation-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-exposure-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-jacking-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-misconfiguration-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-misconfiguration-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-policy-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-security-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-service-configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloud-sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloudflare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cloudsquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-management-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cname-record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cnapp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/codename-scnr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/code-leak-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/code-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/code-snippet-repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/collaboration-and-productivity-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/collaborative-code-hosting-platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/communication-and-collaboration-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/communication-and-marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromise-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/configuration-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/consequence-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextual-content-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-management-and-collaboration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-distribution-platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-asv-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-external-pci-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-hipaa-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-security-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-third-party-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/control-directives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromised-employees</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/coep</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/command-injection-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cookie-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cve</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/communication-platform-configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/competitive-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/comprehensive-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/compromised-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/confidentiality-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-delivery-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/connective-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/consumer-protection-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-security-policy-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-and-design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-filtering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-management-and-collaboration-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/confidentiality-impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/configurable-digital-presence-assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/content-security-policy-csp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextualized-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-external-compliance-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-gdpr-readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-vendor-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/contextualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-threat-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/continuous-threat-exposure-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/coop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/core-javascript</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/corp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/corporate-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/corporate-governance-sec-def-14a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/corporate-social-responsibility-disclosure-csrd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/corporate-social-responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/crisis-communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cross-site-scripting-xss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customer-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/counterfeit-market-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customer-relationship-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customer-service-and-support-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/customer-support</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/crawlers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/credential-exposure-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/critical-event-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/criticality-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/critical-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cross-site-request-forgery-csrf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/crunchbase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cryptojacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cspm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/common-vulnerabilities-and-exposures-cve</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/custom-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cve-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cve-severity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybercriminal-groups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybercriminals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-incident-reporting-for-critical-infrastructure-act</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-appetite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-ethics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-risk-quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-asset-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-frameworks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-debt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-due-diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-impact-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-risk-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-risk-forecasting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersecurity-transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cybersquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/cyber-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dapp-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dark-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dark-web-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dark-web-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dark-web-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-analytics-and-observability-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-backup-and-recovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/database-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/database-exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-breach-response-plan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-classification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-driven-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-exfiltration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-processing-addendum-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leakage-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-leak-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-loss-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-masking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-autonomous-organizations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-domain-name-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/decentralized-top-level-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/development-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ddos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/denial-of-service-dos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deep-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deep-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deep-web-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/def-14a-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/default-ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/defamatory-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-cache-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/denial-of-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/diamond-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-detritus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dependency-confusion-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deprecated-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0c8e2ccd-3d41-4c4d-81d3-7a9fba5ba3b2/Deprecated+Security+Headers+Subdomains</image:loc>
      <image:title>Glossary - Deprecated Headers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/deprecated-x-xss-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/development-environment-configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/development-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dictionary-additions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-typo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-asset-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-brand-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-ecosystem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-due-diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-extortionists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-footprint-integrity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-presence-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-presence-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dora</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-footprint-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-attack-surface-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-presence-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-foresight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-posture-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-risk-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/digital-supply-chain-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/directory-traversal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/disinformation-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dmarc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dnp3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-configuration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fdfaf239-5bf2-4ecf-9af0-4c6d269c0b09/DNS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - DNS Enumeration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-health</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fdfaf239-5bf2-4ecf-9af0-4c6d269c0b09/DNS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - DNS Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-record-types</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dnstwist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dns-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dnssec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-name-squatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-parking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-registrar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-shadowing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-spoof-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-stuffing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-suffixing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-tasting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/double-materiality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-name-front-running</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/doppelganger-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/domain-name-permutations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/double-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/doxware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/duo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-application-security-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-attack-surface-reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-entity-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-presentation-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/dynamic-risk-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ecommerce-and-payment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ecosystem-wide-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ecosystem-risk-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/edgar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-address-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5329074-b92c-4bcf-9cab-6e891dc95e4b/Email+Address+Enumeration+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Email Address Enumeration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/elasticsearch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-address-prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5329074-b92c-4bcf-9cab-6e891dc95e4b/Email+Harvesting+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Management</image:loc>
      <image:title>Glossary - Email Harvesting - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-address-harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6660c8d7-2dfc-42dc-8aec-e2980148cb06/Email+Address+Harvesting</image:loc>
      <image:title>Glossary - Email Address Harvesting - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-scraping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-security-gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-security-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/emerging-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enisa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/email-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/employment-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/encrypting-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/endpoint-management-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/endpoint-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-resource-planning-erp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/engagement-and-retention-sec-10-k-hcm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/entra-id</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/enterprise-risk-management-erm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/environmental-sustainability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ephemeral-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/epp-status-codes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ethereum-name-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ethercat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ethernet-industrial-protocol</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-compensation-sec-def-14a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-webcams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-sec-def-14a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ethical-data-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-offense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exploitable-ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/executive-compensation-sec-10-k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/excessive-data-exposure-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/event-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-admin-panels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-ics-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-cloud-storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-email-addresses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/emails-exposed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-internal-asset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-open-cloud-buckets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-remote-access-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-sensitive-ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-voip-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposed-web-interfaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/exposure-management-for-popia-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extended-attack-surface-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extended-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-blindness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extended-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-surface-quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-attack-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-cde-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-due-diligence-assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-gdpr-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-grc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-control-effectiveness-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-gdpr-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-pci-control-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-hipaa-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-identity-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-pci-gap-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-pci-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threat-surface-readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-ips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-risk-alignment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threat-landscape-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threat-landscape-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threat-alignment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/external-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/extortion-groups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/false-positives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fake-dapps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fedramp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/file-inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/file-inclusion-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/financial-attack-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/first-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/foreign-influence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/forensic-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/form-4-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fourth-party-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fourth-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/forward-looking-statement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/frictionless-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/fully-qualified-domain-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ftp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/funding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr-audit-blind-spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr-data-leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr-fines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gdpr-to-vulnerability-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/general-it-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ghostbin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ghost-dns-record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ghost-sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/github</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/github-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/github-gist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/github-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/golden-saml-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-dorking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-play</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-tag-manager</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-tag-manager-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-tag-manager-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-tag-manager-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/google-tag-manager-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/government-contracting-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/graphql-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/graph-based-entity-resolution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/greenhouse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/green-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/grc-governance-risk-and-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/grc-drift-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/grc-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/gri-global-reporting-initiative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/guided-digital-presence-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hackable-subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hackers-perspective</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/real-time-digital-presence-snapshot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/healthcare-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hidden-subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hipaa-blind-spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hipaa-data-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hipaa-security-rule-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-digital-footprint-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-digital-presence-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/homoglyphs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/homoglyph-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-resources-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hybrid-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hybrid-it-infrastructures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hsts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/html</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/interconnected-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/http-gateways</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/holistic-vulnerability-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internal-process-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/http-response-splitting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-capital-management-disclosure-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-rights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/http-strict-transport-security-hsts-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-resources-software-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hyphenations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/human-capital-management-sec-10-k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-and-access-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/idn-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-centric-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-exposure-gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-threat-hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/improper-inventory-management-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/imap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/impact-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/infection-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/incident-response-plans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/information-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/industrial-control-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/infostealer-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/information-disclosure-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/infostealer-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/infostealer-kits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/incident-response-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/indicators-of-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/injection-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internet-facing-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/in-scope-bug-bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/integrated-threat-intelligence-ecosystem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/integrated-digital-presence-reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/insufficient-lifecycle-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/insecure-design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-led-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/incident-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/intelligence-x</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internet-facing-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internet-facing-misconfigurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internet-facing-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/internet-of-things</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ip-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/insider-threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/it-operated-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/it-service-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ivre</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/jamf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/js-javascript</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/json</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/jsp-jakarta-server-pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/javascript-frameworks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/javascript-graphics-libraries</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/javascript-libraries</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/key-risk-indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/leaklookup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/known-exploited-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/kustomer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/landing-page-builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lawsuit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/leakware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/lg-content-store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/living-off-the-land-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/local-file-inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/looker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/machine-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mail-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malspam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malicious-open-directories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malware-operators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malvertising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/managed-service-provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mass-assignment-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/masscan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/material-cybersecurity-incidents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mdr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/memory-corruption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/microsoft-entra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/microsoft-power-pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/microblogging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/misconfiguration-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mitm-proxy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mitre-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-impersonations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-marketplaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-device-management-mdm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-security-testing-mast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-app-distribution-platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mobile-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mode</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/monday</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mongodb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/mysql</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/name-server-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/namesquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/networking-and-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/network-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/next-gen-easm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/narrative-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/neo4j</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/network-security-hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/networked-security-cameras</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-email-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-email-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nhi-email-roles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nis-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nmap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/no-code-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/no-code-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-encrypting-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-fungible-tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identity-abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identity-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/no-waf-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/87e71781-50b9-47b8-aa34-2580348d80e0/Web+Application+Firewall+Discovery+and+Identification</image:loc>
      <image:title>Glossary - No WAF Detection - Make it stand out</image:title>
      <image:caption>Web Application Firewall Discovery and Identification</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nth-party-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/nth-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/oauth-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/oauth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/official-app-stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/okta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/onedrive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/onion-search-dark-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/online-brand-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/online-code-pad</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e3a36299-b096-4961-b572-00aafc00b0d1/Online+Sharing+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+DRPS</image:loc>
      <image:title>Glossary - Online Code Pad - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/online-paste-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/code-snippet-sharing-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/online-reputation-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-access-management-consoles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-redirect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operational-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-source-security-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-source-investigative-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/open-source-business-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operational-technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operations-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operational-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operation-cronos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/opsec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/oracle-database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/oracle-database-cluster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/orphaned-dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/osb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outdated-subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/out-of-scope-bug-bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-gdpr-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/outside-in-risk-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/non-human-identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/owasp-top-ten</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unsafe-consumption-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/owler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pagerduty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/passive-dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/passive-reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/organizational-readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pass-the-hash-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/password-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pastebin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/patch-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-pci-attack-surface-reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-dss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-asv</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-attack-surface-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-credential-impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-external-posture-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pci-prioritized-external-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/payment-data-leakage-pathways</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/payment-ecosystem-risk-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/personal-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pgp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-kit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/platform-specific-identifiers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/polyglot-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/popia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/popia-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/popia-compliance-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/port-scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/popia-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/portfolio-website-builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/post-acquisition-security-integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/postgresql</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/post-breach-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/pre-acquisition-security-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/precursor-malware-infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-ransomware-analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-risk-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/predictive-risk-modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/preemptive-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/preemptive-digital-forensics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prezi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/primary-source-collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prioritized-non-web-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privacy-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/private-ip-address</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/private-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privco</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privileged-access-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-external-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privilege-escalation-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/privilege-escalation-flaws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/product-experience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-compliance-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-cyber-threat-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-ransomware-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-drp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-digital-risk-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-hipaa-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-supply-chain-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-threat-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proactive-threat-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proximity-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/project-management-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/prompt-injection-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/proof-of-concept</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/protected-health-information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-relations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-facing-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cf1a3c5e-31f3-4598-b48d-3407c2d73065/Public+Facing+Infrastructure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Public-Facing Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/public-facing-payment-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ptaas-penetration-testing-as-a-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/publicly-accessible-dvr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/permissions-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/python</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-exposure-scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e6dc71e9-e7b3-45c3-b436-5fc53f685ddd/Ransomware+Resilience+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Ransomware Resilience - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/quantitative-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/qualitative-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/hacktivists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-events-and-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-exposure-coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-exposure-footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-recovery-assistance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-infection-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-vulnerability-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-vulnerability-warning-pilot-rvwp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rasp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ransomware-readiness-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rating-efficacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/regulatory-fragmentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-code-execution-rce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rdp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/real-world-exploitability-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-access-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-access-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/redis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-file-inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-code-execution-rce-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-work-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/replay-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/headless-server</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/referrer-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/remote-access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rpc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputation-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputation-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputation-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reputation-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/restful-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/responsible-disclosure-facilitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/response-code-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/reverse-whois</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-and-oversight-disclosures-sec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-appetite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-appetite-orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-open</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-minimalist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-flexible</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-cautious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-averse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/php</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/insecure-direct-object-references-idor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/insecure-deserialization-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/identity-threat-detection-and-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/incident-response-acceleration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/integrity-impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-assessment-questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-based-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/phishing-susceptbility-insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-based-vendor-due-diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-based-vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-calibration-engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-factors-sec-10-k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-management-sec-def-14a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ldap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-operations-center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-posture-orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/risk-tolerance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/robotstxt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rogue-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rogue-mobile-app</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/root-cause-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/root-main-domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rpc-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rsync</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/rtsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/s3-bucket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/s3-bucket-namesquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-misconfiguration-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-misconfiguration-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-policy-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-policy-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/message-spoofing-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-security-posture-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/methods-of-infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-security-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/saas-squatting-saasquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/safety-esg-violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/salesforce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sanitized-dark-web-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sasb-sustainability-accounting-standards-board</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sbom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/scareware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/scope-3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/scribd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/script-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/scope-based-vulnerability-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/screen-locker-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/search-engine-and-advertising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/second-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/section-19-external-controls-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/section-22-incident-preparedness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/secure-coding-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ssh</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/secure-payment-application-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-awareness-training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-incident-response-coordination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-metadata</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-misconfiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-posture-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-researcher</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/security-testing-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/securitytxt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/secrets-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sentiment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sensitive-code-exposure-digital-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sensitive-information-disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-account-email-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sensitive-information-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-account-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-account-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-account-key-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-key-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-dependency-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-level-agreement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/servicenow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/service-provider-security-policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/server-side-request-forgery-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/seo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shadow-it-visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sharepoint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shared-responsibility-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/shodan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/similar-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/siem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/single-pane-of-glass-digital-presence-view</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/situational-awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/slack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sla-cybersecurity-clause</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/snmp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/snowflake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/soap-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/smtp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/slideshare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/smb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/smart-contract-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/soar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/social-responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/software-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/software-attack-surface-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/software-distribution-platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/spear-phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/splunk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/spoof-mobile-app-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sql-injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sql-server</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ssl-security-sockets-layer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ssl-tls-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ssrf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/stakeholder-communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/stale-subdomain-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/status-communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/strategic-attack-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/strategic-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/strategic-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/stale-dns-entry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/streaming-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-content-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90e37230-100c-455f-b479-927c1572f307/Subdomain+Enumeration+and+Analysis+EASM+External+Attack+Surface+Management+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Subdomain Enumeration and Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-redirection-investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-redirection-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-redirect-tracing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-status-verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subdomain-takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e9488a9-58f2-46b6-8e87-5d4cc46a2517/Subdomain+Takeover+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Glossary - Subdomain Takeover - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/subsidiary-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supplier-assurance-questionnaires</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supplier-security-reviews</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-detection-and-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-due-diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-ransomware-exposure-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-security-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-threat-landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/supply-chain-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sustainable-application-development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/surface-web-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/survey-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sustainable-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sustainable-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/sustainability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/system-utilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tactical-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tailored-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/targeted-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tcfd-task-force-on-climate-related-financial-disclosures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technical-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technical-attack-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technical-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technology-email-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/text-sharing-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/text-snippet-repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/data-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/technology-stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-app-stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-due-diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-pci-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-security-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/third-party-vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/ot-iot-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-actors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-exposure-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-horizon-scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-informed-vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-intelligence-platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-intelligence-enrichment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/threat-vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tld-swapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tld-impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tld-swap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tls-transport-layer-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tlsssl-certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/topology-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/topology-security-understanding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/torch-dark-web-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/toxic-combinations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/txt-text-file-document</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tradecraft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/traffic-direction-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/translation-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/trusted-relationship-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tutuapp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unknown-unknowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unrestrictive-access-to-sensitive-business-flows-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unclaimed-dns-record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unrestricted-resource-consumption-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unpatched-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/unprotected-admin-interfaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/uptodown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/url-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/token-theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/securities-and-exchange-commission</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/validated-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/validated-vulnerability-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-concentration-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-managed-assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/upnp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-onboarding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-remediation-collaboration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-risk-profiling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vendor-security-rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/venture-capital</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/video-conferencing-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/visual-deception</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/virtual-private-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vnc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vowel-substitution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vowel-swap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-probe</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/operational-attack-vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-scanners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-severity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/vulnerability-reporting-channel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/user-activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/waf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/87e71781-50b9-47b8-aa34-2580348d80e0/Web+Application+Firewall+WAF+Discovery+and+Identification</image:loc>
      <image:title>Glossary - WAF - Make it stand out</image:title>
      <image:caption>Web Application Firewall Discovery and Identification</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/waf-fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92bc8912-48b4-4a9d-bc58-06f4b6447263/WAF+Fingerprinting</image:loc>
      <image:title>Glossary - WAF Fingerprinting - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-specific-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-specific-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/couchdb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web3-domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-application-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/weak-credentials-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-application-firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-application-hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-application-security-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-archive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/website-builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/website-spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/web-skimming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/wef-world-economic-forum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/whaling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/wildcard-dns-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/wildcard-domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/website-control-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/website-defacement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/whois</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-11</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/word-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/wordpress</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/workday</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/work-operating-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/x-content-type-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/x-content-type-options</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/x-frame-options</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/x-frame-options-headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/xml-extensible-markup-language</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/x-permitted-cross-domain-policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zilliqa-blockchain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-day-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zero-trust-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zmap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zombie-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zombie-dns-record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zone-transfer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/zoom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/A</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/B</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/C</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/D</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/E</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/F</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/Active+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/G</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/ARIN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/H</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/I</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/J</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/K</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/L</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/M</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/N</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/O</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/P</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/Q</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/R</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/S</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/T</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/U</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/V</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/W</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/X</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/category/Z</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ServiceNow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DEF+14A+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Name+Front+Running</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Regulatory+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Port+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zombie+DNS+Record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IT-Operated+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tag+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Account+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Endpoint+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/No-Code+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TutuApp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MySQL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat-Informed+Vulnerability+Management+%28TIVM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tailored+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compliant-Yet-Vulnerable+Paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT+DPDPA+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Private+IP+Address</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Compensation+%28SEC+10-K%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Extortionists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Identity+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Top+Level+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Assessment+Questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JSON+%28JavaScript+Object+Notation%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromised+Employees</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SEO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Out-of-Band+Indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitable+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hidden+Subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MDR+%28Managed+Detection+and+Response%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IT+Service+Management+%28ITSM%29+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Public+Distress+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Doxware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threat+Landscape+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Leaked+AI+Agent+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero-Input+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attacker-Centric+Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TechRepublic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Claims-Based+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sentiment+and+Financials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sensitive+Information+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tech+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prezi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Infection+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tooling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Bolstering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extended+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Relations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Oracle+EBS+External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Lookalike-Domains+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reconnaissance+Defense+Phase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DoS+%28Denial+of+Service%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+API+Surface+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SoapUI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Targeted+Reconnaissance+Neutralization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Scope+3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Risk+Forecasting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CMDB+Enrichment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM-to-Audit+Translation+Layer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Ransomware+Exposure+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLD+Swap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fake+dApps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SLA+Cybersecurity+Clause</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+ICS+Devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Definition+Harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Secure+Payment+Application+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GitHub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CouchDB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Verifiable+Control+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Word+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Risk+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Resources+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credential-less+External+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Excessive+Data+Exposure+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Monitoring+NIST+800-53</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploit+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Level+Agreement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Targeted+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud-based+Code-Sharing+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reconnaissance+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Exhaust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Workday</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Leaked+AI+API+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Multi-Source+Data+Fusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Translation+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Targeted+Profile+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deprecated+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Aha</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Address+Prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Networked+Security+Cameras</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/POPIA+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hacktivists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Application+%28dApp%29+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Marketplace+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Strategic+Attack+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hybrid+IT+Infrastructures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Identity+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/uptodown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity-Centric+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Trust+Erosion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SBOM+%28Software+Bill+of+Materials%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Video+Conferencing+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Agent+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NIST+Boundary+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+String</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identity+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Living+Off+the+Land+%28LOTL%29+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SwaggerHub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JAMF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Account+Email+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Discovery+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Access+Security+Broker+%28CASB%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Quantitative+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Availability+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Electronic+Data+Gathering%2C+Analysis%2C+and+Retrieval</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ethical+Data+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/FTP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+DRP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybercriminals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Posture+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Breach+Response+Plan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SEC+8-K+Cyber+Incident+Trigger</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Kali</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Enterprise+MCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI+DSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Pathway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Connectorless+SaaS+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/General+IT+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Corporate+Social+Responsibility+Disclosure+%28CSRD%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Injection+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/X-Frame-Options+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/U.S.+Securities+and+Exchange+Commission+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Internal+Asset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Access+Management+Consoles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Software+Distribution+Platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Masking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hybrid+Environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internal+Process+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+Artificial+Intelligence+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Spoofed+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Customer+Support</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+Access+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JS+%28Javascript%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Evidence-Based+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Access+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Attack+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Content+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Counterfeit+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Kill+Chain+Phase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Consequence+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vector+Database+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/information+leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Lawsuit-to-Lure+Risk+Translation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Verifiable+TPRM+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk-Aware+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Control+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Prompt+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dark+Web+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BFSI+%28Banking%2C+Financial+Services%2C+and+Insurance%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Customer+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WeLiveSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Vulnerability+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Suffixing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technical+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PoC+Exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mitre+Att%40ck</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Entra+ID</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+CMDB+Reconciliation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attribution+Chasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Impersonation+Scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3+Domain+Squatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decision-Ready+Verdicts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Message+Spoofing+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Cyber+Kill+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Observer+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unsanctioned+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Prioritization+for+Session+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploit+Path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Data+Exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malicious+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Linked+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CNAPP+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Customizable+and+Granular+Risk+Configuration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Probe</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Redis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Primary+Refresh+Token</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SSL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Smart+Contract+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Reconnaissance+Advantage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Visibility+Chasm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+Object+Level+Authorization+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Signal-as-a-Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Environmental%2C+Social%2C+and+Governance+%28SEC+DEF+14A%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reverse+WHOIS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextualized+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Engagement+and+Retention+%28SEC+10-K+HCM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CVSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentic+AI+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLS%2FSSL+Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Security+Testing+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GitHub+Code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/XSPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Blockchain+Domain+Enforcement+Challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Due+Diligence+Assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Structural+Precursors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Footprint+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authentication+%2F+Authorization+Tokens+and+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Domain+Digital+DNA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/homophone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Qualitative+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fully+Qualified+Domain+Name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Passive+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Third-Party+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Root+Domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Text+Sharing+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Score+Auditor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Open+Cloud+Buckets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Creative+and+Portfolio+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Search+Engine+%26+Advertising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Insecure+Deserialization+Issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Digital+Presence+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Denial+of+Wallet+%28DoW%29+Exposure+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rogue+Mobile+Applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cardholder+Data+Environment+Attack+Surface+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rating+Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Resources+%28HR%29+Software+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TXT+%28Text+File+Document%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Access+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Control+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/reNgine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Attack+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EDGAR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dark+Web+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Code+Leak+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud-Based+Presentation+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Narrative+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Privilege+Escalation+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unclaimed+DNS+Record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Stuffing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM+for+RevOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Finance+and+Business+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Out-of-Scope+Bug+Bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Information+Disclosure+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PTaaS+%28Penetration+Testing+as+a+Service%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Product+Experience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fraud+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Toxic+Combinations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Tag+Manager+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Testing+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Structural+Telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/X-Content-Type+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Code+Snippet+Repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Active+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Threat+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unmanaged+AI+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exception+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Artifactory+API+Token</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM+Program+Reporting+and+Oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Green+Dashboard+Fallacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Snowflake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Protection+Assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GI+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+Narrative+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Left+of+the+Boom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering+Reconnaissance+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Managed+Service+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+HIPAA+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/S3+Bucket+Namesquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Webcams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Training+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Misattribution+of+Responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fourth+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloudflare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Leaked+LLM+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Black+SEO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unprotected+Admin+Interfaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Screen+Locker+Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Infection+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Software+Composition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Squatting+%28aka+SaaSquatting%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/First-Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Management+%28EASM%29+in+India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC+Assessment+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Threat+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross+Site+Request+Forgery+%28CSRF%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GoSpace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Counterfeit+Market+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Merger+and+Acquisition+Security+Risk+Agility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak+Scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OSB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Detritus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+SOC+2+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WIRED+%28Security%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third-Party+PCI+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Intelligence+and+Data+Analytics+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+PCI+Attack+Surface+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Splunk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+DPDPA+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zilliqa+Blockchain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Dorking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Remediation+Tracking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Scanners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Comprehensive+Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Infrastructure+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Reconnaissance+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Communication+Platform+Configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Ransomware+Analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+27001+Access+Control+Failure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unified+External+Risk+Shield</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Foreign+Influence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deep+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR+Audit+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Risk+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Programmatic+Identity+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Address+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RPC+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI+External+Posture+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Replay+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Venture+Capital</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Security+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Purely+External+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hybrid+SaaS+Discovery+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BleepingComputer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internet-Facing+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Management+%28SEC+DEF+14A%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Collaboration+and+Productivity+Suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Lawsuit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Buffer+Overflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Autonomous+System+Number</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+Function+Level+Authorization+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Telegram+Log+Clouds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unpatched+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deceptive+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shodan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proprietary+Prompt+Template+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Vulnerability+Warning+Pilot+%28RVWP%29+Program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Cloud+Bucket+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+External+Compliance+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/URL+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Virtual+Private+Networks+%28VPNs%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Remediation+Collaboration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Domain+Takedown+Evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TCFD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SSL+%28Security+Sockets+Layer%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credential+Exposure+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+View+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Convergence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Researcher</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+Identity+Crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Software+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Travel+and+Lifestyle+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/funding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Initial+Access+Vector+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Mandates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Exposure+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+27001+Configuration+Failure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+Centric+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Customer+Service+and+Support+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Monday.com</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Chaining</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compliance+Pulse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operations+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Crunchbase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HTTP+Gateways</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Permutations+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/POPIA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Networking+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-in+GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross+Site+Scripting+%28XSS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Relationship+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SOAP+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reddit+Security+Monitoring+for+Enterprises</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Real-World+Exploit+Scenarios</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Materiality+Grade</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Multi-Stage+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Classification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Violations+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Social+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Langflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pre-Acquisition+Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Green+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Python</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+and+Messaging+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technical+Digital+Presence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Scope-Based+Vulnerability+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unified+External+Threat+Surface+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Appetite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Azure+Active+Directory+%28Azure+AD%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MCP+Inspector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Transparent+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Risk+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Clear+Site+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/server-side+request+forgery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DevOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Finance+and+Payments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Documentation+Retrieval</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Status+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/False+Positive+Validation+Time</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+27001+Control+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cuckoo+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Codename+SCNR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Core+JavaScript</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NIS+2+%28Network+and+Information+Security+2+Directive%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Processing+Addendum+%28DPA%29+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/In-App+Secret+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Positive+Security+Indicator</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+AI+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/substitution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Impact+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Online+Paste+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malicious+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure-to-Opportunity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decisive+Security+Insight+for+Unstructured+Data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Risk+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Address+Harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/X-Permitted+Cross+Domain+Policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+%26+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SEC+Form+8-K+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Intelligence+%28EASI%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/X-Frame+Options</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NIST+Least+Functionality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TDS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Loss+Aversion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Confidentiality+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Risk+Shield</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Golden+SAML+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extended+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Emails+Exposed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attacker%27s+Eye+View+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate+Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Abandoned+Digital+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CDE+Exposure+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HTTP+Response+Splitting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Architectural+Foresight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNSTwist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Known+Exploited+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/S3+Bucket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OWASP+Top+10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/8-K+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Certainty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RESTful+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/FedRAMP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+GDPR+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+AI+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Bug+Bounty+Program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AppCake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unsafe+Consumption+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/iOS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CDN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CDP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Denial+of+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Online+Code+Pad</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Compliance+Scavenger+Hunt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Work+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Code+Snippet+Sharing+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OpenAPI+Specification+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/reconFTW</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/hyphenation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/n8n</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GraphQL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deep+Web+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MetaTrust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MFA+Bypass+Techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Post-Acquisition+Security+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Security+Policy+%28CSP%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brandfolder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Machine+Learning+Operations+Security+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Exposure+Enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Stale+DNS+Entry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Milvus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Online+Brand+Protection+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+VoIP+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leakage+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Guided+Digital+Presence+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Verifiable+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Frontline+Fraud+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+External+PCI+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Register+%28Security%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitable+Path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BeEF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Omega+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Early+Fraud+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/8-K+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+and+Phishing+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Information+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Handle+Squatting+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EPSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prioritized+Non-Web+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extortion+Groups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+and+Mail+Services+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Patch+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Security+Posture+Management+%28PSPM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR+Data+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Server-Side+Request+Forgery+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Axonious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+27001+External+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threat+Landscape+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Responsible+Disclosure+Facilitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero+Hour+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Application+Security+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Procedure+Call+%28RPC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Warfare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/web+crawler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dating+and+Adult+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Website+Defacement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compliance+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Active+Subdomain+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sanitized+Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Materiality+Determination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative-Driven+Remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Indicators+of+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Breach+and+Attack+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Key+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Double+Extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cardholder+Data+Environment+Exposure+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Protection+of+Personal+Information+Act</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GRI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Path+Name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Boardroom-Ready+Attribution+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Integrity+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Labor+and+Employment+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Administration+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Supply+Chain+Vendor+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ALIEN+TXTBASE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Algorithmic+Misattribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Azure+Data+Lake+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HTTP+Strict-Transport-Security+%28HSTS%29+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Intelligence+Enrichment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rogue+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Infostealer+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Encrypting+Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+File+Inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Redirect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dependency+Confusion+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Configuration+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RASP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Customer+Relationship+Management+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Exposure+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Audit-Ready+External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Content+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NSFW+Identity+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Blind+Spots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Bucket+Poisoning+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Synthetic+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hardcoded+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Namesquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ENISA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extended+Threat+Intelligence+%28ETI%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/No+WAF+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Vector+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Attack+Surface+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Manual+Triage+Saturation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Hyper-Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Trusted+Relationship+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Business+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CassidyAI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Prompt+Injection+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technology+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Incident+Response+Coordination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Survey+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+Technical+Vulnerability+Management+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Partner+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Based+Vulnerability+Management+%28RBVM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Payment+Ecosystem+Risk+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Provider+Security+Policies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ahmia+Dark+Web+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Ethics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CMS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/False+Positives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shame-as-a-Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Layer+Denial+of+Service+%28DoS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Footprint+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Posture+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PGP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malware+Operators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DarChain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pre-Compromise+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credential+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity-Centric+EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Shadow+IT+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MobSF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Configurable+Digital+Presence+Assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credentialless+External+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Repetition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Forensic+Refutation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Leaklookup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Validated+Exposure+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SIEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Strategic+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Primary-Source+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+IPs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitability+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+PCI+Gap+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate+Transparency+Logs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Protection+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+as+Intent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC+Assessment+Continuous+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security-Aware+CMDB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Rights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Filtering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LM+Studio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Path+Choke+Points</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross+Origin+Opener+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Combined+Exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Scope+Creep+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mass+Assignment+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Global+Cyber+Governance+Commons</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internet-Facing+Misconfigurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Payment+Data+Leakage+Pathways</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SwaggerHub+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromised+Credentials+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Distributed+Network+Protocol+3+%28DNP3%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Verified+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Architect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/10-K+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pre-Emptive+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Severity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SEC+Form+8-K+Cyber+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data-Driven+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Networking+%26+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CDE+Attack+Surface+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Box</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Technology+%28OT%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GraphQL+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+ML+Miscofiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Amazon+Appstore</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Domain+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Authorization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Aircrack-ng</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Delivery+Network+%28CDN%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Posture+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Configuration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reconnaissance+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Wildcard+Domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3+Proactive+Blocking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authentication+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OPSEC+Fails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Software+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Oracle+E-Business+Suite+%28EBS%29+External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SEC+Form+8-K+Filing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Similar+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Intelligence+Platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content-Security-Policy+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Legal+and+Financial+Data+Fusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputational+Risk+Quantification+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Centric%2C+Not+Security+Exclusive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Threat+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GRC+Liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Audit+India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BEC+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Privacy+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Packet+Storm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Insurance+Premium+Optimization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputational+Contamination+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Phishing+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reconnaissance+Equalizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Corporate+Social+Responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Open+Governance+Standard+The</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLS+Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Centric+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/COEP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+Arsenal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Narratives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Communication+and+Collaboration+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ephemeral+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Financial+Materiality+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Critical+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RSYNC+%28Remote+Synchronization%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identity+Risk+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Connector+Tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Workflow+Transformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Command+Injection+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attacker-Relevant+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Sensitive+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Confidentiality+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Evidence-Based+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Authenticity+Collapse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prophylactic+Domain+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Nth+Party+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity-First+EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/App+Store+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Score+for+Non-Human+Identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Email+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Inventory+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Intelligence+Fabric</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Loss+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Invisible+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Control+Effectiveness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Impersonation+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Artifactory+Password</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Attack+Surface+Delta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Vulnerability+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Schneier+on+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GenAI+Security+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JavaScript+Frameworks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Exposure+Security+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Misattribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hosting+and+Content+Delivery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Corporate+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Machine+Identity+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Safety+and+Security+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/masscan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Personal+Data+Protection+Act+Checklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ghost+Service+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DDoS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technical+Data+Sheets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shared+Responsibility+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/General+Governance+and+Ethical+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Scenario</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Threat+Detection+and+Response+%28ITDR%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Autonomous+Risk+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cryptojacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ASM+%28Attack+Surface+Management%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LangChain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SQL+Server</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Consumer+Protection+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zombie+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate+Authority+Issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SMTP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/John+the+Ripper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CSPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fraudulent+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Tasting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pinecone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credential+Leak+Channels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Misconfigured+AWS+S3+Bucket+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Forensic+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence-led+EDR+Enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Web+Interfaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Extortion+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+AI+Models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Typo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI+Credential+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authorization+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Recursive+Iterative+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Protection+OEM+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Landing+Page+Builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Exposure+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AppBrain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+and+Certificate+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Active+Directory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ethernet+for+Control+Automation+Technology+%28EtherCAT%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Post-Breach+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authentication+Tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/FedRAMP+ATO+Readiness+Assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SMB+%28Server+Message+Block%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extortion+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security-Led+Growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Insertions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Email+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DPDPA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Compensation+%28SEC+DEF+14A%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Readiness+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unrestrictive+Access+to+Sensitive+Business+Flows+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Second+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/KrebsOnSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Awareness+Training+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Cache+Poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Mobile+App+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LOG+SYNC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Response+Code+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Debt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EasyEASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Insider+Threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hydra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Minimalist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OAuth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Control+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/In-Scope+Bug+Bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNSSEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Vulnerability+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Healthcare+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Work+Operating+System+%28Work+OS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/XML+%28Extensible+Markup+Language%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Parking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BEC+Lawsuit+Lure+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Crisis+of+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Development+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Risk+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Attack+Surface+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Invisible+Data+Exfiltration+Paths</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brandjacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Incident+Response+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ethernet+Industrial+Protocol+%28EIP%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Defensive+Domain+Registration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Incident+Response+Acceleration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ineffective+Social+Engineering+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Supply+Chain+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLD-Swapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Reporting+Channel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Anthropic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Privilege+Escalation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+as+a+Service+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Validated+Vulnerability+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ghost+DNS+Record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Autonomous+Organizations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Topology+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Narrative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Vector+Database+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/10-Q+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Spoof+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Empathy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Aptoide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Stakeholder+Communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Machine+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Search+Engine+Optimization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/COOP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Registrar+Evidentiary+Friction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OneDrive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Based+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Onion+Search+Dark+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR+Fines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Security+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Dependency+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NHI+Email+Roles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Legal+Record+Vetting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Exposure+Contextualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subsidiary+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ecosystem-Wide+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Breach+Readiness+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Industrial+Control+Systems+%28ICS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Burp+Suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Atlassian</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dictionary+Additions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Memory+Corruption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Landscape+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Board+Oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Vulnerability+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DASR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/dApp+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HIPAA+Security+Rule+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adverse+Media+Vetting+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Moon+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Red+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Identity+Unification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Backup+and+Recovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Personal+Liability+for+CISOs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Distribution+Platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Concentration+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC+Compliance+Evidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Resilience+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Database+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+NHI+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM+for+ISO+27001</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unmanaged+Public+Distress+as+a+Lure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CORS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CORP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Path+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DevOps+Security+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Marketing+and+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Marketplaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Misconfiguration+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Irrefutable+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Streaming+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Azure+AD+Connect+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering+Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Perspective+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Virtual+Network+Computing+%28VNC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromise+Session+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hybrid+SaaS+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Forensic+Evidence+Packaging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Microblogging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/appdb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+CDE+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Technology+Stack+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zoom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor-Managed+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Adversary+View+for+GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Confidence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Media+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Jacking+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Vendor+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Corporate+Governance+%28SEC+DEF+14A%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Misconfiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Threat+Exposure+Management+%28CTEM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Publicly+Accessible+DVRs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ERP+Supply+Chain+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Robots.txt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+Management+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Headless+Server</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Susceptbility+Insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-fungible+Tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supplier+Security+Reviews</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PagerDuty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Historical+Reconnaissance+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Emulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Chained+Relationships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reconnaissance+Gap+Closure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GRC+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Preemptive+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Choke+Points</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Hacker+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Precursor+Intelligence+Indicator</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/APKPure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Disjointed+Risk+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unquantified+Human+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Identity+Portfolio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Monitoring+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Insecure+Design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ghost+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ecosystem+Risk+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hacker%27s+Perspective</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Negative+News+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Surface+Web+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/System+Utilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Code+Execution+%28RCE%29+Exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/App+Store+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Spoof+Mobile+App+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intellectual+Property+Leakage+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Management+for+POPIA+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Scribd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Confidence+Architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Source+Business+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Hardening</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IMAP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Impact+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Choke+Point+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Black+Hat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Substitutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/combosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/News+and+Information+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WordPress</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public+Distress+Attack+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Operational+Resilience+Act</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SQL+Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Incident+Reporting+for+Critical+Infrastructure+Act+%28CIRCIA%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HIPAA+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Key+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence-led+MFA+Enforcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Protection+for+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Tolerance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tactical+Threat+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GDPR+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Policy+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Managed+Takedown+Service+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3-Specific+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Security+Posture+Management+%28SSPM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+HIPAA+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MongoDB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pivot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Compliance+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Tag+Manager+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+SOC+2+Evidence+Collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Stale+Subdomain+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Cloud+Storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IP+Leakage+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Salesforce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Client-Side+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Detection+and+Response+%28ADR%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internet+of+Things+%28IoT%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Permissions+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Information+Disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Security+Testing+%28MAST%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Website+Builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Breach+Notification+Clause+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dangling+DNS+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Cardholder+Data+Environment+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Source+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Actor+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Factors+%28SEC+10-K%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/System-Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Website+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SASE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Active+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ARIN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dark+Reading</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Protector+of+Nouns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Tag+Manager</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence-Led+Control+Prioritization%5C</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Criticality+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ghostbin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/UPnP+%28Universal+Plug+and+Play%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Cloud+Bucket+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Apple+App+Store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Defamatory+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Media+Username+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Model+Theft+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SNMP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Early+Scam+Warning+System</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/pastebin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentless+Vulnerability+Scanning+India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Silo+Effect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero-Day+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Development+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GenTrace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LiteLLM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Integrated+Digital+Presence+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Employment+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Admin+Panels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Disinformation+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Threat+Intelligence+for+External+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Kill+Chain+Visualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public-Facing+Payment+Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Black+Box+Fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SASB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Abandoned+Asset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Programming+Interface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Observable+Security+Characteristics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Crawlers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unmanaged+Shadow+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Local+File+Inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Okta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LLM+Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Initial+Access+Broker+Targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT+Audit+Exceptions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Exposure+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Connector+Trap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Step+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Daisy+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PrivCo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Awareness+Training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+GRC+Evidence+Streams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Account+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Directory+Traversal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Correlation+Evidence+Questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Interaction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fiduciary+Duty+of+Care</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Domain+Name+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI-SPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Intent+Mirage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Exposure+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation+Remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/File+Inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Testing+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Supply+Chain+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Name+Server+Records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputation+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Analytics+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Spear+Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third-Party+App+Stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Account+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shopping+and+E-Commerce+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Session+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+Blindness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Insecure+Direct+Object+References+%28IDOR%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Lateral+Movement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third-Party+Risk+Certainty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Remote+Access+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero-Day+Exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/National+Vulnerability+Database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zero+Trust+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Agent+Drift</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ollama</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/General+IT+and+Productivity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaSqwatch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DuckDB</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Custom+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Application+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Homoglyph+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CMDB+Reconciliation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/transposition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+%26+Design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentless+Security+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proof+of+Concept+Exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Scanning+Limitations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DZone+%28Security+Zone%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/attak+surface+expansion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cost+of+Inaction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+and+Oversight+Disclosures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Tag+Manager+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+Authentication%E2%80%8B%E2%80%8B+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PHP+%28Hypertext+Preprocessor%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Misconfiguration+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Interconnected+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Appetite+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Management+and+Collaboration+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Doppelganger+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pre-Audit+Remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Single-Pane-of-Glass+Digital+Presence+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technology+Email+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Exposure+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Connective+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Storage+Buckets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Connectorless+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vowel+Swap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Metasploit+Framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Infostealer+Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BlackArch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Infostealer+Kits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+External+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Board+Oversight+of+Cyber+Risk+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Gather+Victim+Identity+Information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Ransomware+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Development+and+Tech+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Secrets+Management+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Capital+Management+%28SEC+10-K%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Complexity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AnythingLLM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Integrated+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pass-the-Hash+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Anticompetitive+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Vulnerability+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Preemptive+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Polyglot+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Recursive+Unauthenticated+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM+for+GenAI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decision+Ready+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WAF+Fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Validated+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Admin+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Misuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authorization+Tokens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLS+%28Transport+Layer+Security%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malvertising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/domain+impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentic+Framework+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malicious+Open+Directories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extensible+Provisioning+Protocol</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Flexible</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internet-Facing+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/homoglyph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Initial+Access+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Crisis+Communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Seedless+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CNAPP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Double+Materiality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pre-Breach+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/False+Positive+Tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Application+Firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Approved+Scanning+Vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Precursor+Malware+Infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Orphaned+DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Token+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rogue+Mobile+Apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attestation+of+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Microsoft+Power+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+and+Reputation+Damage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Impersonations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Exploitability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identity+Exposure+for+LLM+Agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Preventing+Initial+Access+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Session+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/added+keywords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technical+Attack+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Reduction+Efficacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Marketplaces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sensitive+Code+Exposure+Digital+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Security+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Lifecycle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Extended+Attack+Surface+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cookie+Poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+User+Authentication+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Script+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OAuth+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Omissions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Common+Vulnerabilities+and+Exposures+%28CVE%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromise+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Actors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Knowledge+Base+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Probability+Paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Security+Testing+%28AST%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GDPR+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Playwright+MCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/FQDN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Conversational+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HighByte</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BAK+%28Backup%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proof+of+Concept</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Whaling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Vector+Database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Management+System</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Public-Facing+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Security+Issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Disinformation+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Endpoint+Management+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Path+Description</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+ASV+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/App+Stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Government+Contracting+Irregularities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Health</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OPSEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Frameworks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Password+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Discovery+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+AI+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cohere</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Technical+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+HIPAA+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operation+Cronos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence+X</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Contamination</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DSPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Rating+Ambiguity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud-Native+Application+Protection+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Text+Snippet+Repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Black+Box+Penalty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Application+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Guardian+%28Information+Security%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Vectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Black-Box+Security+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open-Source+ESG+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Access+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Chained+Findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Perimeter+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Qdrant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Environmental+Sustainability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Communication+%26+Marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/APKCombo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unknown+Unknowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prophylactic+Registration+Mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Additions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Credential-Dump+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sentient+Hyper-Optimized+Data+Access+Network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk-Based+Remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitable+Paths</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Strategic+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI-Driven+Financial+Raids</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hyphenations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SSL+%2F+TLS+Issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Database+Exposures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+PCI+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Communications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authorization+Bearer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Executive+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Compliance+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Shadowing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automatic+HTTPS+Redirect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+External+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Forum+and+Community+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/StarLink+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Summary+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Exposure+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Autonomous+Attack+Surface+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+AI+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Risk+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Competitive+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Replacements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Private+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Claims-Based+Attestation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Microsoft+Entra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Exposure+Coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Preemptive+Digital+Forensics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Redirection+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Objective+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+API+Footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Exposure+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploitability+Prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Artificial+Intelligence+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Development+Environment+Configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vowel+Substitution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Risk+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Key+Risk+Indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat-Informed+EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/tld+swap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromised+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Platform-Specific+Identifiers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asana</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Brand+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Main+Domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/cross-origin+resource+sharing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Parrot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Diamond+Model+of+Intrusion+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Website+Control+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SOAR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Looker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Detection+and+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Scareware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+Device+Management+%28MDM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Slack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sustainability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prophylactic+Registration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Context+Engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Irrefutable+Supply+Chain+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Source+Security+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Security+Gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rating+Efficacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unrestricted+Resource+Consumption+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third-Party+Risk+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Identity+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Graham+Cluley</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Token+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DORA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DPDPA+Compliance+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextualized+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Email+Scraping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI+Attack+Surface+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Service+Configurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Applications+%28dApps%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Proof-of-Concept+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OT%2FIoT+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Kit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CVE+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Secure+Coding+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pretty+Good+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Real-World+Exploitability+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Emerging+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IVRE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Account+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Control+Invalidation+Loop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Misconfiguration+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/POPIA+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Weights+and+Biases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain-Associated+API+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Incident+Management+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+Application+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Archive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/File+Inclusion+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Record+Types</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Horizon+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/addition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dark+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Acquisition+Life+Cycle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+Confidence+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internal+Phishing+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sustainable+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Topology+Security+Understanding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Session+Hardening+Recommendations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Privilege+Escalation+Flaws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering+Attack+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Reclamation+Program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dorking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Next.js+MCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Slideshare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RTSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sustainable+Application+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM+Validation+and+Prioritization+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Model+Context+Protocol+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proximity+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Real-time+Digital+Presence+Snapshot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Cautious</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Step+Action</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Tech+Stack+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Redirection+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sherlock</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Frictionless+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/No+Code+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Presentation+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+SaaS+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+AI+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Bug+Bounty+Award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/omission</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI-Prioritized+External+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Protected+Health+Information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross+Origin+Resource+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+Exposure+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Artificial+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Malspam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Expected+Loss+Avoided</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outdated+Subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Threat+Context+%28ATC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MITM+Proxy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CAASM+%28Cyber+Asset+Attack+Surface+Management%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Averse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pointer+and+Validator+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Board+Cybersecurity+Oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Fiduciary+Obligations+India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Code+Execution+%28RCE%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/spider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HTTP+Strict+Transport+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IDN+Spoofing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Oracle+Database</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Imitation+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LDAP+%28Lightweight+Directory+Access+Protocol%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ADR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Google+Cloud+Storage+Finder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Artificial+Intelligence+Exposure+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposure+Remediation+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+Access+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Truth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attacker-Centric+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/POPIA+Compliance+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ethereum+Name+Service+%28ENS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Claims-Based+Assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Primary+Source+Collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Certainty+Deficit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Infection+Vector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Path+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Distribution+Platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Amazon+AWS+Access+Key+ID</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Exposure+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SSL+Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ERP+Zero-Day+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threat+Alignment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SherLock1u_BOT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/X-Content+Type+Options</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Threat+Exposure+Management+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Persona+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SSRF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Clawdbot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputation+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Personal+Data+Protection+Act</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+ERP+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compliance+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+Skimming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pivot+Point</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity-First+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Phishing+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputation+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JavaScript+Libraries</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaSquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Misconfiguration+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Account+%2F+Key+Files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/In-Band+Indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+AI+Training+Data+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Graph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI-Native+Brand+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leaks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Code+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+So+What+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Actor+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversarial+Exposure+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hidden+Tax+on+the+SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Graph-Based+Entity+Resolution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Common+Vulnerability+Scoring+System</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HSTS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Government+Contracting+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Onboarding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Human+Capital+Management+Disclosure+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Broken+Object+Property+Level+Authorization+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Acquisition+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Bugatti+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Attack+Path+Visualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Initial+Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mobile+App+Attack+Surface+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Critical+Event+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Controlled+Dark+Web+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zombie+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CNAME+Record</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Endpoint+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sensitive+Information+Disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JSP+%28Jakarta+Server+Pages%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Velocity+Paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Active+Exposure+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Digital+Presence+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Event+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Precision-Driven+Digital+Risk+Questionnaires</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prescriptive+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Model+Exposure+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Nth+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Boulevard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Referrer+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Posture+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+ERP+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Choke+Point</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Leak+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Healthcare+Compliance+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Character+Transposition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/OpenAI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Greenhouse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Rogue+Mobile+App</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Stealer+Log+Ingestion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Artificial+Intelligence+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supplier+Assurance+Questionnaires</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Name+Permutations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ISO+27001+Supply+Chain+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3+Domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unauthenticated+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decentralized+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Read+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Advocate+Marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Posture+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Internet-facing+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Wildcard+DNS+Records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Improper+Inventory+Management+%28API%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+AI+Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross+Origin+Embedder+Policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+Takedown+Tax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Service+Account+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/TLD+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat-Informed+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Beyond+Perimeter+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Connector+Fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Security+Rating</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HIPAA+Data+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Safety+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Contextual+Attack+Path+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Headers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Privileged+Access+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+SaaS+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Misconfiguration+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+%28Domain+Name+System%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Lack+of+External+Employee+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fiduciary+Liability+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Intelligence+%28CRI%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Events+and+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+GDPR+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Stage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Tradecraft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/URL-Based+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NIST+800-53+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CDASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Reputation+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Advanced+Threat+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Encrypting+Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Amazon+S3+Bucket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Audit+Surprise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/The+HIPAA+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Social+Engineering+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Default+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Profiling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Bug+Bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Context-Driven+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Impersonation+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PCI+ASV</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mitre+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WHOIS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mail+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Right+of+the+Boom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third+Party+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Traffic+Direction+Systems+%28TDS%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Voice+Clone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Project+Management+Software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Offense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM+Scoping+and+Discovery+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Exfiltration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Material+Cybersecurity+Incidents+%28SEC+8-K%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Asset+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ZAP+by+Checkmarx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Enterprise+Username+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zone+Transfer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Open</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Automated+Evidence+Generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloudsquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Third-Party+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Legal-Grade+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Leakware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Elasticsearch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Rating+Dispute+Process</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compromised+Credentials+Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Supply+Chain+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Duo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Gaming+and+Entertainment+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Status+Communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Risk+Alignment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Section+19+External+Controls+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Homoglyphs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Mode</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CVE+Severity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+External+Security+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Kustomer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Metadata</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/General+SSE+MCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Threat+Exposure+Monitoring+%28CTEM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/BambooHR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Misconfigured+AI+Endpoints</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PostgreSQL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exploit+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Name+Squatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Advanced+Persistent+Threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NMAP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Torch+Dark+Web+Search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IT+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Code+Repository+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Source-Code+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vulnerability+Trend+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Application+Security+Hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Rating+Drilldown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Breach+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/American+Registry+for+Internet+Numbers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Username+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Adversary+View</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk-Based+Vendor+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Section+22+Incident+Preparedness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Methods+of+Infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Next-Gen+External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Preemptive+Vulnerability+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fingerprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+DPDPA+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Underestimated+ATO+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/White-Labeled+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Impact+Analysis+%28BIA%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Enterprise+Risk+Management+%28ERM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Attack+Path+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Specification+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hugging+Face</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Control+Effectiveness+Verification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Regulatory+Fragmentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Neo4j</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GPT-Trainer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Official+App+Stores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+SOC+2+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ASN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+PCI+Control+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Attribution+Engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Asset+Types</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/LG+Content+Store</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Information+and+Event+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+External+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ASV</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Shadow+IT+Liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Moltbot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Policy+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Security+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Metadata+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Equity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Operational+Remediation+Mandates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Aha%21</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Decisive+Security+Insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Long-Term+Market+Value+Suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Sprawl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SharePoint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Network+Security+Hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fully+Qualified+Domain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Archived+Web+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Strategic+Context+Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GitHub+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Cyber+Threat+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Oracle+Database+Cluster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentless+Cloud+Exposure+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Consumer+Protection+ESG+Violation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web3-Specific+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Operations+Center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Clone+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Exposed+Email+Addresses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Hackable+Subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Stability+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Telemetry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybercriminal+Groups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ArcherySec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authentication+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Agentless+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR-to-Vulnerability+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Exploit+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MLOps+Security+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Foresight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Calibration+Engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Analytics+%26+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Sustainable+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Prompt+Injection+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Footprint+Integrity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Bitsquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Ecosystem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WAF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Attack+Surface+GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Gist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Crisis+of+Context+in+Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EPP+Status+Codes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cassandra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Market+Value+Suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+Auditing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Risk+Protection+for+Session+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Non-Human+Identity+Abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Risk+Correlation+Score</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Attack+Surface+Management+%28ASM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Machine+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Redirect+Tracing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Insufficient+Lifecycle+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Online+Reputation+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NIST+800-53+External+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Precursor+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Certainty+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Vulnerability+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Audit+Findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Zmap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Unintended+API+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DMARC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Archiving+and+Utilities+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Integrated+Threat+Intelligence+Ecosystem+%28ITIE%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Payment+Card+Industry+Data+Security+Standard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM+CMDB+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Holistic+Digital+Footprint+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Tag+Manager+Best+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Pixel+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Fake+Websites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Attack+Risk+Contextual+Hyper-Analysis+Insights+Narrative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Web+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security.txt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Presence+Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Audit+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Threat+Surface+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Clickjacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brute+Force</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Progressive+Footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Amplitude</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Online+Brand+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Attack+Surface+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+GRC+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cross-Platform+Identity+Correlation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/PhaaS+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Context-Blind+Scoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Presence+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI+Model+Footprinting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Footprint+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Artificial+Intelligence+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/WEF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Damage+Susceptibility+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Architectural+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deprecated+X-XSS+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GitHub+Gist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Environmental+Violations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Geographic+Intelligence+Open-Source+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dorks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open+Source+Investigative+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain+Takeover+Scanner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/DNS+Records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Context</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GRC+Drift+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Reputational+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Compliance+Blind+Spot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/E-commerce+and+Payment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Identity+and+Access+Management+%28IAM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Deep+EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Google+Play</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Business+Software+%26+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Classification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Authentication+Bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Asset+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Managed+SwaggerHub+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Collaborative+Code+Hosting+Platforms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Grype</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence-Driven+Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Proactive+Security+Measures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence+Led+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Microsoft+Entra+ID</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Narrative+Risk+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Generative+AI+Endpoints</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Activity+Records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/RDP+%28Remote+Desktop+Protocol%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Actionable+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CIDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Form+4+%28SEC%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/MCP+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Predictive+Risk+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/NVD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Owler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Weak+Credentials+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Vendor+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/HTML</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Remote+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Intelligence+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk-Based+Security+Priority+Engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/AI-Driven+Social+Engineering+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Risk+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Primary+Source+Risk+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Financial+Misconduct</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Organizational+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Forward-looking+Statement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Visual+Deception</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Dynamic+Entity+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/IP+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Evidence-Based+Audits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/CTEM+Remediation+Mobilization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Security+Control+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ElevenLabs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Enterprise+Risk+Mitigation+and+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Democratized+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Prediction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Enterprise+Resource+Planning+%28ERP%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Portfolio+Website+Builder</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Digital+Presence+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Contextual+Misinterpretation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Content+Management+and+Collaboration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/EASM+for+SOC+2+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Threat+Intelligence+API+for+MSSPs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SaaS+Policy+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/ESG+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Outside-In+SaaS+Visibility+Gap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/SAQ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Root+Cause+Analysis+%28RCA%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Databases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Subdomain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Continuous+Session+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Control+Directives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Evidence-Based+Risk+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Credential+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Brand+Protection+as+a+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Qualified+Opinion+Anxiety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Products</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Open-Source+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Adversary+Tactics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Data+Analytics+and+Observability+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Ransomware+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/JavaScript+Graphics+Libraries</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Domain+Registrar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/External+Session+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cybersecurity+Hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cloud+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/glossary/tag/Cyber+Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee7b0e7d-9c8e-4590-9709-77e25ef982d4/TNG_022825_ICONS_DARCUPDATE-35.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0d8e8e88-3f77-444e-9256-73ece9326f35/External+Attack+Surface+Management+-+Digital+Risk+Protection+-+Security+Ratings+Updates</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-24-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e8f165f7-c272-4070-9bbe-df5e807f983c/Domain+Name+Permutation+Reports</image:loc>
      <image:title>Solution Updates - March 24, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b3462359-e32a-426a-ae4f-1fd026d7f02a/DarCache+Intelligence+Repositories+API</image:loc>
      <image:title>Solution Updates - March 24, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-12-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/52d69011-19d9-459a-afa6-9b13a62235c1/DArCache+Infostealer+Intelligence+Repository</image:loc>
      <image:title>Solution Updates - March 12, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3d3dd5ca-9782-4cba-83e5-62ff98189e40/xSBOM+External+SBOM+Software+Bill+of+Materials</image:loc>
      <image:title>Solution Updates - March 12, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be30b30b-4483-4738-895d-cb37ea33a863/AI+Artificial+Intelligence+Subdomain+Infrastructure+Exposure</image:loc>
      <image:title>Solution Updates - March 12, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-12-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b6685e8b-e94a-4236-af2b-07f92dc83932/External+SOC+2+Assessment</image:loc>
      <image:title>Solution Updates - February 12, 2026 - Make it stand out</image:title>
      <image:caption>External SOC 2 Assessment</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c7ab15d7-8459-4e30-ba38-c0ddfdd7550b/External+DPDPA+Assessment</image:loc>
      <image:title>Solution Updates - February 12, 2026 - Make it stand out</image:title>
      <image:caption>External DPDPA Assessment</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/07f43358-3ca8-48b0-9b1f-9e2806e86e69/Subdomain+Advanced+Search</image:loc>
      <image:title>Solution Updates - February 12, 2026 - Make it stand out</image:title>
      <image:caption>Subdomain Advanced Search</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/70083f35-9498-4d32-8776-0c8d740ef20a/Exploit+and+Vulnerability+Intelligence</image:loc>
      <image:title>Solution Updates - February 12, 2026 - Make it stand out</image:title>
      <image:caption>DarCache Vulnerability Intelligence Repository</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/january-7-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5b1033bd-a748-4fa4-8d86-bb93bb44b6d6/DarChain+External+Contextual+Attack+Path+Intelligence</image:loc>
      <image:title>Solution Updates - January 7, 2026 - Make it stand out</image:title>
      <image:caption>External Contextual Attack Path Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea51784b-2cb1-4ee3-8867-cdd65c23ee09/External+Reconnaissance+Hub</image:loc>
      <image:title>Solution Updates - January 7, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/836e5e24-cc37-4a3c-bb51-71f316b3c47c/Security+Cybersecurity+News+Feed</image:loc>
      <image:title>Solution Updates - January 7, 2026 - Make it stand out</image:title>
      <image:caption>ThreatNG Cybersecurity News Feed</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/december-19-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5abd27d5-304d-4b81-a801-e2f5a5ae89b8/Non-Human+Identity+NHI+Exposure+Security+Rating</image:loc>
      <image:title>Solution Updates - December 19, 2025 - Make it stand out</image:title>
      <image:caption>Non-Human Identity (NHI) Exposure Security Rating</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/24f92371-cc42-449a-be70-811e07001257/ISO+27001+External+Assessment</image:loc>
      <image:title>Solution Updates - December 19, 2025 - Make it stand out</image:title>
      <image:caption>ISO 27001 External Assessment</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/abdb7a66-031e-495f-b4fe-5df8ee061a01/NIST+800-53+Compliance+Mapping+for+Security+Scan+Results.gif</image:loc>
      <image:title>Solution Updates - December 19, 2025 - Make it stand out</image:title>
      <image:caption>NIST 800-53 External Assessment</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/november-21-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8be61c53-73e4-48a1-9814-34cea651b3da/LinkedIn+Discovery+Digital+Risk+Protection+DRPS+EASM+External+Attack+Surface+Management</image:loc>
      <image:title>Solution Updates - November 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d32d54f0-d859-480a-b276-d39250e1e03c/Username+Exposure+Digital+Risk+Protection+DRPS+EASM+External+Attack+Surface+Management</image:loc>
      <image:title>Solution Updates - November 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-21-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1db1d897-89aa-49bf-8e9f-224566d082ff/Overwatch.gif</image:loc>
      <image:title>Solution Updates - October 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/110a5bf5-a01f-4722-9043-3ea6b3611206/Domain+Records+Vendor+Mapping</image:loc>
      <image:title>Solution Updates - October 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eab56939-9eb0-4ed8-8778-486b399fdd69/External+NIST+CSF+Cybersecurity+Framework+Assessment</image:loc>
      <image:title>Solution Updates - October 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dc568f3b-e7d0-472b-875b-e39b44b7394e/MITRE+ATTACK+ATT%26CK+Mapping+EASM</image:loc>
      <image:title>Solution Updates - October 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b3851419-1ec9-4647-9edf-2a3be9677fb9/Reddit.gif</image:loc>
      <image:title>Solution Updates - October 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-26-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41d532b2-87a0-40e6-9487-bffda44ed604/GDPR+and+HIPAA+EASM+and+Digital+Risk+Mappings</image:loc>
      <image:title>Solution Updates - September 26, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4194300c-a9a0-4e32-8f84-33ef1dbda36d/Advanced+Search+External+Attack+Surface+Management+Digital+Risk+Security+Ratings</image:loc>
      <image:title>Solution Updates - September 26, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4a4cea1-eea1-4ea7-b9f1-74ce76f29ba3/EASM+External+Attack+Surface+Management+Digital+Risk+Protection+Security+Ratings+Advanced+Search</image:loc>
      <image:title>Solution Updates - September 26, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-10-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cea4549b-1e17-4fa4-861b-0d5c1c4b1fa2/NHI+Non+Human+Identity+External+Email+Exposure</image:loc>
      <image:title>Solution Updates - September 10, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/18e3ff8e-3a44-452a-99f8-03b8d5d5ef7d/External+GRC+Governance+Risk+Compliance+Mappings</image:loc>
      <image:title>Solution Updates - September 10, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/august-21-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2afb9e89-fe39-41c0-b5ec-2d11c2530e8f/Domain+Name+Permutations+EASM+Digital+Risk+Protection</image:loc>
      <image:title>Solution Updates - August 21, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/july-9-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fc475798-04ab-4aa9-9788-2ce84d2ef4a9/PCI+External+Compliance+Sample+Report</image:loc>
      <image:title>Solution Updates - July 9, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c21f1a2b-8771-4829-b50b-bc331e8a1274/POPIA+External+Compliance+Sample+Report</image:loc>
      <image:title>Solution Updates - July 9, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b3e78e-165f-4889-8006-69bb6fd11cc2/Code+Repository+Exposure.gif</image:loc>
      <image:title>Solution Updates - July 9, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/751306ab-e2bf-47a2-8d27-99a476ef34ab/Customizable+Risk+Scoring.gif</image:loc>
      <image:title>Solution Updates - July 9, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/june-23-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/751306ab-e2bf-47a2-8d27-99a476ef34ab/Customizable+Risk+Scoring.gif</image:loc>
      <image:title>Solution Updates - June 23, 2025 - Make it stand out</image:title>
      <image:caption>Customizable Risk Scoring and Configuration</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b3e78e-165f-4889-8006-69bb6fd11cc2/Code+Repository+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings</image:loc>
      <image:title>Solution Updates - June 23, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e6dc71e9-e7b3-45c3-b436-5fc53f685ddd/Security+Ratings+Cyber+Risk+Ratings+ThreatNG</image:loc>
      <image:title>Solution Updates - June 23, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fe9e778a-5a75-40a4-81fa-fbbee98de1f8/DarCache+8-K+Intelligence+Repository</image:loc>
      <image:title>Solution Updates - June 23, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1193d4a5-feb1-4220-ad6d-c581fca6caae/Positive+Security+Indicators+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Solution Updates - June 23, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-28-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e1420f-2e51-408b-9879-e947c950ccef/Advanced+Search+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Solution Updates - May 28, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c4c2f73-4f1f-471a-815b-b56cff95f2ae/Vulnerability+Intelligence+DarCache+Threat+Feed+NVD+EPSS+KEV+Proof-of-Concept+Exploit</image:loc>
      <image:title>Solution Updates - May 28, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/april-29-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1a7973ed-8719-42c2-8df6-bebb4731dc36/SwaggerHub+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Solution Updates - April 29, 2025 - Make it stand out</image:title>
      <image:caption>SwaggerHub Discovery &lt; Domain Overview &lt; Domain Intelligence Investigation Module</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/april-16-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1193d4a5-feb1-4220-ad6d-c581fca6caae/Positive+Security+Indicators+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
      <image:title>Solution Updates - April 16, 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-27-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-5-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-12</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-24-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/january-22-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/december-31-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/november-7-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-1-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/august-12-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/july-22-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/july-1-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e5022740-e949-4f9d-9288-907a9ecc9727/Screenshot+2024-06-30+at+1.54.20%E2%80%AFPM.png</image:loc>
      <image:title>Solution Updates - July 1, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7fdd1110-2639-45b8-8310-564947af11d6/Screenshot+2024-06-30+at+2.02.40%E2%80%AFPM.png</image:loc>
      <image:title>Solution Updates - July 1, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-9-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/888f5f27-f388-4744-a300-a349a4a9a1a5/SUSEX_ICONS_FINAL-63.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d368c65b-2687-4cec-b7a3-d9d1395c8e98/TNG_ICONS_SEC-04.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1698414138438-QTVMAHMTDHCRLG0WFO6Q/TNG_ICONS_REPORT-04.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d9e4a867-b440-47fb-bbd9-ebe710aa7f82/TNG_SaaSqwatch_Icon_FINAL-03.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/047d6e62-ec74-4053-958f-18f2ed365a5d/SUSEX_ICONS_FINAL-30.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8a450f3a-aff1-4148-b790-edc007292a5f/TNG_ICONS_MONITOR-04.png</image:loc>
      <image:title>Solution Updates - May 9, 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-25-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-5-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/december-5-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-10-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/august-25-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/august-1-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-01</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/june-26-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-25-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/391087bc-7217-40a5-bef8-d09c522ed65c/TNG_BANNERGRAPHICS_EXPRATING_FINAL_WHT.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - Make it stand out</image:title>
      <image:caption>This report comprehensively assesses an organization's external attack surface, categorizing vulnerabilities based on their priority levels. Using a High, Medium, Low, and Informational scale, it identifies the critical risks that require immediate attention and potential areas for improvement. By prioritizing external vulnerabilities, security teams can focus on addressing the most significant threats, enhancing overall cybersecurity posture.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1684950071708-IO5MZHKSYUS8TQHL5FCE/Screenshot+2023-05-24+at+1.31.19+PM.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - eXposure Priority Report - High</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1684950071711-4Q5S4EPQ9ZH32KM4G1N1/Screenshot+2023-05-24+at+1.31.32+PM.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - eXposure Priority Report - Medium</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1684950072438-EJEF0NOHT4HRNZ22E18Y/Screenshot+2023-05-24+at+1.31.54+PM.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - eXPosure Priority Report - Low</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd2b822a-ada6-4550-a735-c7adf25b4718/TNG_BANNERGRAPHICS_EXPSUM_FINAL_WHT.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - Make it stand out</image:title>
      <image:caption>The eXposure Summary report offers a holistic view of an organization's external digital footprint and online assets. It presents an inventory of all exposed assets, including domains, applications, APIs, databases, and other internet-facing resources. With this knowledge, security teams can develop strategies to protect critical assets and mitigate potential risks. These new reports enhance the ThreatNG platform's capabilities by delivering actionable insights, enabling organizations to proactively manage their external attack surface, protect against digital risks, and improve their overall security posture.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/da7bbb41-9e98-4e23-b539-332d06371755/Screenshot+2023-05-24+at+1.32.10+PM.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - Make it standfdout</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/TNG_SUBDOMAINTAKEOVERICON_FINAL_CLRBLK.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - Subdomain Takeover Susceptibility Assessment Enhancements</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eaf8d581-196c-4706-83c2-0b30bcb1751c/TNG_APIICON_FINAL-03.png</image:loc>
      <image:title>Solution Updates - May 25, 2023 - ThreatNG API</image:title>
      <image:caption>The new ThreatNG External Attack Surface Management (EASM), Digital Risk Protection (DRP), and Security Ratings API update introduce the capability to access and reference the X Susceptibility and eXposure Scores for any entity under investigation. With this API enhancement, users can retrieve the X Susceptibility and eXposure Scores, which provide valuable insights into specific entities' vulnerability and exposure levels. These scores are essential in assessing the potential risks associated with an entity and understanding its security posture. Accessing the API allows Users to seamlessly integrate this information into their systems, applications, or security workflows. This enables them to leverage the power of ThreatNG's scoring mechanism to evaluate the susceptibility of an entity to cyber threats and its overall exposure to potential attacks. The API provides a convenient and efficient way to obtain the X Susceptibility and eXposure Scores for in-depth analysis and decision-making. This update to the ThreatNG API further enhances the platform's capabilities, enabling users to leverage valuable scoring metrics to enhance their cybersecurity strategies and strengthen their defenses against potential threats.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-1-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
      <image:title>Solution Updates - May 1, 2023 - Make it stand out</image:title>
      <image:caption>Security Ratings</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2284f436-9752-4acf-8b17-cb0038d57679/Security+Ratings</image:loc>
      <image:title>Solution Updates - May 1, 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9d5b1863-e6b9-4c7a-ab00-3724cdf69edb/TNG_BANNERGRAPHICS_EXPRATING_FINAL_WHT.png</image:loc>
      <image:title>Solution Updates - May 1, 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/52e9c16b-c3fd-461d-9a24-5916cb2520ee/Priority.png</image:loc>
      <image:title>Solution Updates - May 1, 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d17a4553-1a20-4a88-a16c-ee92a4128a4e/Summary.png</image:loc>
      <image:title>Solution Updates - May 1, 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-23-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-13-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-6-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/november-30-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-20-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-30-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-12-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/august-22-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/july-27-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/july-7-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/june-15-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/june-7-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-26-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/may-22-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/april-22-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/march-22-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-22-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/february-2-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/january-11-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/december-21-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/november-19-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/november-15-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-12-2022</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/october-5-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-28-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-14-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-7-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/september-1-2021</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Knowledgebase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/User+Interface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/User+Experience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Risk+Appetite+and+Benchmarking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Platform+Administration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Policy+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Intelligence+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Collaborate+and+Manage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Reporting+and+Sharing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Investigation+Module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Continuous+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/category/Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Decentralized+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/FedRAMP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Amazon+Web+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Continuous+Threat+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Port+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Investigation+Streamlining</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/White+Label+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Granular+Result+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Application+Presence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Adversarial+Narrative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Web+Application+Firewall+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Knowledge+Base</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Customizable+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Software+Supply+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phishing+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SaaS+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Prezi+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Elevated+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Sensitive+Code+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dark+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Leak+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Web3+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Ransomware+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Role+Based+Access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/CEQ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phishing+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/CVE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/MITRE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Shadow+IT+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Continuous+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/GitHub+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/API+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Efficiency+Boost</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/App+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Tailored+Security+Approach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SBOM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Azure+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ESG+Criteria</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Ransomware+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Credential+Leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/NIST+800-53</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Third+Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ISO+27001</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Precise+Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Intelligence+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/BEC+and+Phishing+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Integration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Knowledge+Base</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Sentiment+and+Financials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Service+Accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Infostealer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Google+Cloud+Platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Prezi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Business+Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Strategic+Calm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Narrative+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Non-Human+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dark+Web+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/MITREATTACK</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Web+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/AI+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Risk+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Action+Calls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Legal+Grade+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vulnerability+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Tech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybercrime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Appetite+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SEC+Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/IoT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Breach+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Ransomware+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Alert+Fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Continuous+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SaaS+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/PCI+Compliance+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Domain+Mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/NHI+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Audit+Readiness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Ratings+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dynamic+Threat+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Enterprise+Capabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Tech+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/CISO+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phishing+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Security+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Identity+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Positive+Security+Indicators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SaaS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Clickable+Navigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Threat+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Customized+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/BINDatabase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/GitHub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Privacy+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Twitter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DPDPA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Context+Aware+Suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Fraud+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dark+Web+Mentions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Layoffs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/VPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Code+Repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Environment+Social+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Shadow+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Balanced+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Blindspots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Machine+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Bug+Bounty+Hunter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Breach+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/App+Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Map</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Online+Sharing+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Custom+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Secure+APIs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/BIN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vulnerability+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Breach+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Positive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Homoglyph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Demonstration+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/GCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Domain+Search+Activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ESG+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Domain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyberattack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/IT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Human+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Brand+Damage+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Compliance+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Transformation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Teams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Demonstration+Environment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Endpoint+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ESG+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SEC+Filings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Enterprise+Scalability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Executive+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Refined+Insight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Attack+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Technology+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Analyst+Burnout</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Supply+Chain+and+Third+Party+Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Email+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Geographic+Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Exploit+Chains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Email+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SaaS+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Gaps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Github</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Machine+to+Machine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Delta+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Informed+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/False+Positives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity+Reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Enhanced+Keyword+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Mobile+App+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Path+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DRPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SwaggerHub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Online+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Sentiment+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DarcUpdates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Report+Customization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DNS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Precision+Code+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DNS+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Connected+Organizations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Fiduciary</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Supply+Chain+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Known+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Ratings+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/New+Product</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Online+Sharing+Repositories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Continuous+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Administrative+Pages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ESG</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Product+Launch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Open+Bucket+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Microsoft+Entra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Infosecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/PCI+DSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Correlation+Evidence+Questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SOC+Efficiency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Adversary+Centric+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Third+Party+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Strategic+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Passive+Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/NIST</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Bank+Identification+Number</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Landscape</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Ransomware+Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Compromised+Credentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Identity+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/DRP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vendor+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/POPIA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Search+Engine+Activity+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Code+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/NISTCSF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/API+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SOC2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Takedown+Guidance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/TPRM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Securities+and+Exchange+Commission</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Advanced+Backend+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Assets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Default+Ports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phishing+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Domain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Microsoft+Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Takeover+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Contextual+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Content+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cybersecurity+Risk+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Facebook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/SecOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/WHOIS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/IP+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Azure+AD+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Social+Media+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Subdomain+Hijacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Third+Party+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Phone+Numbers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Sustainability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Domain+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Associated+Organizations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Paste+Sites</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Web+Application+Hijack+Susceptibiity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dynamically+Generated+Questionnaire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Update</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/ESG+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Web+Application+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/API+Abuse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Non+Human+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/MFA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Exfiltration+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Search+Engine+Exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/NHI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+GRC+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/HIPAA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vendor+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Vendor+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Account+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/AppSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Enterprise+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Risk+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dark+Web+Presence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+Security+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Data+Leak+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Attack+Surface+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Breach+and+Ransomware+Susceptibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Sentiment+and+Financials+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Strengths</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/External+Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Proactive+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Digital+Risk+Prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Security+Leader</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Risk+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cloud+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Proactive+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Cyber+Risk+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcupdates/tag/Nuanced+Language+Understanding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d4afe84c-51c1-48a1-a285-c19cfcf00027/ThreatNG_Profiles_Danon+Vaughn.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/746ea246-252c-46f8-990c-f5fbf58c6ebf/ThreatNG_Profiles_Erin+Price_07.18.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/141b87ca-caef-47b1-a98e-696383a78a06/ThreatNG_Profiles_Virginia+Mayo+Policarpio_Kyndryl_08.08.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/049c3e93-1562-4b3e-b9fa-f59053857a1b/ThreatNG_Profiles_Don+Valdez_the+Media+Trust_08.08.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4aa0488c-2f8a-4d16-a9be-63c74bc5b1e2/ThreatNG_Profiles_07.25_Jen+%282%29.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6aaad18b-dbfd-42f4-a5ac-3150443805dc/ThreatNG_Profiles_Jose+Zae+Rodriguez_Per+Scholas_07.25.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/de9f502e-8bd0-4f9d-81cc-e4fb0d7c2083/ThreatNG_Profiles_Godfrey+Campanella_BD_08.15.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7d8e5411-efbc-41e4-8344-a1065b788ba7/ThreatNG_Profiles_Shiannah+Makeson_Atlantic+Health_08.01.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/096a090b-f734-44d2-98e3-a69d17ea6a8d/ThreatNG_Profiles_Jen+LaDesuyi-Williams_Princeton_08.01.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8809ed8a-2918-43fa-b66a-4e5ae72267f0/ThreatNG_Profiles_Dave+Sushi+Francisco_Per+Scholas_07.25.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fc1d236b-3744-4afa-a3f9-adc2cd222002/ThreatNG_Profiles_John+Bernardo_07.18.23.jpg</image:loc>
      <image:title>Two Way Tuesdays</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8741f427-e643-4558-899e-0890d5a4d831/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/meaning-what-episode-3-the-strangest-secret</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/meaning-what-episode2-nothing-compares-2-her</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/meaning-what-episode-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692046660830-DUYPQZ33DF3WHS7CEZ30/ThreatNG_Branded+Entertainment_Meaning+What_Ep1+Chekhovs+Gun_08.08.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - MEANING … WHAT? Episode 1: “Chekhov’s Gun”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692046670181-QGC1GPESS46JVK4YPVOW/ThreatNG_Profiles_Don+Valdez_the+Media+Trust_08.08.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - MEANING … WHAT? Episode 1: “Chekhov’s Gun”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692046676080-XOCRJTD1XUS3OARPKCCX/ThreatNG_Profiles_Virginia+Mayo+Policarpio_Kyndryl_08.08.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - MEANING … WHAT? Episode 1: “Chekhov’s Gun”</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-8-wannacry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/affb5b84-98d1-41cb-896d-3d2f06e8993b/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep+8+Wannacry_09.12.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 8: “WannaCry” - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-7-passing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c05c9182-b282-4335-9148-613285944955/I+AM+NOT+A+BOT+by+ThreatNG+Security+EASM%2C+Digital+Risk+Protection%2C+Security+Ratings</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 7: “Passing” - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-6-ram-space</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a528846c-f8df-4ffd-8f55-94b6dc7da3ac/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep+6+RAM+Speace+R1_08.29.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 6: “RAM Space” - Make it stand out</image:title>
      <image:caption>I AM NOT A BOT Episode 6: “RAM Space”</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-5-alpha-omega</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/db65f814-9483-40b8-b4e2-48de838b30d5/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep5+Alpha+Omega_08.22.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 5: “Alpha Omega” - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-4-unknowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692046885889-KGZO5QQF9CEWTUJSGQ25/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep4+Unknown_08.15.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 4: “(Un)Knowns”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692046890962-YT278WWZWUBF3AVT1DUJ/ThreatNG_Profiles_Godfrey+Campanella_BD_08.15.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 4: “(Un)Knowns”</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692045695272-83N1EHRYB1Y57EWUDWFO/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep3+The+Birthday+Paradox_08.01.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode. 3: “The Birthday Paradox”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692045703145-5WCCXW3OKT545YOOQWL8/ThreatNG_Profiles_Jen+LaDesuyi-Williams_Princeton_08.01.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode. 3: “The Birthday Paradox”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692045712511-N5AGAWKYK68P5OZR239I/ThreatNG_Profiles_Shiannah+Makeson_Atlantic+Health_08.01.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode. 3: “The Birthday Paradox”</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692043376188-FX63NJXZJP0DNS5Y5EB4/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep2+No+Doubt_07.25.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 2: “No. Doubt.”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692043385236-ZKSU65Y8LIRI5NBDYMB5/ThreatNG_Profiles_Dave+Sushi+Francisco_Per+Scholas_07.25.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 2: “No. Doubt.”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692043396532-PPAEY59XV0L02QXTBDTJ/ThreatNG_Profiles_Jose+Zae+Rodriguez_Per+Scholas_07.25.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT Episode 2: “No. Doubt.”</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/i-am-not-a-bot-episode-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692042565074-813K03AEZ1B0V0VLH85P/ThreatNG_Branded+Entertainment_I+Am+Not+a+Bot_Ep1+fr_07.18.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT: Episode 1 “fr”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692042593541-Q4VIOFU2C0IGMHAK20IB/ThreatNG_Profiles_John+Bernardo_07.18.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT: Episode 1 “fr”</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1692042610995-WJ3LUSYAIRUQTGD51BVH/ThreatNG_Profiles_Erin+Price_07.18.23.jpg</image:loc>
      <image:title>Two Way Tuesdays - I AM NOT A BOT: Episode 1 “fr”</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/I+AM+NOT+A+BOT+Episode+2%3A+%E2%80%9CNo.+Doubt.%E2%80%9D</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/External+Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/I+AM+NOT+A+BOT+Episode.+3%3A+%E2%80%9CThe+Birthday+Paradox%E2%80%9D</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/Cybersecurity+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/Security+Ratings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/category/I+AM+NOT+A+BOT%3A+Episode+1+%E2%80%9Cfr%E2%80%9D</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Regret</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Self-Reflection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Introspection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Unknown+Unknowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Online+Resources</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Doubt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Language+Models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Apprehension</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Kill+Switch</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Anxiety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Supportive+Community</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Self-Doubt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Phishing+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Intrusion+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cross-Site+Scripting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Family+Relationships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Zero-Day+Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Discord+Chat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cultural+Symbols</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Ransomware+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Decision-Making</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cultural+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Virtual+Private+Network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Event+Logs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Networking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Hesitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Continuous+Self-Improvement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Familial+Connection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Resource+Requirements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Self-Improvement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/SIEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Tech+Terminology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Retirement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Security+Information+and+Event+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Sentimentality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Belonging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Loss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Connection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Hashing+Algorithms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/OPNSense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Curiosity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Family</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Data+Carving</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Sense+of+Purpose</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Header+Manipulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Coping+Mechanism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Unknown+Knowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Legacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Work-Life+Balance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Load+Balancing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/System+Performance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Incident+Response+Phases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Threat+Quadrants</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Personal+Identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Nostalgia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/SQL+Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Technologies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Memories</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Logging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Musical+Interpretation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Known+Unknowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Black+Swan+Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/SQL+Query</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Preparedness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Camaraderie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Heritage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Family+Bonding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Birthday+Paradox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Love</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Intrusion+Detection+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Solarwinds+Cybersecurity+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Malicious+Processes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Grief</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Uncertainty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Acceptance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Closure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Hospice+Care</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Reverse+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Software+Updates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Friendship</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Nation-State+Hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Weak+Passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Sense+of+Humor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/VPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Malicious+Code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Zoom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Connection+to+Loved+Ones</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Personal+Growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/XML+Injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Recognition+of+Others</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Reinforcement+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Web+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Humor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Security+Terminology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Malware+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Known+Knowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Addiction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Diversity+and+Inclusion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Cybersecurity+Terminology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Isolation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/two-way-tuesdays/tag/Journaling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/executive-impersonation-protecting-the-c-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/rogue-ssl-certificates-shadow-passports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/public-cloud-machine-images-the-game-over-leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/shadow-saas-and-4th-party-scripts-the-hidden-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/domain-name-permutations-taken-with-active-mx-records</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/cloud-bucket-data-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/validated-subdomain-takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/invisible-employee-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Digital+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cyber+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Managed+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Rogue+Certificates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Brand+Safety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Executive+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/LinkedIn+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Supply+Chain+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Wildcard+Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Social+Media+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Phishing+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Digital+Skimming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Security+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Email+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Leak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Ecommerce+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/MitM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Dangling+DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/DNS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Shadow+SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Business+Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/CSPM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Identity+Theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Web+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Networking+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Vendor+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cloud+Storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Marketing+Tech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Subdomain+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Domain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cloud+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/VIP+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/DevOps+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Third+Party+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/SSL+Certificate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Google+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/PKI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Identity+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/MSSP+Growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Managed+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Server+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cloud+Misconfiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Whaling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Public+AMI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/External+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Reputation+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/WAF+Bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Magecart</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Cyber+Governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/HTTPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/TLS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/CEO+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Data+Breach+Prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/DMARC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Certificate+Transparency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/SSL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/S3+Bucket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/JavaScriptSecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/MSSP+Business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Domain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/for-mssps/tag/Client+Side+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/detect-pre-staged-adversary-infrastructure-weaponized-domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/automate-developer-breadcrumb-discovery-source-code-recon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/automate-shadow-api-discovery-orphaned-subdomains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/automate-shadow-cloud-bucket-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/automate-material-weakness-correlation-financial-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/validated-ghost-subdomain-takeover-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/automate-nhi-discovery-mobile-apps-personal-repos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Material+Weakness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Digital+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Hardcoded+Secrets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Subdomain+Enumeration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cyber+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/SEC+Filings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Threat+Intel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cloud+Storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Subdomain+Takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cookie+Tossing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Black+Box+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Domain+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Red+Teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/BOLA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Bug+Bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Azure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Strategic+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Data+Leakage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Pen+Test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Financial+OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Misconfiguration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Mobile+App+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Ghost+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Credential+Harvesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cloud+Config</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Dangling+DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/XSS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/SaaS+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/External+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/API+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Data+Breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/GitHub+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Web+AppSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Red+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/MFA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Reverse+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/WebSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Boardroom+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Reconnaissance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/AppSec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Public+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Source+Code+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Mobile+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Non-Human+Identities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Information+Disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Secret+Scanning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Vulnerability+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/API+Keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Adversary+Infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Business+Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/DevSecOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/GCP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Orphaned+Subdomain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/S3+Bucket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Open+Source+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Weaponized+Domains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Web+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Pre-Staged+Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-pen-testers/tag/Shadow+API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/expanding-service-portfolio-with-risk-fabric-api</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/closing-deals-with-pre-meeting-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/bypassing-the-registrar-blockade-with-legal-grade-attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/eliminating-the-false-positive-tax-with-threatng-veracity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/proving-continuous-roi-with-continuous-validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/accelerating-time-to-value-with-instant-asset-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/preemptive-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/build-vs-partner-threat-intelligence-economics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Vice+President+of+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/COO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Vice+President+of+Partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/VP+of+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/VP+of+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/VP+of+Partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/CEO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Head+of+Customer+Success</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Chief+Operating+Officer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Vice+President+of+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Chief+Executive+Officer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/Vice+President+of+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/category/VP+of+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Operational+Efficiency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Digital+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Typosquatting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Abuse+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Go+To+Market</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Managed+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Evidence+Collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Digital+Risk+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/B2B+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Tech+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Channel+Partners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Asset+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Lead+Generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Business+Growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Anti+Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Business+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Preemptive+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Time+to+Value</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Takedown+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber++Law</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Competitive+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/SaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/False+Positives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Attack+Surface+Visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Perimeter+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/OEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Client+Retention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Revenue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Product+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Analyst</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/MRR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Phishing+Takedown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Risk+Quantification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/SOC+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Domain+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Registrar+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Executive+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Dark+Web+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Client+Onboarding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Presales+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Tech+Stack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/External+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Operations%5C</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/SOC+Efficiency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+ROI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Customer+Succcess</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Domain+Takedown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/External+Attack+Surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/DRP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Strategic+Alliances</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/White+Label</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Vulnerability+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Legal+Grade+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Fast+Time+to+Value</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Attribution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Brand+Reputation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Takedown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Alert+Fatigue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cost+Reduction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/MDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/SecOps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Regulatory+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Rapid+Deployment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Risk+Reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Sec+Ops</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Exposure+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Social+Selling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/CISO+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/ROI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Sales+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Phishing+Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cyber+Resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Managed+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Threat+Triage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/External+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Digital+Footprint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Revenue+Stream</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Scalability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/CTEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Attack+Path</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Value+Selling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Embedded+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Proof+of+Value</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/OEM+Partnership</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Risk+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Shadow+IT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/EASM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Onboarding+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Pre+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Win+Rates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/External+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Exploit+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Attack+Surface+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Security+Sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Continuous+Validation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Service+Portfolio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Sales+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Online+Brand+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Dark+Web+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Asset+Inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/API</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Cloud+Discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-for-brand-protection-partners/tag/Sales+Enablement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-led-growth-hub</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-led-growth-hub/solve-deal-slippage-security-triggers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-led-growth-hub/b2b-intent-data-erosion-mirage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-led-growth-hub/security-led-growth-white-paper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-led-growth-hub/win-ai-arms-race-verifiable-truth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/home-old</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7287dbcb-d7ea-4732-8189-5c3c843eb8b9/External+Attack+Surface+Management+%28EASM%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1680972642215-VO88ND45EJGF143Y3B6P/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1681500661353-8S68428W3AIFT6O9MITF/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1597452665288-EK2U4ETHIB4DPAOBI956/Digital+Risk+Protection+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682438032893-P27U3XSY526HAYFX2YBZ/BEC+and+Phishing+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b569cc75-dc45-4b1f-b643-6261baf3d01a/Contact+ThreatNG+Security</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/43a4335e-6f7a-47ba-a161-eda63ec3ce97/TNG_SUPPORT-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcsightlabs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10bc0270-122f-4610-a302-a83ecfb18336/TNG_ICONS_12.19.25_DARCSIGHT+LABS-07.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1619210547036-RBVKMUNS5XXPT9J53Z13/Data+Aggregation+Reconnaissance+Crew+for+the+Secure+Information+Gathering+of+Holistic+Threats</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/crosshairs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1620648470959-LO19R5Y2IM7JS8TSVSFF/CROSSHAIRS_LOGOWHT_FINAL-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ec353bae-5b51-422b-ad9f-73fac527f64a/TNG_ICONS_11.28-14.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-presence-triad</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bdb4464b-8ade-4ddb-a069-c01d41efdfee/TNG_ICONS_DIGPRESTRIAD_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/manage</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Collaborate and Manage Digital Risks, Exposures, and Vulnerabilities</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Collaborate and Manage Digital Risks, Exposures, and Vulnerabilities</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Collaborate and Manage Digital Risks, Exposures, and Vulnerabilities</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Collaborate and Manage Digital Risks, Exposures, and Vulnerabilities</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eea7c7f1-7005-4da8-b7df-644e6a299ff7/Collaboration+Management+Remediation+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6ea616f8-7882-46e3-aed7-b5774be007d4/Correlation+Evidence+Questionnaire+CEQ+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1032d63d-b168-460b-b124-bea056c611c1/Correlation+Evidence+Questionnaire+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa572ae0-cfe8-4809-9ad6-bb4ef4c6b668/Certainty+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c02638d2-0b95-48e8-af57-367688cad03c/RISKAPPETITE_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e321f183-7307-4e5c-b399-04fbd4d6ca70/Policy+Management+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a911fdf7-fd54-4ff5-a1f1-f8b9f5c30b20/TNG_ROLEBASEDACCESSICON_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b06c6aac-a385-4c5b-aa67-1d2741756385/API+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/product-index</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Product</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Product</image:title>
      <image:caption>Assess, Examine, and Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Product</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5ea084db-38df-42a0-a6ca-5f304feda9e1/ThreatNG_Report.jpeg</image:loc>
      <image:title>Product</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Product</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/support</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f6ac8e0e-3682-4438-8a87-648775501b61/ThreatNG+DarcUpdates</image:loc>
      <image:title>Digital Risk and External Attack Surface Management Support - Make it stand out</image:title>
      <image:caption>Data Aggregation Reconnaissance Component Updates</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/43a4335e-6f7a-47ba-a161-eda63ec3ce97/TNG_SUPPORT-01.png</image:loc>
      <image:title>Digital Risk and External Attack Surface Management Support</image:title>
      <image:caption>DarcSight</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/solutions-index</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7287dbcb-d7ea-4732-8189-5c3c843eb8b9/TNG_USECASE_EXTATTACK_C.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>External Attack Surface Management (EASM)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b757097-4a06-4193-bc1f-0a5fe69477ff/TNG_CloudSaaSRiskManagement.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Cloud and SaaS Exposure Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633198505410-V1P69TUYDG0M86F85770/TNG_THIRDPARTY.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Third Party Risk Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1680972642215-VO88ND45EJGF143Y3B6P/TNG_DigitalRiskManagement.jpg</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Digital Risk Protection</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1681500661353-8S68428W3AIFT6O9MITF/TNG_SecurityRating.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Security Ratings</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633206261380-0I2CRZXAQQBIZRU5T879/TNG_USECASE_BRANDREP.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Brand Protection</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633203162527-37418L73J5F5A27D8HQA/TNG_USECASE_DUEDILIGENCE.png</image:loc>
      <image:title>Solutions</image:title>
      <image:caption>Due Diligence, Onboarding, and Integration</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/resources-index</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b9bba060-6aea-4d3e-a4bb-ecd1dea76b76/TNG_022825_ICONS_BLOG-24.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Blog</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e1e2b02e-bba7-41a3-b602-2efef8399b6b/TNG_022825_ICONS_LIBRARY-23.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Library</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/22e5a73d-1e59-4c94-8993-5f436efa565a/TNG_022825_ICONS_SUPPORT-22.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Support</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d6d9b759-0fca-4682-8420-dfe83eaa0d47/TNG_022825_ICONS_DARCUPDATE-25.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Solution Updates</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/230b9b81-7d4a-4695-acf3-24cd737190e9/TNG_ICONS_INVESTIGATION-04.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Investigation Modules</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f7fe3dc-f352-446d-a845-f92391d8b6ab/TNG_ICONS_11.28-15.png</image:loc>
      <image:title>Resources</image:title>
      <image:caption>Intelligence Repositories (DarCache)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/about-index</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1599004589169-Q9N2JU4GBK299AV7CSQ1/LOGOwBG-01.png</image:loc>
      <image:title>About</image:title>
      <image:caption>Story, Mantra, Nickname, About, Mascot</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/745d3b1d-f8db-459f-9a28-4815072c98fe/TNG_SUPPORTB-01.png</image:loc>
      <image:title>About</image:title>
      <image:caption>Contact</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1770393900928-4DIAOF33NV5XHEQ9RLYW/DARCSIGHT_SCENARIOS_FINALS-43.png</image:loc>
      <image:title>About</image:title>
      <image:caption>DARC Playlist</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/research-index</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10bc0270-122f-4610-a302-a83ecfb18336/TNG_ICONS_12.19.25_DARCSIGHT+LABS-07.png</image:loc>
      <image:title>Research - ThreatNG Digital Risk Protection, External Attack Surface Management, and Asset Discovery</image:title>
      <image:caption>DarcSight Labs</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633215907557-WM1816D6H71BJRNOZOW0/OSINT_MAINICONB_FINAL_LORES-01.png</image:loc>
      <image:title>Research - ThreatNG Digital Risk Protection, External Attack Surface Management, and Asset Discovery</image:title>
      <image:caption>Open Source Intelligence (OSINT) R&amp;D</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2846e46c-cdff-4da5-a62a-95263d774c90/TNG_ICONS_DIGPRESTRIAD_FINAL-03.png</image:loc>
      <image:title>Research - ThreatNG Digital Risk Protection, External Attack Surface Management, and Asset Discovery</image:title>
      <image:caption>Digital Presence Triad (FBI)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a1868d65-7797-4515-8d31-17db6e5d2f8f/TNG_ICONS_12.19.25_FUNCTIONAL+ASSETS-08.png</image:loc>
      <image:title>Research - ThreatNG Digital Risk Protection, External Attack Surface Management, and Asset Discovery</image:title>
      <image:caption>Functional Assets and Pillars</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c849dd5a-96a3-436d-913e-8a6699d44a6a/TNG_022825_ICONS_OPEN+SOURCE+DATA+PROJECT-26.png</image:loc>
      <image:title>Research - ThreatNG Digital Risk Protection, External Attack Surface Management, and Asset Discovery</image:title>
      <image:caption>Open Source Repository Effort</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/library</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8f0905fe-7408-4646-8dc2-bde1c86848f0/Screen+Shot+2021-12-23+at+8.05.10+PM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>ThreatNG Datasheet</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8c3cc735-7ce3-465c-9a1b-412c3daf224f/Screenshot+2024-08-27+at+3.54.49%E2%80%AFPM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>NIST Cybersecurity Framework and ThreatNG</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/42bfde85-f140-4c9b-b605-52ef298bac8f/Glossary.jpg</image:loc>
      <image:title>Library</image:title>
      <image:caption>Glossary</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1670442116904-39ZTUG2IQVN5EU3VLTTJ/Cloud_SaaS_Datasheet.jpg</image:loc>
      <image:title>Library</image:title>
      <image:caption>Cloud and SaaS Exposure Module Datasheet</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3ded2562-79a8-4744-a36f-27dcb31ef1ae/Screenshot+2024-09-10+at+4.56.20%E2%80%AFPM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>ThreatNG Capabilities MITRE ATT&amp;CK Mapping Document</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1640307795312-NOK7UHFUDXQIZG6WRVWF/Screen%2BShot%2B2021-12-23%2Bat%2B8.00.32%2BPM.jpg</image:loc>
      <image:title>Library</image:title>
      <image:caption>Automating OSINT, OPSEC, and Dark Web Research: Putting Information in Everyone's Hands</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4313782a-d54c-47df-a1a4-dc1da22d83a0/TPRM_ThreatNG_Datasheet.jpg</image:loc>
      <image:title>Library</image:title>
      <image:caption>Third Party Risk Management Datasheet</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bca07a12-087f-4fa9-99ac-9280ff1d32d0/Screenshot+2024-11-09+at+3.39.18%E2%80%AFPM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>ThreatNG Capabilities Microsoft Entra MITRE ATT&amp;CK Mapping Document</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fcb03c5c-7d30-4bb0-86fe-80dc56f2db9b/Screenshot+2025-09-15+at+4.03.27%E2%80%AFPM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>How ThreatNG Revolutionizes Vendor Risk Management for Organizations of All Sizes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48bb1457-d3a9-4ed8-8b25-61e484c6773b/Screenshot+2024-12-02+at+2.44.23%E2%80%AFPM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>NY State Cybersecurity Requirements and ThreatNG</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9da6ee02-3c10-4dcc-8ba0-0bbde9697d64/Screenshot+2025-01-17+at+9.18.56%E2%80%AFAM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>World Economic Forum's Global Cybersecurity Outlook 2025 and ThreatNG</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/82c9648e-3022-4c1e-b33e-9f790aa07d41/Screenshot+2025-03-20+at+11.06.48%E2%80%AFAM.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>ThreatNG: A Comprehensive Solution for Supply Chain Risk Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739228671749-SCRC7EB69SYHQ1UL3AQ1/TNG_ICONS_BRANDPROTECTION_FINAL-03.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Brand Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Penetration Testing FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Cybersecurity Audit FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa3f9d79-4616-4e2a-b983-bc74c0e5d907/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>Vendor Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/TNG_062325_ICONS_PCI+C.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>PCI Qualified Security Assessor (QSA) FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/TNG_062325_ICONS_PCI+C.png</image:loc>
      <image:title>Library</image:title>
      <image:caption>PCI Approved Scanning Vendors (ASVs) FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/28ac9b2c-76ec-485d-b083-f652e2f1b23b/ThreatNG+Frequently+Asked+Questions+One+Sheets+Data+Sheets+Capability+Mapping+Documents+Documentation+Glossary+White+Papers</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/functional-assets-pillars</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acdb81a7-34c5-4fa6-b745-6ea56e66d23c/SECURITYCENTRIC_TECHICON-01.png</image:loc>
      <image:title>Functional Assets and Pillars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dbc09a91-4d01-4bed-a6cd-d16abefb4bc5/SECURITYCENTRIC_STRATEGICICON-01.png</image:loc>
      <image:title>Functional Assets and Pillars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/06f6061d-6eba-4fd1-a784-a7b489175167/SECURITYCENTRIC_OPSICON-01.png</image:loc>
      <image:title>Functional Assets and Pillars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/054d5c07-9952-4f83-b862-b9d41d87f873/SECURITYCENTRIC_FINANCIALICON-01.png</image:loc>
      <image:title>Functional Assets and Pillars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a1868d65-7797-4515-8d31-17db6e5d2f8f/TNG_ICONS_12.19.25_FUNCTIONAL+ASSETS-08.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/investigation-modules</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852179724-2F6JAQD02PWCLKBTL9TJ/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/556efcc4-1905-4ac1-a7ac-18e94ccd9cf1/TNG_SLIDE_BLUE-01.jpg</image:loc>
      <image:title>Investigation Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/70977eb0-01a0-4f4d-9102-f5b41fa9cf31/TNG_ICONS_INVESTIGATION-04.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/techstack</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Technology Stack Investigation</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/64090aef-ff96-4081-97b0-4415e4d22326/Technology+Stack+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/89ea5329-1f1f-4956-8f3f-dfb6544b57d1/TNG_DOMAININTELLIGENCE_ICONS_FINALS_VENDORS+AND+TECH+copy+2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/412f677d-6b43-4a03-9434-2d704e554251/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/050e4743-01ac-496a-8da9-cc1f81254ceb/Mobile+App+Exposure</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/code-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Code Repository Discovery and Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/934aa747-cdb6-4764-b08a-a01d229bd52d/Sensitive+Code+ExposureExternal+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/643a9aff-82b8-4449-a98a-c6673ec0d737/Code+Repository+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Discovery+and+Assessment+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/web-archives</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Online Sharing</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Archived Web Pages</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/616fe045-4854-4258-8cb2-d551080477de/Archived+Web+Pages+Social+Media+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/online-sharing-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Online Sharing Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dec0c4b8-81b8-4a18-82d5-ed38abe0d394/Online+Sharing+Exposure+Paste+Sites+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77fec8e5-5064-49e9-987e-2160d847d6a5/Online+Sharing+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/search-engine-exploitation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Search Engine Exploitation</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d52d9d37-ac91-4aed-a400-498977b23d2d/Search+Engine+Exploitation+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27cc2816-8440-4e24-b980-953530b28b00/Website+Control+File+Exposure+robots.txt+security.txt+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/40c9944e-58e4-4edf-96e8-d5f974f10fcd/Search+Engine+Attack+Surface+Dork+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sentiment-financials-module</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Sentiment and Financials Investigation</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6b0d4c59-1f9e-45e7-8d83-ca864facbbd2/Sentiment+and+Financials+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1676148606073-E73F8Y3YQP63V9ZKCQ9G/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8182d140-f7ed-490f-8057-318a990846d0/Lawsuits+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/06c55a9e-15fd-4fbe-be93-c97d9665a7fd/Layoff+Chatter+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e8aaf0b-6fbb-40c9-8080-5c885806939e/News+and+Negative+News+for+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+andSecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8087986c-3ace-476d-a12d-655efadbdb0b/United+States+SEC+Filings+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/story</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1fab7709-83d9-42fd-a554-b028d4280323/SECURITYCENTRIC_COG.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea3d6c17-babd-4a91-b742-864996e757b1/DarChain.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3ccb3bb7-cfb7-433e-abba-765a420f6a75/Public-Facing_Infratructure.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c8b84ed5-c16a-4cd6-88ef-b4db37cbfa8a/ISO+27001+Compliance+Mapping.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/59ba219e-7f06-4e9c-be33-709737944e4e/NHI_Exposure.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e8690783-ba16-48f3-9961-c2de74e3b3d9/DarcSight%3A+Digital+Risk+and+Attack+Surface+Champion</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-presence-glossary</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ceq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Correlation Evidence Questionnaire</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Correlation Evidence Questionnaire</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Correlation Evidence Questionnaire</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Correlation Evidence Questionnaire</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d57444ad-2c93-458f-821b-7df9364c483f/TNG_BANNERGRAPHICS_DARCRADAR_FINAL-WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e6826c42-b0fd-4ddd-bca3-97cde3909307/TNG_ICONS_11.28-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-takeover</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Subdomain Takeover Susceptibility Assessment</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Subdomain Takeover Susceptibility Assessment</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Subdomain Takeover Susceptibility Assessment</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Subdomain Takeover Susceptibility Assessment</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/TNG_SUBDOMAINTAKEOVERICON_FINAL_CLRBLK.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ec4ba59c-332c-47eb-84cf-da039bb6ae6e/Subdomain+Takeover+Susceptibility+Security+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e141de2-a56c-466d-94c5-c0e7788f22da/Subdomain+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/89ea5329-1f1f-4956-8f3f-dfb6544b57d1/Domain+Records+DNS+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96349441-42ea-4a32-8edf-c560373a8f42/Technology+Stack</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/412f677d-6b43-4a03-9434-2d704e554251/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/050e4743-01ac-496a-8da9-cc1f81254ceb/Mobile+App+Exposure</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cloud</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Cloud and SaaS Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0f36e8db-b35d-465d-986f-2e6ea0f4abe8/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/403afa57-f279-4c45-8227-1f5de7eb06a9/NOCONNECTORS_BUTTON.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69dab6a9-e8bc-4201-b7a6-960c676b08ed/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/56aef5be-01c0-4119-80c3-2e7b81f0f783/SaaS+Discovery+and+identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bc25f9e8-c4d2-4476-9f78-665205d7634c/Takeover_Chain.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/404</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Intelligence Repositories</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/03a438eb-2171-424e-b220-ada368b23b9c/Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/32af1e03-5b79-46bb-944f-1e215c6b0fe0/Intelligence+Repository+Threat+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/knowledgebase</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>ThreatNG Security Knowledge Base</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>ThreatNG Security Knowledge Base</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>ThreatNG Security Knowledge Base</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>ThreatNG Security Knowledge Base</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/08bf746c-3dd4-459b-af25-d15b85e930ca/TNG_ICONS_KNOWLEDGE-04.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-dark-web</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Dark Web Intelligence Repository - DarCache Dark Web</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f627829b-24b8-436d-b6c5-c122b37fba1e/DC_LOGO_FINAL_WHTTRANS.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d20fea21-1784-4920-93e5-647c7593e128/Dark+Web+Intelligence+Repository+for++External+Attack+Surface+Management%2C+Digital+Risk+Protection%2C+and+Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-ransomware</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Ransomware Intelligence Repository - DarCache Ransomware</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4948bf0e-0017-45a5-91c6-3f9f607ad800/Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e93750f-eb4e-453b-82f8-0ca2bfabb19e/Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-rupture</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Compromised Credentials Intelligence Repository - DarCache Rupture</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c92d66a3-c98e-4f74-bf78-ead52baf334f/DC_RUPTURE_WHITE_FINAL-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/02a9e3d1-c463-4fdb-bce0-1f910f29096f/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/esg</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/df7f283e-281b-470e-8b3d-440f76f7610e/TNG_ESG_ICONS_FINAL_TRNSP-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/ESG+Exposure+Score+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ecd4dca2-8442-4177-876d-e51c77196f4e/ESG+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1ff044f7-c52d-4d58-9041-9f8886de5168/Sentiment+and+Financials+Investigation+Module+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/86ded58d-7005-4551-8253-39a048b2acea/TNG_ESG_ICONS_FINAL_TRNSP-10.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b9688e71-1050-461c-a72e-6554b2fe8c97/TNG_ESG_ICONS_FINAL_TRNSP-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1fc19789-1cdc-4ca0-9333-ff6af5cdc660/TNG_ESG_ICONS_FINAL_TRNSP-12.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/TNG_ESG_ICONS_FINAL_TRNSP-09.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/evaluate</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7287dbcb-d7ea-4732-8189-5c3c843eb8b9/TNG_USECASE_EXTATTACK_C.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>External Attack Surface Management (EASM) -- Experience our External Attack Surface Management (EASM) solution and see how you can benefit from its full capabilities. Free for a limited time!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1680972642215-VO88ND45EJGF143Y3B6P/TNG_DigitalRiskManagement.jpg</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Digital Risk Protection (DRP) -- Experience our Digital Risk Protection (DRP) solution and see how you can benefit from its full capabilities. Free for a limited time!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eaa89cd9-749f-4381-a9eb-9e70928d891b/TNG_CloudSaaSRiskManagement.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Cloud and SaaS Exposure Management -- Experience our Agentless Cloud and SaaS Discovery and uncover any Exposed Open Cloud Buckets firsthand. Free for a limited time!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2f61d009-90df-45b5-8726-e3defc832f23/TNG_THIRDPARTY.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Third Party Risk Management -- Experience the ThreatNG Third Party Risk Management Discovery, Assessment, Reporting, and Monitoring of Third Parties firsthand! Free for a limited time!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69eb4442-3532-4f30-87db-bc51255d1920/TNG_USECASE_BRANDREP.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Brand Protection -- Evaluate where you may be vulnerable to attacks, damage, or other negative impacts on reputation and business through the discovery and assessment of all digital brand assets free for a limited time.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee2490cc-a6b7-4036-a6ce-44173d41266d/TNG_USECASE_DUEDILIGENCE.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Due Diligence -- Evaluate the digital due diligence capabilities that take advantage of the external attack surface management, digital risk assessment, and security ratings capabilities of ThreatNG free for a limited time.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1681500661353-8S68428W3AIFT6O9MITF/TNG_SecurityRating.png</image:loc>
      <image:title>Evaluate ThreatNG Security</image:title>
      <image:caption>Security Ratings -- Experience our Security Ratings solution and see how you can benefit from its full capabilities. Free for a limited time!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/23a6b974-a175-4ae2-96b0-ab7b77cc5888/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea3d6c17-babd-4a91-b742-864996e757b1/DarChain.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/External+Mobile+App+Security+Discovery+Assessment+Reporting+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darkweb-mentions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1f28362-5371-48c0-ba88-7ca38494d85b/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ecd4dca2-8442-4177-876d-e51c77196f4e/DC_LOGO_FINAL_WHTTRANS.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1f28362-5371-48c0-ba88-7ca38494d85b/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/External+Vulnerability+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e93ec7-69ff-4bff-8e16-fe0db21bfd75/National+Vulnerability+Database+NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e11bef51-4ac4-498c-8a66-671607d7c385/Exploit+Prediction+Scoring+System+EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e6d3aa6-f3ef-41bc-b5bf-0148fb5080c1/Known+Exploited+Vulnerability+KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/21686977-e5ee-42d1-b087-0d53f728d453/Proof-of-Concept+POC+Explpioit+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2a3eaee9-f204-4a7b-b1cd-746c684002af/Exploit+and+Vulnerability+Intelligence.</image:loc>
      <image:title>Vulnerability</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ransomware</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-11-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a322976-46dc-416b-bd48-efb8b00e7208/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Ransomware</image:title>
      <image:caption>Breach and Ransomware Susceptibility Score: Susceptibility assessment to security breaches and ransomware attacks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/13f6b778-7ef2-4125-9e0c-565bf648b19c/TNG_ICONS_11.28-15.png</image:loc>
      <image:title>Ransomware</image:title>
      <image:caption>Ransomware Intelligence Repository: Searchable intelligence repository of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dfa4b229-4ef1-4535-a44d-f87ab54bab9b/TNG_ICONS_RANSOMSUS-04.png</image:loc>
      <image:title>Ransomware</image:title>
      <image:caption>Ransomware Report: A dynamically generated document that thoroughly examines an organization's vulnerability to ransomware, using the ThreatNG Breach and Ransomware Susceptibility Score to evaluate its digital footprint and attack surface while also spotlighting various Ransomware Infection Vectors such as Internet-Facing Vulnerabilities, Misconfigurations, Phishing, Precursor Malware Infection, and risks associated with Third Parties and Managed Service Providers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e3b6daa-06a3-4806-8bb9-5ecf4aa5d1be/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Ransomware</image:title>
      <image:caption>Dark Web Presence Investigation Module: Investigation module that discovers and reports on ransomware events, dark web mentions (people, places, and things), and compromised credentials.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/60147484-65de-44c3-89ac-efa3cf7eb691/TNG_DARCACHE_ICONS_FINAL_TRNS-03.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/compromised-credentials</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3bfa752a-5b00-49fd-a80e-748a0e5c92e1/TNG_DARCACHE_ICONS_FINAL_TRNS-07.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ecd4dca2-8442-4177-876d-e51c77196f4e/DC_LOGO_FINAL_WHTTRANS.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1f28362-5371-48c0-ba88-7ca38494d85b/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darkweb</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Dark Web Presence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1f28362-5371-48c0-ba88-7ca38494d85b/Dark+Web+Presence+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/60147484-65de-44c3-89ac-efa3cf7eb691/Ransomware+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3bfa752a-5b00-49fd-a80e-748a0e5c92e1/Compromised+Credentials+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1f28362-5371-48c0-ba88-7ca38494d85b/Dark+Web+Mentions+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Dark+Web+Presence+Investigation</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/usecases</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/asset-inventory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/asset-inventory-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/breach-and-attack-simulation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/certificate-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cloud-and-security-governance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/data-leakage-detection-use-case</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-asset-inventory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/due-diligence-use-case</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-vulnerability-assessment-and-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/incident-response-and-investigations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/risk-assessment-for-mergers-and-acquisitions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subsidiary-and-third-party-security-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/supply-chain-third-party-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vulnerability-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/grc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/account-takeover</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-08</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-protection-use-case</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-footprinting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/fraud-campaigns</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/advanced-assessment-planning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cyber-risk-appetite-definition</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cybersecurity-performance-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/incident-response-automation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/it-infrastructure-hygiene</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/merger-and-acquisition</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/own-enterprise-and-subsidiary-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/procurement</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/program-validation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/remote-workforce</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/reputational-risk-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/request-for-proposal</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-compliance-gaps</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-readiness</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/shadow-it</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/situational-awareness</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/supply-chain-monitoring-and-visualization</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/supply-chain-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/third-party-portfolio-diagnostic-and-prioritization</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/third-party-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vendor-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vendor-due-diligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vendor-onboarding</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/esg-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/TNG_ESG_ICONS_FINAL_TRNSP-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/01bcf6cb-fa17-4dde-bb00-88766b03a7b5/Subdomain+Takeover+Susceptibility+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/supply-chain-third-party-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b10b041-0948-4a74-a371-f97e3643e823/Supply+Chain+and+Third+Party+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+and+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/web-application-hijack-susceptibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9431b302-f8b4-4215-95f5-5d1822c2dd75/Web+Application+Hijacking+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijack+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/policy-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/risk-and-performance-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/compliance-adherence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cybersecurity-risk</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/fourth-party-vendor-risk</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/fourth-party-supply-chain-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-misuse-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/data-leakage-discovery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-footprint-and-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/counterfeit-and-fraud-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/phishing-prevention</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/advanced-email-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-abuse-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/data-and-credential-leakage-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dark-web-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-attack-mitigation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/executive-impersonation-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-asset-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Overview</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c739c033-938e-46dc-a4ee-6f1de5a25fa8/ThreatNG+Security+External+Exposure+Management+Holistic+Digital+Presence+External+Risk+Threat+intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5035b570-781c-4677-b69c-babea7c94a45/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/732aa1cc-b09b-466b-a84f-3edc319d7644/TNG_ICONS_12.1.25_CONTEXT+ENGINE-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/403afa57-f279-4c45-8227-1f5de7eb06a9/NOCONNECTORS_BUTTON.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/230b9b81-7d4a-4695-acf3-24cd737190e9/Investigation+Modules</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81854e90-4651-48b8-8169-0db5bc1d0be1/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/597156ed-40e4-4a94-abfe-d5514c0cb66f/Domain+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/052acb89-f657-4c0a-8c84-aea470bd75de/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7e24b255-a3f9-495c-a3e1-11e20a2edd00/Sensitive+Code+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/275f52b9-c0a1-41f4-801b-45ff546ad92a/Dark+Web++Ransomware+Gangs+Compromised+Credentials</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b186208-64bb-4f72-a933-6c3dd00f4f2b/Social+Media</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3c4e319e-9bc1-4697-8057-810a8c9768e1/Sentiment+Financials</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ed9e53c3-5b50-4414-bbdf-2dc59bf5ee07/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bc25f9e8-c4d2-4476-9f78-665205d7634c/DarChain+Attack+Path+Intelligence++Analysis</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/External+Mobile+App+Security+Discovery+Assessment+Reporting+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-01-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7287dbcb-d7ea-4732-8189-5c3c843eb8b9/External+Attack+Surface+Management+%28EASM%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1680972642215-VO88ND45EJGF143Y3B6P/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1681500661353-8S68428W3AIFT6O9MITF/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1597452665288-EK2U4ETHIB4DPAOBI956/Digital+Risk+Protection+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/External+Mobile+App+Security+Discovery+Assessment+Reporting+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1741111707505-LWFFFWKIBIE61R8VI83T/ThreatNG+Solution+Updates</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c7664863-2c19-46ec-934e-7b75b11ba7b1/DU_LOGO_FINAL-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/97e33538-bc28-4e10-844c-27b1f9ad696f/Cloud+and+SaaS+Exposure+Discovery%2FAssessment+for+External+Attack+Surface+Management</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/services-empowerment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Security Service Provider Empowerment</image:title>
      <image:caption>Dark Web Monitoring: Cybercriminal operations, such as the purchasing and selling exploits, hacking tools, and stolen data, are concentrated on the Dark Web. By accessing ThreatNG's Dark Web intelligence repository, the consultancy can gather valuable insights into emerging threats, new attack vectors, and potential vulnerabilities that may affect their clients. This information allows the consultancy to proactively protect clients' sensitive data and infrastructure by implementing appropriate security measures.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Security Service Provider Empowerment</image:title>
      <image:caption>ESG Violations: Environmental, Social, and Governance (ESG) factors are increasingly crucial for organizations in managing risks and meeting regulatory requirements. ThreatNG's ESG intelligence repository provides information on security incidents, regulatory compliance issues, and reputational risks related to ESG factors. The consultancy can leverage this intelligence to assess and address potential threats to clients' ESG profiles, ensuring alignment with industry best practices and compliance standards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Security Service Provider Empowerment</image:title>
      <image:caption>Ransomware Events: Ransomware attacks have become a significant concern for organizations globally. ThreatNG's repository of ransomware events offers real-time information on attack trends, tactics, and indicators of compromise. The consultancy can utilize this intelligence to enhance its incident response capabilities, develop effective mitigation strategies, and assist clients in preparing for and defending against ransomware threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Security Service Provider Empowerment</image:title>
      <image:caption>Compromised Credentials: Credential theft and compromised user accounts are prevalent security issues. ThreatNG's compromised credentials repository helps the consultancy identify whether their clients' credentials have been compromised in previous data breaches. By monitoring and alerting clients to compromised credentials, the consultancy can support proactive actions such as password changes, multi-factor authentication implementation, and user awareness training to mitigate the risk of unauthorized access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Security Service Provider Empowerment</image:title>
      <image:caption>Known Vulnerabilities: ThreatNG's repository of known vulnerabilities provides the consultancy with up-to-date information about software and system weaknesses that threat actors can exploit. The security service provider uses this information to identify and rank the most dangerous vulnerabilities to its clients. The firm may help clients by applying patches, putting mitigations in place, and lowering the risk of successful attacks by staying informed about known vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/nist-cybersecurity-framework</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f04cf677-e355-4635-b248-f1dbb13a4a51/NIST+Cybersecurity+Framework+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings+Mapping+Document</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/services-empowerment-a</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Security Services Empowerment (A)</image:title>
      <image:caption>Dark Web Monitoring: Cybercriminal operations, such as the purchasing and selling exploits, hacking tools, and stolen data, are concentrated on the Dark Web. By accessing ThreatNG's Dark Web intelligence repository, the consultancy can gather valuable insights into emerging threats, new attack vectors, and potential vulnerabilities that may affect their clients. This information allows the consultancy to proactively protect clients' sensitive data and infrastructure by implementing appropriate security measures.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Security Services Empowerment (A)</image:title>
      <image:caption>ESG Violations: Environmental, Social, and Governance (ESG) factors are increasingly crucial for organizations in managing risks and meeting regulatory requirements. ThreatNG's ESG intelligence repository provides information on security incidents, regulatory compliance issues, and reputational risks related to ESG factors. The consultancy can leverage this intelligence to assess and address potential threats to clients' ESG profiles, ensuring alignment with industry best practices and compliance standards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Security Services Empowerment (A)</image:title>
      <image:caption>Ransomware Events: Ransomware attacks have become a significant concern for organizations globally. ThreatNG's repository of ransomware events offers real-time information on attack trends, tactics, and indicators of compromise. The consultancy can utilize this intelligence to enhance its incident response capabilities, develop effective mitigation strategies, and assist clients in preparing for and defending against ransomware threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Security Services Empowerment (A)</image:title>
      <image:caption>Compromised Credentials: Credential theft and compromised user accounts are prevalent security issues. ThreatNG's compromised credentials repository helps the consultancy identify whether their clients' credentials have been compromised in previous data breaches. By monitoring and alerting clients to compromised credentials, the consultancy can support proactive actions such as password changes, multi-factor authentication implementation, and user awareness training to mitigate the risk of unauthorized access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Security Services Empowerment (A)</image:title>
      <image:caption>Known Vulnerabilities: ThreatNG's repository of known vulnerabilities provides the consultancy with up-to-date information about software and system weaknesses that threat actors can exploit. The security service provider uses this information to identify and rank the most dangerous vulnerabilities to its clients. The firm may help clients by applying patches, putting mitigations in place, and lowering the risk of successful attacks by staying informed about known vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/services-empowerment-c</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-07-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Security Services Empowerment (C)</image:title>
      <image:caption>Dark Web Monitoring: Cybercriminal operations, such as the purchasing and selling exploits, hacking tools, and stolen data, are concentrated on the Dark Web. By accessing ThreatNG's Dark Web intelligence repository, the consultancy can gather valuable insights into emerging threats, new attack vectors, and potential vulnerabilities that may affect their clients. This information allows the consultancy to proactively protect clients' sensitive data and infrastructure by implementing appropriate security measures.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Security Services Empowerment (C)</image:title>
      <image:caption>ESG Violations: Environmental, Social, and Governance (ESG) factors are increasingly crucial for organizations in managing risks and meeting regulatory requirements. ThreatNG's ESG intelligence repository provides information on security incidents, regulatory compliance issues, and reputational risks related to ESG factors. The consultancy can leverage this intelligence to assess and address potential threats to clients' ESG profiles, ensuring alignment with industry best practices and compliance standards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Security Services Empowerment (C)</image:title>
      <image:caption>Ransomware Events: Ransomware attacks have become a significant concern for organizations globally. ThreatNG's repository of ransomware events offers real-time information on attack trends, tactics, and indicators of compromise. The consultancy can utilize this intelligence to enhance its incident response capabilities, develop effective mitigation strategies, and assist clients in preparing for and defending against ransomware threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Security Services Empowerment (C)</image:title>
      <image:caption>Compromised Credentials: Credential theft and compromised user accounts are prevalent security issues. ThreatNG's compromised credentials repository helps the consultancy identify whether their clients' credentials have been compromised in previous data breaches. By monitoring and alerting clients to compromised credentials, the consultancy can support proactive actions such as password changes, multi-factor authentication implementation, and user awareness training to mitigate the risk of unauthorized access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Security Services Empowerment (C)</image:title>
      <image:caption>Known Vulnerabilities: ThreatNG's repository of known vulnerabilities provides the consultancy with up-to-date information about software and system weaknesses that threat actors can exploit. The security service provider uses this information to identify and rank the most dangerous vulnerabilities to its clients. The firm may help clients by applying patches, putting mitigations in place, and lowering the risk of successful attacks by staying informed about known vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/services-empowerment-m</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-07-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Security Services Empowerment (M)</image:title>
      <image:caption>Dark Web Monitoring: Cybercriminal operations, such as the purchasing and selling exploits, hacking tools, and stolen data, are concentrated on the Dark Web. By accessing ThreatNG's Dark Web intelligence repository, the consultancy can gather valuable insights into emerging threats, new attack vectors, and potential vulnerabilities that may affect their clients. This information allows the consultancy to proactively protect clients' sensitive data and infrastructure by implementing appropriate security measures.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Security Services Empowerment (M)</image:title>
      <image:caption>ESG Violations: Environmental, Social, and Governance (ESG) factors are increasingly crucial for organizations in managing risks and meeting regulatory requirements. ThreatNG's ESG intelligence repository provides information on security incidents, regulatory compliance issues, and reputational risks related to ESG factors. The consultancy can leverage this intelligence to assess and address potential threats to clients' ESG profiles, ensuring alignment with industry best practices and compliance standards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Security Services Empowerment (M)</image:title>
      <image:caption>Ransomware Events: Ransomware attacks have become a significant concern for organizations globally. ThreatNG's repository of ransomware events offers real-time information on attack trends, tactics, and indicators of compromise. The consultancy can utilize this intelligence to enhance its incident response capabilities, develop effective mitigation strategies, and assist clients in preparing for and defending against ransomware threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Security Services Empowerment (M)</image:title>
      <image:caption>Compromised Credentials: Credential theft and compromised user accounts are prevalent security issues. ThreatNG's compromised credentials repository helps the consultancy identify whether their clients' credentials have been compromised in previous data breaches. By monitoring and alerting clients to compromised credentials, the consultancy can support proactive actions such as password changes, multi-factor authentication implementation, and user awareness training to mitigate the risk of unauthorized access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Security Services Empowerment (M)</image:title>
      <image:caption>Known Vulnerabilities: ThreatNG's repository of known vulnerabilities provides the consultancy with up-to-date information about software and system weaknesses that threat actors can exploit. The security service provider uses this information to identify and rank the most dangerous vulnerabilities to its clients. The firm may help clients by applying patches, putting mitigations in place, and lowering the risk of successful attacks by staying informed about known vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/private-equity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-08-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Private Equity</image:title>
      <image:caption>The Dark Web Intelligence Repository can help private equity portfolio managers by providing valuable insights into potential cybersecurity risks and threats that could impact their portfolio companies. It allows portfolio managers to monitor the Dark Web for mentions of their portfolio companies' data, compromised credentials, or planned cyber attacks. By staying informed about illicit activities and emerging threats on the Dark Web, portfolio managers can proactively assess the cybersecurity posture of their portfolio companies, identify vulnerabilities, and take necessary measures to mitigate risks. This enables them to protect sensitive information, enhance the security of their investments, and make informed decisions regarding cybersecurity strategies and risk management.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Private Equity</image:title>
      <image:caption>The ESG (Environmental, Social, and Governance) Violation Intelligence Repository can help private equity portfolio managers by providing critical information and insights related to potential violations of ESG criteria by portfolio companies. It monitors various sources to identify instances where a company's practices may conflict with ESG standards, such as environmental regulations, labor laws, or ethical business conduct. By leveraging this repository, portfolio managers can stay informed about ESG-related risks and assess the sustainability and responsible practices of their investments. This intelligence enables portfolio managers to make informed decisions, engage with portfolio companies on ESG matters, address compliance issues, and align investments with their ESG goals and values. Ultimately, the repository helps portfolio managers integrate ESG considerations into their investment strategies, mitigate risks, and enhance long-term value creation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Private Equity</image:title>
      <image:caption>The Ransomware Events Intelligence Repository can assist private equity portfolio managers by providing valuable insights into ransomware incidents that may impact their portfolio companies. It collects and analyzes data related to past ransomware events, including the tactics used, affected industries, and mitigation strategies employed. By leveraging this repository, portfolio managers can stay informed about the evolving ransomware landscape, assess the potential risks faced by their portfolio companies, and implement proactive measures to strengthen cybersecurity defenses. This intelligence enables portfolio managers to develop incident response plans, enhance security protocols, and work closely with portfolio companies to prevent, detect, and effectively respond to ransomware attacks. Ultimately, the repository helps portfolio managers protect their investments, minimize financial losses, and maintain the trust of stakeholders in the face of ransomware threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Private Equity</image:title>
      <image:caption>The Compromised Credentials Intelligence Repository can assist private equity portfolio managers by providing valuable insights into compromised login credentials that may pose a risk to their portfolio companies. It collects and analyzes data from various sources to identify instances where employee or customer credentials have been compromised, leaked, or sold on the dark web. By leveraging this repository, portfolio managers can stay informed about potential security breaches, assess the extent of credential compromise within their portfolio companies, and take proactive measures to mitigate the risks associated with unauthorized access or account takeover. This intelligence enables portfolio managers to strengthen authentication mechanisms, implement multi-factor authentication, and educate employees and customers on best practices for securing their login credentials. Ultimately, the repository helps portfolio managers enhance the overall cybersecurity posture of their portfolio companies and safeguard sensitive data from unauthorized access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Private Equity</image:title>
      <image:caption>The Known Vulnerabilities Intelligence Repository can assist private equity portfolio managers by providing valuable insights into existing vulnerabilities that may pose security risks to their portfolio companies. It collects and analyzes data from various sources, including security researchers, vendors, and industry reports, to identify known software, systems, or infrastructure vulnerabilities. By leveraging this repository, portfolio managers can stay informed about potential weaknesses within their portfolio companies' technology stack, assess the severity and impact of these vulnerabilities, and take proactive measures to address them. This intelligence enables portfolio managers to prioritize patching and security updates, conduct vulnerability assessments, and implement mitigation strategies to reduce the risk of exploitation by malicious actors. Ultimately, the repository helps portfolio managers enhance the overall cybersecurity posture of their portfolio companies and protect against potential cyber threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/credit-unions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Credit Unions</image:title>
      <image:caption>Dark Web Monitoring: By monitoring the dark web, Credit Unions can proactively identify potential security breaches, data leaks, and compromised credentials that may impact their organization or customers. This allows them to take immediate action to protect sensitive customer information and prevent unauthorized access. The intelligence repository also helps Credit Unions stay ahead of emerging threats and cybercriminal activities, enabling them to strengthen their security posture and mitigate risks. By leveraging this powerful tool, Credit Unions can enhance their cybersecurity, safeguard customer trust, and maintain operational resilience, ultimately improving business continuity and reputation in the financial industry.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Credit Unions</image:title>
      <image:caption>ESG Violations: The repository enables Credit Unions to monitor and identify instances of ESG violations within their operations or those of their partners. By proactively addressing these violations, Credit Unions demonstrate their commitment to ethical and responsible practices. This enhances their reputation as socially conscious institutions, attracting members who prioritize sustainability and ethical conduct. It also helps Credit Unions align with evolving regulatory requirements and industry standards. By leveraging the intelligence repository, Credit Unions can improve their ESG performance, strengthen stakeholder relationships, and position themselves as leaders in responsible banking. Ultimately, this helps to ensure long-term viability, client fidelity, and a favorable effect on the communities they serve.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Credit Unions</image:title>
      <image:caption>Ransomware Events: The repository enables Credit Unions to stay updated on the latest ransomware events and trends, allowing them to prepare and respond to potential attacks proactively. By leveraging this intelligence, Credit Unions can enhance their incident response capabilities, detect early signs of ransomware, and implement effective mitigation strategies. This helps minimize the impact of ransomware attacks, reduce downtime, and protect critical systems and data. Credit Unions can preserve trust, reputation, and member satisfaction by maintaining operational continuity and safeguarding member information. The intelligence repository empowers Credit Unions to stay one step ahead of cybercriminals, enabling them to navigate the evolving ransomware landscape with resilience and confidence.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Credit Unions</image:title>
      <image:caption>Compromised Credentials: The repository enables Credit Unions to detect compromised credentials associated with their members or employees proactively. By leveraging this intelligence, Credit Unions can swiftly take action to secure affected accounts, prevent unauthorized access, and protect sensitive information. This helps mitigate the risk of fraudulent activities, financial losses, and reputational damage. By promptly addressing compromised credentials, Credit Unions can maintain the trust and confidence of their members, ensuring their accounts and assets remain secure. Additionally, the intelligence repository aids in strengthening authentication measures, implementing multi-factor authentication, and promoting vital password hygiene. By leveraging this tool, Credit Unions can enhance their cybersecurity posture, prevent unauthorized access, and uphold the integrity of their member relationships.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Credit Unions</image:title>
      <image:caption>Known Vulnerabilities: The repository allows Credit Unions to proactively identify and address known vulnerabilities within their systems and infrastructure. By staying informed about the latest vulnerabilities and patches, Credit Unions can mitigate security risks and reduce the likelihood of successful cyber attacks. This helps protect sensitive customer data, maintain operational continuity, and preserve members' trust. Additionally, addressing known vulnerabilities enhances regulatory compliance, as Credit Unions can demonstrate their commitment to maintaining a secure environment. By leveraging the intelligence repository, Credit Unions can strengthen their cybersecurity defenses, minimize potential financial and reputational damage, and foster a proactive risk management culture.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dns-health</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/endpoint-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/hacker-chatter</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ip-reputation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/network-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/information-leak</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/patching-cadence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/social-engineering</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/compromised-systems</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/user-behavior</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/public-disclosures</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/diligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-ratings-categories</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-23</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/software-patching</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/web-encryption</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/system-reputation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/system-hosting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/breach-events</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/email-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dns-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/network-filtering</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/osint</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1681154931981-D16LRXM3D23PD5VB0ZAA/Open+Source+Intelligence+%28OSINT%29+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633216372849-MPDPLSDT3LJLABVJ2PZS/OSINT_MAINICON_FINAL_LORES-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/event-technology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-11-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f689e90-8d9c-4d6a-908a-bf3c44ed030d/OSINT_ICONS_BW_FINAL_LORES-09.png</image:loc>
      <image:title>Event Technology</image:title>
      <image:caption>Dark Web Monitoring: The Dark Web Intelligence Repository provided by ThreatNG's EASM, Digital Risk Protection, and Security Ratings is critical for addressing security concerns in the event industry. It continuously monitors the clandestine corners of the internet, where threat actors discuss and plan cyberattacks related to events and associated technologies. By providing early warnings and insights into emerging threats, this repository empowers organizations to proactively detect and mitigate potential risks, such as data breaches, fraud, and cyberattacks, thus ensuring the safety and security of event technologies and data, ultimately safeguarding the success and reputation of events.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Event Technology</image:title>
      <image:caption>ESG Violations: ThreatNG's ESG Violation Intelligence Repository, integrated with EASM, Digital Risk Protection, and Security Ratings, is pivotal in addressing security concerns within the event industry. Monitoring environmental, social, and governance (ESG) violations associated with event-related entities it helps organizations maintain ethical standards and compliance. This repository enables event organizers to ensure responsible conduct, protect their brand reputation, and align with attendee and partner expectations. By addressing ESG concerns, organizations mitigate reputational risks and maintain a secure and trustworthy environment for event technologies and participants, ultimately contributing to the overall success of events.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Event Technology</image:title>
      <image:caption>Ransomware Events: ThreatNG's Ransomware Events Intelligence Repository, integrated with EASM, Digital Risk Protection, and Security Ratings, offers invaluable insights to address security concerns across event technologies. This repository equips organizations to stay ahead of evolving ransomware threats by monitoring and providing real-time data on ransomware incidents. It enables proactive cybersecurity measures, reducing the risk of crippling ransomware attacks that can disrupt events and compromise sensitive data. This intelligence repository empowers organizations to fortify their defenses, protect event technologies, and safeguard their reputations and events' success.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Event Technology</image:title>
      <image:caption>Compromised Credentials: ThreatNG's Compromised Credentials Intelligence Repository and EASM, Digital Risk Protection, and Security Ratings offer a powerful tool to address security concerns in the event industry. It monitors compromised user credentials that could be exploited for unauthorized access to event-related systems. By proactively detecting compromised credentials, organizations can strengthen their authentication processes, enforce stringent security policies, and prevent malicious actors from accessing critical event technologies. This repository plays a pivotal role in ensuring the security and integrity of events by mitigating the risk of unauthorized access and associated security breaches.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Event Technology</image:title>
      <image:caption>Known Vulnerabilities: ThreatNG Known Vulnerabilities Intelligence Repository and EASM, Digital Risk Protection, and Security Ratings offer essential assistance in addressing security concerns within the event industry. It actively identifies and catalogs known vulnerabilities in event technologies and related software, enabling organizations to prioritize timely patches and updates. This proactive approach reduces the risk of successful cyberattacks and data breaches that could compromise the integrity of events. By regularly assessing and remediating vulnerabilities, organizations can maintain a strong security posture, ensuring the safety and success of their events and associated technologies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1bca4ab-1079-4f58-a4b4-c490db518eca/External+Attack+Surface+and+Digital+Risk+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-bin</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Bank Identification Number (BIN) Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c95fc8cf-97bd-45f9-8bcf-5f2ad497d399/DC_BIN_WHITE_FINAL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/24c14d03-3d15-4a76-926f-7a9c9aa887e8/Bank+Identification+Number+%28BIN%29+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ransomware-report</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a322976-46dc-416b-bd48-efb8b00e7208/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Ransomware Report</image:title>
      <image:caption>Breach and Ransomware Susceptibility Score: Susceptibility assessment to security breaches and ransomware attacks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/13f6b778-7ef2-4125-9e0c-565bf648b19c/TNG_ICONS_11.28-15.png</image:loc>
      <image:title>Ransomware Report</image:title>
      <image:caption>Ransomware Intelligence Repository: Searchable intelligence repository of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e3b6daa-06a3-4806-8bb9-5ecf4aa5d1be/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Ransomware Report</image:title>
      <image:caption>Dark Web Presence Investigation Module: Investigation module that discovers and reports on ransomware events, dark web mentions (people, places, and things), and compromised credentials.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1699653469346-4HM07W6QGDW531N5CHDX/Ransomware+Report+-+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Breach+and+Ransomware+Susceptibility+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3c9ce3d8-ffda-4603-ac7b-c7df71ac5bec/Internet+Facing+Vulnerabilities+and+Misconfigurations+Ransomware+Infection+Vector</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/Phishing+Ransomware+Infection+Vector</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b10b041-0948-4a74-a371-f97e3643e823/Third+Parties+and+Managed+Service+Providers+Ransomware+Infection+Vecto.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/insurance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-11-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d29965ad-b8d4-4a50-ae7f-9ec4cb01a766/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/open-source-data-repository</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4ceff1bd-dc1b-44ab-a627-e0a66ca0dd4e/Open-Source+Governance+and+Compliance+Dataset+Project</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1726663190325-HY9R341V1RG4IU1ETB5G/ESG+Filings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1726663190325-HY9R341V1RG4IU1ETB5G/ESG+Violations</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/91f6f628-cdf6-4e1d-8ec3-d70c3f21a9bb/Ethics+and+Governance</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/71498f68-e658-42c9-8762-1260045d097f/Privacy+Policies</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/84ff4cc5-20fb-42bc-ac97-270a0514dfde/Compliance+and+Trust</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6515e762-0841-481b-8f57-51f5d27ebed4/Careers+and+Jobs+Pages</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/45086b15-ba51-46ef-a81e-03edf591258c/Terms+of+Service</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4fa0d625-23d2-4211-8170-36ad12cbe44f/Security+Centric+Not+Security+Exclusive</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mdr</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/17e7e29b-41ab-40fa-bb82-83974190497c/DS_MASCOT_FULL.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sustainability</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/53ae6f2d-8cea-4fd2-81f9-b851ecba5a65/Sustainability+External+Attack+Surface+Management+%28EASM%29+Digital+Risk+Protection+%28DRP%29+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/51007213-cae4-472a-b0f2-d6615c123c86/Chief+Sustainability+Officer++External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1698414038245-DY5Z2FI2RZ7UGCQWVZMP/TNG_ICONS_ASSESS-04.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b10b041-0948-4a74-a371-f97e3643e823/Supply+Chain+Third+Party+Risk+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4bc3003f-60ff-4a9b-bbe2-c5d21398233e/Brand+Protection+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8baa2570-a4e4-46b1-a339-e1ed8b21ddc8/ESG+Risk+Assessment+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee30f660-0473-43fa-bfde-8ac8ccc76e0b/Data+Leak+Prevention+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c490ad72-4229-4dd8-a1d4-a4caf9ea314e/Continuous+Monitoring+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/de010f1d-5017-4f1f-93ba-1c93b3259ece/Knowledge+Base+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8980a6e2-7fe3-49b5-900c-5a7888cb6adb/Archived+Web+Pages+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1475aae-d0d3-413b-987e-573afd6e19cc/Dark+Web+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a8697c55-1d34-4dfc-ac49-28d18aebda91/Technology+Stack+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8980a6e2-7fe3-49b5-900c-5a7888cb6adb/Archived+Web+Pages+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f1475aae-d0d3-413b-987e-573afd6e19cc/Dark+Web+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mssp-sales-engineer-deal-winning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8980a6e2-7fe3-49b5-900c-5a7888cb6adb/Archived+Web+Pages+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4bc3003f-60ff-4a9b-bbe2-c5d21398233e/Brand+Damage+Susceptibility+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f643d32e-82e1-4865-b4cf-3904411c479d/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69e8b2f2-dea2-44e4-ac7b-35011dfad33e/Data+Leak+Susceptibility+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/60147484-65de-44c3-89ac-efa3cf7eb691/Breach+Ransomware+Susceptibility+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682438032893-P27U3XSY526HAYFX2YBZ/BEC+Phishing+Susceptibility+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7fb9821f-b70d-4b93-b04b-10f4cc966fab/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30f362f7-8076-4496-a5e6-a5ab1543aacd/TNG_USECASE_ICONS-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30f362f7-8076-4496-a5e6-a5ab1543aacd/Security+Ratings+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/70977eb0-01a0-4f4d-9102-f5b41fa9cf31/Investigation+Modules+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b82cfe1-6a37-4d3f-98d7-4ea82501b393/Security+Ratings+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c0be71e1-ec71-486b-bdcb-aad8aba6b44c/Reporting+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mssp-sales-engineer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10dff54c-23df-4cb6-95eb-de614f930eff/Gemini_Generated_Image.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0aaae809-e237-4c54-bcbf-4e9df8801569/Close+Deals+Faster.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/26fd779b-88cf-4cd3-aec1-bb835585e265/Strengthen+Cliente+Relationships.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/106d6bd2-770f-4f5e-9cf2-1177943c1ff5/Gemini_Generated_Image.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/814540aa-f7fb-41ae-849f-c4ebd0a04da1/MSSP+Sales+Engineer+Guide+to+Winning+Deals+MSSP+Managed+Security+Service+Provider+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mdr-sales-engineer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-03-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10dff54c-23df-4cb6-95eb-de614f930eff/Gemini_Generated_Image.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/883ac4d7-f923-430e-8d63-6c430dc0083d/TNG_USECASE_ICONS-07.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6750707f-a3f6-4586-bfa9-91a9953d7180/Digital+Risk+Protection+Managed+Detection+Response+MDR+Sales+Engineer</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/754ad26a-55aa-417e-8d7c-675b132656f6/Security+Ratings+Managed+Detection+Response+MDR+Sales+Engineer</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0aaae809-e237-4c54-bcbf-4e9df8801569/Close+Deals+Faster.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/090b5d9a-dd4d-40a0-a0c5-5129aedcba10/Managed+Detection+Response+MDR+Sales+Engineer+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/product-demonstration-video</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4c4c596-5493-454b-8b2d-f425f1d4484a/Product+Demonstration+Video+External+Attack+Surface+Management+%28EASM%29+Digital+Risk+Protection+%28DRP%29+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mssp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mdr-explainer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcradar</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Policy Management</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Policy Management</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Policy Management</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Policy Management</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/efb546a9-3e0b-4933-9d66-baeecb607862/TNG_BANNERGRAPHICS_DPT_FINAL-WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/RISKAPPETITE_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b101b8e-9cd9-4db5-b978-209dddd006e0/Customizable+Risk+Scoring+and+Configuration+Security+Ratings+Cyber+Risk+Ratings+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a97fbeac-97ed-4cc2-abb3-31e56588a51c/TNG_POLICYMANAGEMENT_ICONS-DYNAMIC-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7a855502-9685-4e3d-9a77-260098364061/TNG_POLICYMANAGEMENT_ICONS-POLICYEX-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6671877a-28a8-4146-983a-03d051b9ad00/TNG_POLICYMANAGEMENT_ICONS-POLICYTEMP-03.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/atp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f6193254-df7d-46e3-b089-c8534771a6d7/Advanced+Threat+Protection+Prospecting+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f10a9c47-1e77-4869-ada1-6867aeb6e477/Advanced+Threat+Protection+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0d462dfc-27b9-4122-94da-71c503c37443/Advanced+Threat+Protection+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/883ac4d7-f923-430e-8d63-6c430dc0083d/TNG_USECASE_ICONS-07.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6750707f-a3f6-4586-bfa9-91a9953d7180/Digital+Risk+Protection+Managed+Detection+Response+MDR+Sales+Engineer</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/754ad26a-55aa-417e-8d7c-675b132656f6/Security+Ratings+Managed+Detection+Response+MDR+Sales+Engineer</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b074dde2-ae3e-4d0b-a29e-e6643f06cd35/Advanced+Threat+Protection+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6904a98b-d4bd-4c34-ad57-defa86ad77ce/Advanced+Threat+Protection+Prospecting+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/36d1babc-fa6f-4b0a-b4df-d52a760a3b1c/Advanced+Threat+Protection+Customer+Retention+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c3c9118-7545-4873-9477-8c95442b41bd/Advanced+Threat+Protection+Upselling+and+Cross-Selling+with+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dcce3ee2-dbd7-4a3d-8b5a-2f6a4d2ccb66/Advanced+Threat+Protection+External+Attack+Surface+Management%2C+EASM%2C+DIgital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domains</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c597fbd4-995e-424f-b7f3-929a86569946/Domain+Intelligence+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/Domain+Overview+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/46e2ef7a-f728-4f64-ae92-0e659a812d2a/DNS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/965ba6c8-1249-47bc-b4b1-ee1e096aad11/WHOIS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973123794-NKJUSS7ZCU5ACK92IQLE/IP+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973891222-5CG6HNQZZ0QY5RX5LWOQ/Certificate+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/social-media</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Social Media</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7cda5b7-46a2-4a04-9b1f-41fbe973ff86/Social+Media+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/47f96426-0af5-4b08-9571-911027edb98f/Username+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5d71b93a-ccfe-4198-af61-1aad4ae280cd/Reddit+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1925794f-6025-4b22-9ad5-e278a53843c8/LinkedIn+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/continuous-visibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Continuous Visibility and Monitoring</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Continuous Visibility and Monitoring</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Continuous Visibility and Monitoring</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Continuous Visibility and Monitoring</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b8bb0456-6fa8-4913-b805-74362bfae60c/Continuous+Visibility+Monitoring+External+Attack+Surface+Management%2C+Digital+Risk+Protection%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/70977eb0-01a0-4f4d-9102-f5b41fa9cf31/Deep+Discovery+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/59450cb4-470e-4153-9606-758e42f48f95/Threat+Intelligence+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9e5a50de-81a2-43d4-ba69-c72094fe6157/Live+News+Feeds%2C+Domain+Search+Activity+Feeds%2C+and+Social+Media+Monitoring+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa572ae0-cfe8-4809-9ad6-bb4ef4c6b668/Certainty+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/report</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Report and Share</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Report and Share</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Report and Share</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Report and Share</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/384dd16b-88d8-4c8d-8d6b-cd183efe60d1/Reporting+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a73c5413-e93a-4d1d-8b46-841068fc2ace/Exective-Level+Reporting+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/570b85c4-7641-4b58-ad75-f5c6abf7315f/Technical+Detail+Reporting+for+Exective-Level+Reporting+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d01e8401-070d-4fbb-93aa-9b1b7a323f18/External+Contextual+Attack+Path+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ab6021dc-e783-42a9-ae2f-08d1db4cf509/TNG_BANNERGRAPHICS_EXPRATING_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fe453b53-8476-4714-bd50-9b158add32af/Prioritized+Reporting+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7d5087a5-33e6-480e-b548-57773540f9c1/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2ec5219f-59a2-4073-86ef-88ff584e47b5/Security+Ratings+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fde4b75e-8c09-4a44-9c62-096e1a3d633e/TNG_BANNERGRAPHICS_EXPSUM_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ccf1c6b0-5dbc-49c7-aa4d-96916930b944/Inventory+Reporting+for+Ransomware+Susceptibility+Report+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e6d105ac-5d8d-4293-9e3e-949798af80bb/Ransomware+Susceptibility+Report+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34aacabb-0d97-4d89-a5c5-e69b65a05cc2/United+States+Securities+and+Exchange+Commission+Filing+%28SEC%29+Report+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f8c26d3-47ca-4e23-bee9-032530b01103/External+SBOM+Software+Bill+of+Materials+xSBOM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c02638d2-0b95-48e8-af57-367688cad03c/RISKAPPETITE_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e321f183-7307-4e5c-b399-04fbd4d6ca70/Policy+Management+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/assess</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Assess, Examine, and Rate</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Assess, Examine, and Rate</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Assess, Examine, and Rate</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Assess, Examine, and Rate</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c5ccba67-6f42-48d6-8067-3b0e1a7b6861/External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/732aa1cc-b09b-466b-a84f-3edc319d7644/Context+Engine+for+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa572ae0-cfe8-4809-9ad6-bb4ef4c6b668/Certainty+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5d09500b-36b5-43a9-b4f3-e9c969b6f3a6/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/97eaa28f-3f6c-412d-ad96-4f4d6df99927/TNG_BANNERGRAPHICS_XSUSEX_FINAL_BLK.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fa297f4e-ada9-490d-b07f-c4a986f1b627/X+Susceptibility+and+eXposure+Security+Rating+Cyber+Risk+Rating+Scores</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a515aca-f786-4191-bfcc-f7e0b5b908c5/Supply+Chain+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+Security+Rating+NHI</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d01e8401-070d-4fbb-93aa-9b1b7a323f18/External+Contextual+Attack+Path+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/98dc1c0e-ee93-44fd-9bc1-9252b0beb1b8/Positive+Security+Indicators+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c02638d2-0b95-48e8-af57-367688cad03c/RISKAPPETITE_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e321f183-7307-4e5c-b399-04fbd4d6ca70/Policy+Management+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a9349d84-bdc1-43a6-ae7c-712571986952/TNG_BANNERGRAPHICS_EXPRATING_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fd883fd9-20ff-42f6-abb0-e269e59a4a10/Priority+Prioritization+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b7a8d71-fa8d-41b3-9901-1a2966662899/Advanced+Search+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/discover</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Discover and Inventory</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Discover and Inventory</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Discover and Inventory</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Discover and Inventory</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5ee27a62-743d-4016-9045-00927093355c/External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings+Discovery</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ad42cbe1-8670-4761-a149-12c7f4d3bd6f/DC_LOGO_FINAL_WHTTRANS.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3cdccad-3b74-4c99-9055-029fcab699be/Intelligence+-+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa572ae0-cfe8-4809-9ad6-bb4ef4c6b668/Certainty+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a010175e-ad00-4889-ad72-cb50b0d0c7f5/TNG_BANNERGRAPHICS_EXPSUM_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/74968bf3-8357-4bdd-9314-4e14e59690cd/Digital+Presence+Inventory+Report+-+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+and+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e321f183-7307-4e5c-b399-04fbd4d6ca70/Policy+Management+for+External+Attack+Surface+Management%2C+EASM%2C+Digital+Risk+Protection%2C+DRP%2C+Cybersecurity+Risk+Ratings%2C+Risk+Ratings%2C+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c02638d2-0b95-48e8-af57-367688cad03c/RISKAPPETITE_FINALS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41c2b19e-7d4e-42a9-8f20-a8bc89475d93/Reconnaissance+Hub+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-attack-surface-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fcf13b7f-e6fd-49c0-9452-31e099ce7efe/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/403afa57-f279-4c45-8227-1f5de7eb06a9/NOCONNECTORS_BUTTON.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bc25f9e8-c4d2-4476-9f78-665205d7634c/DarChain+External+Attack+Path+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+NHI+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b0a41bd-0121-4d74-98b5-22bb6da4a38f/Discover+and+Inventory+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940143f2-c41c-483b-97b7-5b74bf808cbd/Reports+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4680c08-5b88-4d67-87f8-f763c158125f/Continuous+Visibility+Monitoring+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-risk-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b724cef0-099d-4268-8c86-49a9b4309f76/DIgital+Risk+Protection+DRP+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b0a41bd-0121-4d74-98b5-22bb6da4a38f/Discover+and+Inventory+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940143f2-c41c-483b-97b7-5b74bf808cbd/Reports+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4680c08-5b88-4d67-87f8-f763c158125f/Continuous+Visibility+Monitoring+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/exposure-score</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1568ce90-8f80-4651-8e41-5cebfb46e83a/Digital+Presence+Exposure+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+Security+Rating+NHI</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a515aca-f786-4191-bfcc-f7e0b5b908c5/Supply+Chain+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-takeover-susceptibility-score</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/TNG_SUBDOMAINTAKEOVERICON_FINAL_CLRBLK.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8e295042-78f3-4762-a3ef-c8de5be7d678/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Subdomain+Takeover+Susceptibility+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Score+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/breach-and-ransomware-susceptibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/TNG_DARCACHE_ICONS_FINAL_TRNS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/TNG_SUBDOMAINTAKEOVERICON_FINAL_CLRBLK.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/data-leak-susceptibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/85d2b9c7-80c5-4803-baff-35cd99cba1ae/Data_Leak.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee30f660-0473-43fa-bfde-8ac8ccc76e0b/Data+Leak+Susceptibility+Security+Ratings++Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/bec-phishing-susceptibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/SUSEX_ICONS_FINAL-41.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8e295042-78f3-4762-a3ef-c8de5be7d678/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/TNG_ICONS_IMPACT_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating+Score.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-damage-susceptibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8365048a-adca-496f-8bdf-9c1303438939/SUSEX_ICONS_FINAL-44.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/TNG_ICONS_DIGPRESTRIAD_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/TNG_ICONS_IMPACT_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/NONHUMAN_DARCSIGHT_MASCOT-05.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cyber-risk-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30fbd53e-50f7-47d8-83a8-14f03c37d582/Cyber+Risk+Exposure+Security+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/TNG_ICONS_DIGPRESTRIAD_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30fbd53e-50f7-47d8-83a8-14f03c37d582/Cyber+Risk+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/676520ca-6a72-413f-a358-62729171685f/Subdomain+Takeover+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/asset-fingerprinting-and-contextualization</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-policy-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/continuous-security-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/exposure-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threat-hunting-and-investigations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/third-party-and-supply-chain-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/externally-facing-asset-inventory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/internal-asset-inventory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subsidiary-monitoring-mergers-acquisition-due-diligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/attack-surface-visibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/TNG_ICONS_BRANDPROTECTION_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/NONHUMAN_DARCSIGHT_MASCOT-05.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b5f5177e-80be-4aef-a9c8-0d24cb439716/Mobile+App+Exposure+Security+Security+Rating+for+Brand+Protection</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/due-diligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9543ab1f-2ea4-47da-8552-222f04e8a031/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940143f2-c41c-483b-97b7-5b74bf808cbd/Reports+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4680c08-5b88-4d67-87f8-f763c158125f/Continuous+Visibility+Monitoring+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b0a41bd-0121-4d74-98b5-22bb6da4a38f/Discover+and+Inventory+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+intelligence+Repository+Due+Diligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+Due+Diligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+Due+Diligence</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cloudexposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b0a41bd-0121-4d74-98b5-22bb6da4a38f/Discover+and+Inventory+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940143f2-c41c-483b-97b7-5b74bf808cbd/Reports+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4680c08-5b88-4d67-87f8-f763c158125f/Continuous+Visibility+Monitoring+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/Mobile+App+Exposure+Security+Rating++Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+Security+Rating+Cyber+Risk+Rating+NHI</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/waf-identification</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Web Application Firewall (WAF) Discovery and Identification</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aec7a225-c9f8-40e2-a831-e2237eb1ab7f/Web+Application+Firewall+WAF+Discovery+Identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/87e71781-50b9-47b8-aa34-2580348d80e0/External+Web+Application+Firewall+Discovery+and+Identification</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/saasqwatch</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>SaaS Discovery and Identification</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41704165-4d5a-418e-b0e8-f9aae94951b0/SaaS+Discovery+and+Identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/403afa57-f279-4c45-8227-1f5de7eb06a9/NOCONNECTORS_BUTTON.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/nonprofits</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/032bacda-4e8b-490a-af69-740fa8c9bc12/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cab7f709-734e-4b0f-9dbd-7ec6be60f4fd/Nonprofit+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4fce8afa-6b87-46f9-b79a-7b9484916aea/Nonprofit+BEC+and+Phishing+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/51b2bd5e-5bed-4610-84d7-5613476fe0c8/Nonprofit+Data+Leak+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fd991ea4-f984-43dd-b376-b19a16e2d280/Nonprofit+Cyber+Risk+Exposure+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c99cbbe2-ccbf-46c8-bb99-c3e5ac7e6aeb/Nonprofit+Continuous+Visibility+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4320d921-5061-4aaf-bc3c-6e611c935d97/Nonprofit+Digital+Risk+Protection+DRP</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7e9fd15-02d3-42b5-96a4-413c69a233e0/Nonprofit+Breach+and+Ransomware+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8161414c-5de1-4779-942a-74f4701d16d6/Nonprofit+Brand+Damage+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a950cea1-b463-4a92-8c61-894dcf48305f/Nonprofit+Web+Application+Hijack+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a969c74b-5f10-4cba-a5b2-1a84250086a1/Nonprofit+ESG+Exposure+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/78605bd1-1ce1-4900-bfbe-d5e87aad37e8/Nonprofit+Continuous+Reporting+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/230ad7cd-e72f-479f-b940-23c838688944/Nonprofit+Supply+Chain+Third+Party+Risk+Exposure+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8d7238bc-9c7c-4eaa-9712-5581808fa794/Nonprofit+Threat+Intelligence+Repositories</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/09349642-8d3c-4dcc-96ee-f57bef52d580/Nonprofit+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/230b9b81-7d4a-4695-acf3-24cd737190e9/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Risk+Rating+Investigation+Modules</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/01bcf6cb-fa17-4dde-bb00-88766b03a7b5/Nonprofit+Subdomain+Takeover+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5be82753-e0fb-40ba-8811-ed9861fa328e/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings+Demonstration</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/09b59a04-4751-473f-b919-bdd6b9cae5d3/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings+White+Paper</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a65399dc-2e0f-4990-b502-1ed722f07aac/Screenshot+2024-08-08+at+11.55.17%E2%80%AFAM.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/venture-capital</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e21aaa25-7134-4d99-95d0-443df4848102/Venture+Capital+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5be82753-e0fb-40ba-8811-ed9861fa328e/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings+Demonstration</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c201eb13-1f73-4476-bdb7-2feb314d1592/Venture+Capital+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/25809030-cf83-4470-b6a3-44ff411c3005/Venture+Capital+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+%28DRP%29++Security+Ratings+Cybersecurity+Risk+Ratings+Explainer+Video</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sspm</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-09-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9a7445b9-4113-46f5-92ec-accb611a978b/saas_security_posture_management.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/94c0bcb1-6ab4-4988-ab61-2e450654ff1c/SaaS+Security+Posture+Management+SSPM+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5be82753-e0fb-40ba-8811-ed9861fa328e/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings+Demonstration</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-esg</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>ESG Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/102b02cf-350b-45a9-bc40-8ddd350f6806/ESG+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d0a6f9e7-3b87-4cce-aec8-463fe225e04c/ESG+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Vulnerability Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8b2a5c2f-20d3-41c7-932c-2b04560b67b8/Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fb3b449a-dee7-4d2e-837e-60ed18891d7a/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e93ec7-69ff-4bff-8e16-fe0db21bfd75/National+Vulnerability+Database+NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e11bef51-4ac4-498c-8a66-671607d7c385/Exploit+Prediction+Scoring+System+EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e6d3aa6-f3ef-41bc-b5bf-0148fb5080c1/Known+Exploited+Vulnerability+KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/21686977-e5ee-42d1-b087-0d53f728d453/Proof-of-Concept+POC+Explpioit+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2a3eaee9-f204-4a7b-b1cd-746c684002af/Vulnerability+and+Exploit+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/tprm</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ae698447-5dfe-4ca2-8bfe-60eb8f69cf3b/Third+Party+Risk+Management+Intelligence+and+Monitoring+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/81bf7ad4-b6bc-4d03-8754-467ba29e3b4e/Investigation+Modules+Areas+Arenas+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+Third+Party+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+Security+Rating+Cyber+Risk+Rating+NHI</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b0a41bd-0121-4d74-98b5-22bb6da4a38f/Discover+and+Inventory+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940143f2-c41c-483b-97b7-5b74bf808cbd/Reports+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4680c08-5b88-4d67-87f8-f763c158125f/Continuous+Visibility+Monitoring+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f7bc453a-e879-49d1-8a4d-c0c7f6cf1f4b/Threat+Intelligence+Repository+Repositories+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/961f6531-7c79-4fb6-89f7-badcde28bacd/Dark+Web+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Environmental+Social+Governance+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/Infostealer+Intelligence+Repository+DarCache</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ddb52b02-979a-4a2c-b667-1fa23876f3fd/Compromised+Credentials+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5dcf491-11a7-441d-9773-7bee7a8946d0/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4127277e-3c46-4aa8-b6ea-c5ceec02d7ea/Vulnerability+Vulnerabilities+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/19730e1a-3d88-48e9-aa18-255a04c91914/Bank+Identification+Number+BIN+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Intelligence+Repository+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Threat+Intelligence+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threat-intelligence-and-response</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-abuse-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-performance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/partner-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vendor-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-bug-bounty</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Bug Bounty Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/25a0fec4-4070-42a6-a09c-9d6053bd7cbd/Bug+Bounty+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/671a7758-e5eb-4662-aef4-35253f6ec134/Bug+Bounty+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-8-k</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>8-K Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c949ef3a-935f-4006-a83d-4cc92b8df1eb/SEC+Form+8-K+Intelligence+Repository+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/TNG_ICONS_SEC-04.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dns-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>DNS Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/46e2ef7a-f728-4f64-ae92-0e659a812d2a/DNS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10ac726e-6b6a-4b1f-b4c6-7a078c101cfb/IP+Address+Discovery+and+Identification+in+Domain+Records</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/89ea5329-1f1f-4956-8f3f-dfb6544b57d1/Domain+Records+Vendors+and+Technology+Discovery+and+Identification</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738613122388-2EYLUYJY7RSABX5QGKAA/Domain+Name+Permutations+External+Attack+Surface+Management+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7d8c279f-036f-4d8f-8fd4-fa3fc2b9bdb6/Web3+Domain+Identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738613088205-GRJJ461Y3WBPH9SK4DYA/Email+Intelligence+Format+Prediction+External+Attack+Surface+Management+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ip-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>IP Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973123794-NKJUSS7ZCU5ACK92IQLE/IP+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/certificate-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Certificate Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973891222-5CG6HNQZZ0QY5RX5LWOQ/Certificate+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/whois-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>WHOIS Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7d424b9c-b819-4d4d-996a-59dc65c622c3/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-name-permutations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Name Permutations</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/195ea207-ff08-4dcb-861b-8a4d5a9e89f4/Domain+Name+Permutations+Typosquatting+Typosquat+Cybersquatting</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2afb9e89-fe39-41c0-b5ec-2d11c2530e8f/Domain+Name+Permutations.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/email-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Email Intelligence</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90c28879-9650-4b45-9623-e7a1f6cd2723/Email+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d8ba689-6551-48c7-b597-c6b3016f0814/NHI+Non+Human+Identity+Email+Exposure</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-content-identification</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Content Identification</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6fb8783f-0300-4613-aa0f-1f3ca7e76887/Sensitive+Access+Points+Domains+Subdomains+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c9859644-32ee-49fe-959f-ee8961d72333/Web+Applications+and+Functionality+Domain+Subdomain+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4cc83de8-810b-4589-a6c9-ce29f04d631f/Domain+Subdomain+Potential+Risks+and+Misconfigurations+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ad786938-2cca-4df1-a214-2ba8a2ef50e6/Third-Party+Code+and+Scripts+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/89dd2b44-1298-47ec-bfc3-63287104977f/Exposed+Contact+Information+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cybersecurity+Risk+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-infrastructure-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Infrastructure Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00f5cbcd-ae57-4ef3-bfdb-340c24e37f6e/Applications+Services+Subdomains+Domains+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3ae9d5c3-7d24-40dd-9473-4426b3ec2424/Data+Storage+and+Management+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/da5a2ff4-b825-49a2-892d-4c370125ff15/IoT+and+Embedded+Device+External+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8452dcfd-9077-49d3-9e02-cd9763101f6d/TNG_DOMAININTELLIGENCE_ICONS_FINALS_NETWORK+copy+2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-redirects</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Redirects</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-reconnaissance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Reconnaissance</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-header-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Header Analysis</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/subdomain-cloud-hosting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Subdomain Cloud Hosting</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f79e52e3-2490-4957-be00-12892191b897/Subdomain+Cloud+Hosting+Discovery+Assessment+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/46e2ef7a-f728-4f64-ae92-0e659a812d2a/TNG_ICONS_DNS-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96349441-42ea-4a32-8edf-c560373a8f42/Technology+Stack</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/412f677d-6b43-4a03-9434-2d704e554251/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/050e4743-01ac-496a-8da9-cc1f81254ceb/Mobile+App+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-presence-wordcloud</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Digital Presence Wordcloud</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/Digital+Presence+Wordcloud+Domain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/bug-bounty</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ecd4dca2-8442-4177-876d-e51c77196f4e/Vulnerability+intelligence+Repository+DarCache+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c597fbd4-995e-424f-b7f3-929a86569946/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/microsoft-entra</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Microsoft Entra</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00f5cbcd-ae57-4ef3-bfdb-340c24e37f6e/Microsoft+Entra+Identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Overview</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/Digital+Presence+Wordcloud+Domain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/43a050ed-ec23-48e5-9c7b-9ec84fc93443/Digital+Presence+Wordcloud+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/83c2c46f-560b-40ee-a378-ec8d51baac56/Bug+Bounty+Programs+Domain+intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00f5cbcd-ae57-4ef3-bfdb-340c24e37f6e/TNG_DOMAININTELLIGENCE_ICONS_FINALS_APPS+AND+SERVICES+copy+2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/SwaggerHub+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/credential-theft</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/financial-fraud</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/reputational-damage</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/malware-distribution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/typosquatting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/easm-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>EASM Frequently Asked Questions (FAQ)</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/External+Attack+Surface+Management+EASM+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cloud-saas-exposure-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Cloud and SaaS Exposure FAQ</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3ace159b-958f-42b8-bcfc-76bed93b08bb/Cloud+and+SaaS+Exposure+Management+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/third-party-risk-management-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Third Party Risk Management FAQ</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/Third+Party+Risk+Management+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/digital-risk-protection-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Digital Risk Protection FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/Digital+Risk+Protection+DRPS+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-ratings-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/TNG_ICONS_DUEDILIGENCE_FINAL-03.png</image:loc>
      <image:title>Security Ratings FAQ</image:title>
      <image:caption>Due Diligence FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/Security+Ratings+Cyber+Risk+Ratings+Frequently+Asked+Questions</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/brand-protection-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Brand Protection FAQ</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739228671749-SCRC7EB69SYHQ1UL3AQ1/Brand+Protection+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/due-diligence-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739136258098-53READEIB2SCIF7NXLVT/TNG_USECASE_ICONS-07.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>External Attack Surface Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739215416853-QP3GNJL9XGHQHH46T9JW/TNG_USECASE_ICONS-08.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Digital Risk Protection FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27e400bf-296f-4e3e-8a00-7e20241863d0/TNG_USECASE_ICONS-09.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Security Ratings FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/OSINT_ICONS_CLRBLK_FINAL_LORES-05.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Cloud and SaaS Exposure Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213798054-JHZVLBFIG0SRY8CSXS97/SUSEX_ICONS_FINAL-41.png</image:loc>
      <image:title>Due Diligence FAQ</image:title>
      <image:caption>Third Party Risk Management FAQ</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739282221370-JAFA979GT8DW0YP0ZUVW/Due+Diligence+Frequently+Asked+Questions+FAQ</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/securityratings</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d87d389-5579-462f-a0f5-abbe2a588303/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a9d3d22-a6a2-49d8-ac8d-8ab49656c8c2/Security+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88ba29c-eb12-43b8-96ee-4eef7e26e6a8/Feasibility+Security+Ratings+Cybersecurity+Risk+Ratings+Digital+Presence+Triad</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Security+Ratings+Cybersecurity+Risk+Ratings+Digital+Presence+Triad</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Security+Ratings+Cybersecurity+Risk+Ratings+Digital+Presence+Triad</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5fd5f320-ffe8-420e-abe8-ccc103712975/Targeted+External+Discovery+and+Assessment+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/29f41d71-f638-4615-aa6c-9cd9c98aff2b/Reporting+and+Monitoring+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/762f2b23-e1ad-46d7-aad1-83669001ad8d/Threat+Intelligence+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/53148095-9194-4848-aabd-e1ef880454fd/ThreatNG+Exposure+Score+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bd65576-d6ba-4673-b05e-b8d25920acd5/Business+Context+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a515aca-f786-4191-bfcc-f7e0b5b908c5/Supply+Chain+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5df53c4f-8c6f-48b9-b896-154eb991f92a/Threat+Intelligence+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/812b4308-eed6-487d-ac8c-c13bedff406f/Reporting+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b29576e4-a5be-4723-b5b9-6aa26145e791/Continuous+Visibility+and+Monitoring+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fa9e80a-90d9-4509-b7fe-2f8729f65781/Collaboration+Management+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96695087-e036-465d-9ff2-fb7a6659a68d/Role-Based+Access+for+External+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/541fe613-5294-4b78-9203-72a6c1e35ed2/Assessment+Questionnaire+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e45532-6239-4c35-8f00-14e23f4d89bb/Policy+Management+for+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c874f413-d288-4c59-9318-58e7e67fa4a3/Domain+Intelligence+Sustainability+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection+%28DRP%29%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c88f7cfd-5a63-4828-918b-4392e86932f4/OSINT_ICONS_CLRBLK_FINAL_HIRES-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b471b18-a3fe-4bd6-a3eb-ae40bf8acd88/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e12be21-2c5f-4848-90a8-7b9bb3486c88/Sensitive+Code+Exposure+Github+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/34705366-437e-4278-a3bf-0a9618bcd7de/Search+Engine+Exploitation+Dork+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/376287db-61e8-41c8-a3c0-9e7a0df33034/Archived+Web+Page+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/website-control-file-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Website Control File Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27cc2816-8440-4e24-b980-953530b28b00/Website+Control+File+Exposure+robots.txt+and+security.txt+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27cc2816-8440-4e24-b980-953530b28b00/TNG_022825_ICONS_WEBSITE+CONTROL+FILE+EX-28.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/27cc2816-8440-4e24-b980-953530b28b00/TNG_022825_ICONS_WEBSITE+CONTROL+FILE+EX-28.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/search-engine-attack-surface</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Search Engine Attack Surface</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/28cf9580-f5a2-4205-8fc0-42077a3cd568/Search+Engine+Attack+Surface+External+Attack+Surface+Management+%28EASM%29%2C+Digital+Risk+Protection%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-mobile</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6e5602d4-7ccf-48fc-8fb5-99e83f3951cb/TNG_ICONS_2.23.26_FINALS_INFOSTEALER-05.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Infostealer. Parses dark web logs for compromised credentials and session tokens to deliver legal-grade attribution that empowers security teams to proactively neutralize threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Mobile App Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a92e0b70-c911-41b0-93b9-7727d11de3af/Mobile+App+Threat+Intelligence+Repository</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d032338f-0b3d-4bc6-bd9b-f5d8c35bfb6d/Mobile+App+Threat+Intelligence+Repository</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/web3-domains</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Web3 Domains</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7d8c279f-036f-4d8f-8fd4-fa3fc2b9bdb6/Web3+Domain+Identification+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Web3+FAQ+Frequently+Asked+Questions</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/updates</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/556efcc4-1905-4ac1-a7ac-18e94ccd9cf1/TNG_SLIDE_BLUE-01.jpg</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852179724-2F6JAQD02PWCLKBTL9TJ/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Updates</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ca061b71-7ad9-4ced-9390-815a4210d221/TNG_CloudSaaSRiskManagement.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Cloud and SaaS Exposure Management: ThreatNG extends its External Attack Surface Management (EASM), Digital Risk Protection, and Security Ratings to cover cloud platforms (Amazon Web Services, Microsoft Azure, and Google Cloud Platform) and SaaS applications. Discover and assess your Cloud and SaaS footprint, identify exposed open buckets, detect unsanctioned implementations (Shadow IT), and uncover brand impersonations (Cybersquats) without agents, credentials, API connections, browser plugins, or any prior knowledge. Discover and assess interconnected third-party applications, repositories, APIs, platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and vendor technologies, further empowering organizations to enhance their security posture.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633198505410-V1P69TUYDG0M86F85770/TNG_THIRDPARTY.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Third Party Risk Management: Quickly uncover, manage, and monitor third-party risks to fulfill due diligence, onboarding, and off-boarding requirements for Third Party Risk Management (TPRM). Enter a third party's domain name into the platform to discover, assess, report, and monitor their risks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633206261380-0I2CRZXAQQBIZRU5T879/TNG_USECASE_BRANDREP.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Brand Protection: ThreatNG identifies and prioritizes where your organization may be vulnerable to attacks, damage, or other negative impacts on reputation and business through the discovery and assessment of all digital brand assets: website, domains, subdomains, applications, cloud resources, SaaS applications, technology implemented, and social media accounts—your entire digital footprint.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee2490cc-a6b7-4036-a6ce-44173d41266d/TNG_USECASE_DUEDILIGENCE.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Due Diligence: Perform practical, continuous, and consistent external assessments throughout the relationship lifecycle to help make informed decisions and protect against potential threats. Gain valuable information about any organization's external security posture and help identify potential risks or vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Updates</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682438032893-P27U3XSY526HAYFX2YBZ/BEC+and+Phishing+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/BEC+and+Phishing+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/BEC+and+Phishing+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30fbd53e-50f7-47d8-83a8-14f03c37d582/Cyber+Risk+Exposure+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8365048a-adca-496f-8bdf-9c1303438939/Brand+Damage+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8baa2570-a4e4-46b1-a339-e1ed8b21ddc8/TNG_ESG_ICONS_FINAL_TRNSP-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Breach+and+Ransomware+Susceptibility</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9431b302-f8b4-4215-95f5-5d1822c2dd75/Web+Application+Hijack+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/85d2b9c7-80c5-4803-baff-35cd99cba1ae/Data+Leak+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/Subdomain+Takeover+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b10b041-0948-4a74-a371-f97e3643e823/Supply+Chain+and+Third+Party+Exposure+Score</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/appsecurity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/556efcc4-1905-4ac1-a7ac-18e94ccd9cf1/TNG_SLIDE_BLUE-01.jpg</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852179724-2F6JAQD02PWCLKBTL9TJ/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Application Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ca061b71-7ad9-4ced-9390-815a4210d221/TNG_CloudSaaSRiskManagement.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Cloud and SaaS Exposure Management: ThreatNG extends its External Attack Surface Management (EASM), Digital Risk Protection, and Security Ratings to cover cloud platforms (Amazon Web Services, Microsoft Azure, and Google Cloud Platform) and SaaS applications. Discover and assess your Cloud and SaaS footprint, identify exposed open buckets, detect unsanctioned implementations (Shadow IT), and uncover brand impersonations (Cybersquats) without agents, credentials, API connections, browser plugins, or any prior knowledge. Discover and assess interconnected third-party applications, repositories, APIs, platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and vendor technologies, further empowering organizations to enhance their security posture.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633129859365-RG8OJ57DIC4I0LAZ758Q/ThreatNG_Discover.jpg</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Discover &amp; Inventory</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633198505410-V1P69TUYDG0M86F85770/TNG_THIRDPARTY.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Third Party Risk Management: Quickly uncover, manage, and monitor third-party risks to fulfill due diligence, onboarding, and off-boarding requirements for Third Party Risk Management (TPRM). Enter a third party's domain name into the platform to discover, assess, report, and monitor their risks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126353792-XKI0Z5TNQ507VROKGCGA/ThreatNG_Assess.jpeg</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Assess, Examine, &amp; Highlight</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633206261380-0I2CRZXAQQBIZRU5T879/TNG_USECASE_BRANDREP.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Brand Protection: ThreatNG identifies and prioritizes where your organization may be vulnerable to attacks, damage, or other negative impacts on reputation and business through the discovery and assessment of all digital brand assets: website, domains, subdomains, applications, cloud resources, SaaS applications, technology implemented, and social media accounts—your entire digital footprint.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126380658-66Y723TXIHG26F24WT2G/TNG_CONTINUOUSVISIBILITY.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Continuous Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ee2490cc-a6b7-4036-a6ce-44173d41266d/TNG_USECASE_DUEDILIGENCE.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Due Diligence: Perform practical, continuous, and consistent external assessments throughout the relationship lifecycle to help make informed decisions and protect against potential threats. Gain valuable information about any organization's external security posture and help identify potential risks or vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126655122-ZFN1V27T5FQ5GNGDL1K5/ThreatNG_Report.jpeg</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Report &amp; Share</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1633126723289-ZGVWMYH10EFQ3VXHRUL5/TNG_COLLABANDREPORT.png</image:loc>
      <image:title>Application Security</image:title>
      <image:caption>Collaborate &amp; Manage</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/14b9c655-43b5-4604-bd35-50eb6d1b06ca/TNG_MASCOT_FINALS-01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682438032893-P27U3XSY526HAYFX2YBZ/BEC+and+Phishing+Susceptibility+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e74a5e43-750d-4ee7-8980-e15b5e195dfc/TNG_DARCACHE_ICONS_FINAL_TRNS-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Ransomware+Susceptibility+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1682093429895-25JAB62JJZ8JH5E500PO/ESG+Assessment+and+Monitoring</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/BEC+and+Phishing+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/661db879-cbab-4f23-9fb3-b11f80fdedc4/BEC+and+Phishing+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/30fbd53e-50f7-47d8-83a8-14f03c37d582/Cyber+Risk+Exposure+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8365048a-adca-496f-8bdf-9c1303438939/Brand+Damage+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8baa2570-a4e4-46b1-a339-e1ed8b21ddc8/TNG_ESG_ICONS_FINAL_TRNSP-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3a78e3cc-989b-4620-b99c-408093136de4/Breach+and+Ransomware+Susceptibility</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9431b302-f8b4-4215-95f5-5d1822c2dd75/Web+Application+Hijack+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/85d2b9c7-80c5-4803-baff-35cd99cba1ae/Data+Leak+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/Subdomain+Takeover+Susceptibility+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b10b041-0948-4a74-a371-f97e3643e823/Supply+Chain+and+Third+Party+Exposure+Score</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mobile-app-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Mobile+App+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/69c781af-2379-4487-a78e-f72014b89b50/Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa66a377-d894-4a32-912e-cd63c860256d/Feasibility+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb1c679a-163b-4ace-ab6d-69d84f7964d2/Believability+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/92cdf661-e8b8-4ce7-a464-a9f9fb34ccfd/Impact+Digital+Presence+Triad+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bb74827e-622c-4f73-bca6-63913d4709d0/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c6bed2c-4933-40e6-9357-c7e3a906037f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5c2621e3-8376-453d-a47e-e769bb80359f/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4af007e0-6bf4-4214-9c02-215622bc1b90/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f5e8f83e-8d5f-4d47-829a-d1d5e3e23809/Security+Ratings+Cybersecurity+Risk+Ratings+Scores+Scoring.</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure.+Security+Ratings+Cybersecurity+Risk+Rating+Score</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Actionable+Insights+and+Data-Driven+Objectivity+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d7013481-a9ee-4d18-8fb5-05f8066ed981/Continuous+Monitoring+and+Improvement+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f2bf32dd-a587-41de-a106-ce433e210411/Comparison+and+Benchmarking+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/174b1d73-9f8a-4d66-8f04-31c0e8eeecbc/Actionable+Recommendations+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/41826a61-f81e-4363-8ee4-57c0fb9bad6b/Clear+and+Transparent+Scoring+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+and+Phishing+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea4d39e5-792e-4405-8cd5-eba975a87005/Subdomain+Takeover+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+NHI+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+and+Ransomware+Susceptibility+Security+Ratings++Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b34e9fc-6424-4b95-93e9-e3b73454a8bc/Data+Leak+Susceptibility+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/77d1fa05-0a80-4fd4-9e9a-3fb1e50bf153/ESG+Exposure+Security+Ratings+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/280e29e2-16ac-44cb-85b7-11a1c992f6d7/Supply+Chain+%26+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a6d63573-72e4-40e5-af7d-0c7448bbfcce/Web+Application+Hijacking+Susceptibility+Security+Rating+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/security-ratings</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d87d389-5579-462f-a0f5-abbe2a588303/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a9d3d22-a6a2-49d8-ac8d-8ab49656c8c2/Security+Cybersecurity+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/53148095-9194-4848-aabd-e1ef880454fd/ThreatNG+Exposure+Score+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/62018579-7888-4982-b03f-fa7485acca67/Subdomain+Takeover+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Exposure+Security+Rating+Cyber+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f4252451-5012-4c3c-91bc-62f5b9461966/Web+Application+Hijack+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bd7aab82-ffc2-46a4-a319-50a6900722f3/BEC+Phishing+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6a91a552-2acd-4946-a0f9-63e7887eddef/Brand+Damage+Susceptibility+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4c48439f-21d0-4544-b44c-0a23c4945f45/Data+Leak+Susceptibility</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a3993c92-cc0d-4db1-900d-061780597d79/Cyber+Risk+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/Non-Human+Identity+Exposure+Security+Rating+NHI</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c4e4b5ef-5e6c-4de4-8e65-301401004d46/Breach+Ransomware+Susceptibility+Index+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5a515aca-f786-4191-bfcc-f7e0b5b908c5/Supply+Chain+Third+Party+Exposure+Security+Ratings+Cybersecurity+Risk+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a0c98495-bafc-4d40-b552-d098c7054fc2/ESG+Exposure+External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/230b9b81-7d4a-4695-acf3-24cd737190e9/Investigation+Modules</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1ae584f9-abd5-4a35-91bb-2dd60a340a3a/Domain+Intelligence+Assessment+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/45f4fe7a-abbf-46fa-b911-a5c1f4f1c21b/Subdomain+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c47ff2bf-80a3-4b26-ba67-2135b67d4c19/Social+Media+Assessment+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/98806f95-a0f4-40b0-87fb-ca22241b6c9f/Sentiment+Financials+Layoff+Lawsuits+ESG+SEC+Assessment+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ab8d9d93-298f-482d-91cc-8ed2bf436d9e/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/44ea9289-d842-402e-b512-eb329fbdc814/Cloud+SaaS+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/651bfc0c-b9b9-4a48-8566-dc81d84f124b/Sensitive+Code+Exposure+Github+Assessment+for+Cybersecurity+Risk+Ratings+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0064df8f-63aa-47b9-9fc6-39a6011ca3a1/Darn+Web+Presence+Assessment+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/982a9b77-c9be-4501-b827-11daa6871585/SUSEX_ICONS_FINAL-63.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/acd55bd6-5f61-45db-9251-e7db7d4044d9/Online+Sharing+Exposure+Sustainability+External+Attack+Surface+Management+EASM%2C+Digital+Risk+Protection+DRP%2C+Security+Ratings%2C+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/333634b2-c4f4-4ae5-9628-5291ebf58335/Intelligence+Repositories+Threat+Feed</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fb3b449a-dee7-4d2e-837e-60ed18891d7a/Vulnerability+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f9041af8-3ee3-4cf9-b3da-ea2e1ea9fd32/TNG_DARCACHE_ICONS_FINAL_TRNS-03.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7352e660-2a05-4fc0-a476-adc252be710b/Compromised+Credentials</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/DarCache+Infostealer+Logs+Intelligence+Repository</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/TNG_ICONS_SEC-04.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/df7f283e-281b-470e-8b3d-440f76f7610e/ESG+Violations</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cc16a987-ac63-4d8c-be10-61009d3035d2/Correlation+Evidence+Questionnaire</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8c82d2de-3c13-4dc8-8681-2a1eb9cfae6a/Positive+Security+Indicators</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/732aa1cc-b09b-466b-a84f-3edc319d7644/Context+Engine</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cfb58bb8-6431-4935-bdb3-57498b0732a3/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5529110e-f2cd-40f8-9a64-2f193322abdc/MITRE+ATT%26CK+Mappings+External+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/63859ccd-4b18-4e28-91eb-1b8cbd1821d8/Open-Source+Governance+and+Compliance+Data+Set</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/code-repository-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Code Repository Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/643a9aff-82b8-4449-a98a-c6673ec0d737/Code+Repository+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mobile-app-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0ecd22-34c1-4f93-bfdb-05308acbff30/Mobile+App+Exposure+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/483f3f8b-afcd-410f-b3ef-0184ee26ab8d/DarCache+Mobile+Intelligence+Repository+Threat+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Discovery+and+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mobile-app-discovery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Mobile App Discovery</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/Mobile+App+Discovery+and+Assessment+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7485b890-acee-447b-88d7-64690f0c3108/Mobile+App+Discovery+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8dfd918e-e498-4618-a104-be7d96d72664/Mobile+App+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/positive-security-indicators</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Positive Security Indicators</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/98dc1c0e-ee93-44fd-9bc1-9252b0beb1b8/Positive+Security+Indicators+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a7b1f4bb-406a-4db8-9149-7787a7c02930/Positive+Security+Indicators+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/penetration-testing-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cybersecurity-audit-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/swaggerhub-discovery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>SwaggerHub Discovery</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738275383523-N18W5HUNZZ6STBKTK6MG/Digital+Presence+Wordcloud+Domain+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1739213422604-KK0QPL9QJCYSYSJVDZHA/Cloud+and+SaaS+Exposure+Management+SwaggerHub</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/advanced-search</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0b7a8d71-fa8d-41b3-9901-1a2966662899/Advanced+Search+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7de83098-3e20-4184-9df6-ff913795ba06/Advanced+Search+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-epss</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Data and information gathered from the dark web, a part of the internet not indexed by search engines and can only be accessed using specialized software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Data and information gathered to support the analysis and evaluation of companies and other organizations' Environmental, Social, and Governance performance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Data gathered to support the analysis and tracking of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: A database of usernames, emails, and organizations that have been compromised in data breaches or other security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Intelligence repository of mobile apps identifying exposed sensitive information such as authentication tokens, API keys, and private keys, helping organizations strengthen their security posture and reduce digital risk.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: In-depth insight into worldwide bug bounty initiatives enables organizations to proactively use crowdsourced security research data to discover and address vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache 8-K: Leverage a unique collection of cybersecurity incident disclosures from publicly traded companies to proactively identify and mitigate threats, enhance your security posture, and gain a competitive edge across your external attack surface, digital risk protection, and security ratings initiatives.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>EPSS Intelligence Repository</image:title>
      <image:caption>DarCache Bank Identification Numbers (BIN): A database of essential information related to Bank Identification Numbers (BINs) used in financial transactions worldwide.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/314a669d-280a-40f0-958c-7f439b118ee4/Exploit+Prediction+Scoring+System+EPSS+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1bfa9451-b166-4cc1-aec9-3deb49f6e913/EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e93ec7-69ff-4bff-8e16-fe0db21bfd75/National+Vulnerability+Database+NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e6d3aa6-f3ef-41bc-b5bf-0148fb5080c1/Known+Exploited+Vulnerability+KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/21686977-e5ee-42d1-b087-0d53f728d453/Proof-of-Concept+POC+Explpioit+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-exploit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Data and information gathered from the dark web, a part of the internet not indexed by search engines and can only be accessed using specialized software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Data and information gathered to support the analysis and evaluation of companies and other organizations' Environmental, Social, and Governance performance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Data gathered to support the analysis and tracking of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: A database of usernames, emails, and organizations that have been compromised in data breaches or other security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Intelligence repository of mobile apps identifying exposed sensitive information such as authentication tokens, API keys, and private keys, helping organizations strengthen their security posture and reduce digital risk.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: In-depth insight into worldwide bug bounty initiatives enables organizations to proactively use crowdsourced security research data to discover and address vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache 8-K: Leverage a unique collection of cybersecurity incident disclosures from publicly traded companies to proactively identify and mitigate threats, enhance your security posture, and gain a competitive edge across your external attack surface, digital risk protection, and security ratings initiatives.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Proof-of-Concept Exploit Intelligence Repository</image:title>
      <image:caption>DarCache Bank Identification Numbers (BIN): A database of essential information related to Bank Identification Numbers (BINs) used in financial transactions worldwide.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/84f60f40-d720-43ce-9b5b-5ce61273d9bd/Proof-of-Concept+Exploit+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8d62cdf6-f005-4883-9137-48225c7731f7/Proof-of-Concept+Exploit+PoC+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e93ec7-69ff-4bff-8e16-fe0db21bfd75/National+Vulnerability+Database+NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e11bef51-4ac4-498c-8a66-671607d7c385/Exploit+Prediction+Scoring+System+EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e6d3aa6-f3ef-41bc-b5bf-0148fb5080c1/Known+Exploited+Vulnerability+KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-kev</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Data and information gathered from the dark web, a part of the internet not indexed by search engines and can only be accessed using specialized software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Data and information gathered to support the analysis and evaluation of companies and other organizations' Environmental, Social, and Governance performance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Data gathered to support the analysis and tracking of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: A database of usernames, emails, and organizations that have been compromised in data breaches or other security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Intelligence repository of mobile apps identifying exposed sensitive information such as authentication tokens, API keys, and private keys, helping organizations strengthen their security posture and reduce digital risk.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: In-depth insight into worldwide bug bounty initiatives enables organizations to proactively use crowdsourced security research data to discover and address vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache 8-K: Leverage a unique collection of cybersecurity incident disclosures from publicly traded companies to proactively identify and mitigate threats, enhance your security posture, and gain a competitive edge across your external attack surface, digital risk protection, and security ratings initiatives.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>KEV Intelligence Repository</image:title>
      <image:caption>DarCache Bank Identification Numbers (BIN): A database of essential information related to Bank Identification Numbers (BINs) used in financial transactions worldwide.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/933ec850-b5cb-4250-98bb-38c8e317eac7/Known+Exploited+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8ab3691b-87d9-4607-bf01-1606fd0c5b8e/KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/65e93ec7-69ff-4bff-8e16-fe0db21bfd75/National+Vulnerability+Database+NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e11bef51-4ac4-498c-8a66-671607d7c385/Exploit+Prediction+Scoring+System+EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/21686977-e5ee-42d1-b087-0d53f728d453/Proof-of-Concept+POC+Explpioit+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-nvd</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Data and information gathered from the dark web, a part of the internet not indexed by search engines and can only be accessed using specialized software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Data and information gathered to support the analysis and evaluation of companies and other organizations' Environmental, Social, and Governance performance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Data gathered to support the analysis and tracking of ransomware attacks and the threat actors behind them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: A database of usernames, emails, and organizations that have been compromised in data breaches or other security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Intelligence repository of mobile apps identifying exposed sensitive information such as authentication tokens, API keys, and private keys, helping organizations strengthen their security posture and reduce digital risk.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: In-depth insight into worldwide bug bounty initiatives enables organizations to proactively use crowdsourced security research data to discover and address vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache 8-K: Leverage a unique collection of cybersecurity incident disclosures from publicly traded companies to proactively identify and mitigate threats, enhance your security posture, and gain a competitive edge across your external attack surface, digital risk protection, and security ratings initiatives.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>NVD Intelligence Repository</image:title>
      <image:caption>DarCache Bank Identification Numbers (BIN): A database of essential information related to Bank Identification Numbers (BINs) used in financial transactions worldwide.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9c348c3c-c064-4921-801e-9bfe30d9b586/NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c94e9098-7d2a-4748-b77d-9b5b3c800d32/NVD+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5f767169-b1c6-4afd-9df5-c1f32593430c/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48110c9d-192f-4a0b-b892-d39006c896c1/Digital+Risk+Protection+%28DRP%29</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1e9a6a95-1f67-45a2-be4a-8501e0210bc2/Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e11bef51-4ac4-498c-8a66-671607d7c385/Exploit+Prediction+Scoring+System+EPSS+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0e6d3aa6-f3ef-41bc-b5bf-0148fb5080c1/Known+Exploited+Vulnerability+KEV+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/21686977-e5ee-42d1-b087-0d53f728d453/Proof-of-Concept+POC+Explpioit+Vulnerability+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vulnerability-threat-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/disinformation-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darc-playlist</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d5ea413e-bba3-4ea6-9a14-bfef58885493/DarcSight+DJ+ThreatNG</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ff741927-5f44-47e5-8607-1298941dff97/DarcSight+Listening+to+Music+and+Working</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cyber-risk-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/customizable-risk-scoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Customizable Risk Scoring</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9b101b8e-9cd9-4db5-b978-209dddd006e0/Customizable+Risk+Scoring+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9761c8a4-dae8-46f4-9fed-1b0df0be786a/Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/751306ab-e2bf-47a2-8d27-99a476ef34ab/Customizable+Risk+Scoring+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4126e5e-203e-4970-81e4-abd8693968b9/Brand+Protection+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/396bb398-0bb5-467f-8836-399af755d36a/Cloud+and+SaaS+Exposure+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2c3887a6-e14e-4fd3-a2f6-1471c720a08b/Due+Diligence+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/10f2282d-6eee-4072-af9f-6518f6ee74af/Third+Party+Risk+Management+Ransomware+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Security+Ratings+Cybersecurity+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-grc-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/External+DPDPA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/External+HIPAA+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/7ef35f03-16b8-490e-99b6-2778cdeb4290/NIST+CSF+NIST+Cybersecurity+Framework</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/External+SOC+2+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/403afa57-f279-4c45-8227-1f5de7eb06a9/NOCONNECTORS_BUTTON.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be2b48bb-8e31-492f-85ef-19de299a2dc9/External+Unauthenticated+Discovery</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2820610c-b3f5-44c7-9a67-7434aa4df0a8/External+GRC+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48a57bb8-0da0-45d8-af7d-1df81040322c/Vulnerability+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/940cb469-7a81-40ea-b4f4-8be11a262e5e/Digital+Risk+Protection</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ef217d0e-4db5-4cec-8990-ec97a40f0c8f/Reporting+and+Knowledgebase</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cyber-threat-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-02</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/pci</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>External PCI Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+DSS+Payment+Card+Industry+Data+Security+Standard</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/External+PCI+DSS+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e83f772-ea6c-4506-9394-bddeb2af36a0/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fc7685b5-0085-429b-9647-ab04d50c08a1/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0c37677a-5b39-4614-b688-bd910e543785/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/popia</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>External POPIA Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/POPIA+South+Africa+Protection+of+Personal+Information+Act</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4187fc9-6936-4c91-a790-f6878cd335f7/External+POPIA+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6ea2e7e9-295c-458c-bee0-b6df052825c4/POPIA+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c3279b66-7369-4311-b59e-e59df3c7706b/POPIA+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/pci-qsa-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threat-validation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/nhi-email-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>NHI Email Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d8ba689-6551-48c7-b597-c6b3016f0814/NHI+Non+Human+Identity+Email+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d8ba689-6551-48c7-b597-c6b3016f0814/NONHUMAN_DARCSIGHT_MASCOT-06.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4b6709ca-6ef6-4cff-a2de-821d89e39942/NHI+Email+Exposure.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4d8ba689-6551-48c7-b597-c6b3016f0814/NHI+Non+Human+Email+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-record-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Records Analysis</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/46e2ef7a-f728-4f64-ae92-0e659a812d2a/DNS+Intelligence+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+Services+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973123794-NKJUSS7ZCU5ACK92IQLE/IP+Domain+Record+Analysis+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+Security+Ratings+Cybersecurity+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96349441-42ea-4a32-8edf-c560373a8f42/TNG_DOMAININTELLIGENCE_ICONS_FINALS_VENDORS+AND+TECH+copy+2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-record-ip-addresses</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Record IP Addresses</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973123794-NKJUSS7ZCU5ACK92IQLE/Domain+Record+IP+Addresses</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1736973123794-NKJUSS7ZCU5ACK92IQLE/Domain+Record+IP+Addresses</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1738613122388-2EYLUYJY7RSABX5QGKAA/TNG_DOMAININTELLIGENCE_ICONS_FINALS_DOMAIN+NAME+PERMUTATIONS+copy+2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1740928418176-HUN2EQ1LY6E6FI4VJ5WW/SUSEX_ICONS_FINAL-63.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e8d99365-6eb2-4952-916d-7cf650114ca5/OSINT_ICONS_CLRBLK_FINAL_LORES-09.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/dce182a0-227c-43e6-acdb-e13c2b4692cc/Ransomware+Intelligence+Repository</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/domain-records-vendors-and-tech</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Domain Records Vendors and Technology</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96349441-42ea-4a32-8edf-c560373a8f42/TNG_DOMAININTELLIGENCE_ICONS_FINALS_VENDORS+AND+TECH+copy+2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/9208f6c9-c59f-4d96-9ee4-ce54303542f3/Subdomain+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96349441-42ea-4a32-8edf-c560373a8f42/Technology+Stack</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/412f677d-6b43-4a03-9434-2d704e554251/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/050e4743-01ac-496a-8da9-cc1f81254ceb/Mobile+App+Exposure</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/vendor-risk-management-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/pci-asv-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/hipaa</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>External HIPAA Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/HIPAA+Health+Insurance+Portability+and+Accountability+Act</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b4137939-26e9-4c4c-b624-31d04f788d8a/HIPAA+Health+Insurance+Portability+and+Accountability+Act+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e7d458c6-ddec-475a-b9f8-2f8f0091515b/External+HIPAA+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/98d93880-9925-41b1-9e24-f196adc13b53/HIPAA+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79799c34-a6a2-4e86-98f8-8d731ecedb4d/HIPAA+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/gdpr</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>External GDPR Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/External+GDPR+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/GDPR+External+Assessment+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4c94ddbf-4c82-4d79-bcd6-5a4d4e42c908/GDPR+External+Compliance+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a8f15060-96a7-422f-a99c-61c1e976f0fe/GDPR+External+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/8e5d197d-acfd-4d4a-8215-03652cad19d7/GDPR+External+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/asv</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>PCI Approved Scanning Vendors</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/PCI+ASV+Approved+Scanning+Vendor+External+Solution</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ea0b4e8d-1fbb-4872-b76e-d4096c07772f/External+PCI+DSS+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e83f772-ea6c-4506-9394-bddeb2af36a0/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/fc7685b5-0085-429b-9647-ab04d50c08a1/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/0c37677a-5b39-4614-b688-bd910e543785/PCI+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5be82753-e0fb-40ba-8811-ed9861fa328e/Nonprofit+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cybersecurity+Risk+Ratings+Demonstration</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b85bb93f-a710-4678-a8bf-458b4af36714/Screenshot+2025-10-14+at+9.53.02%E2%80%AFAM.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/trust</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/c1ab7788-883c-46ce-aca9-7daf1330addf/ThreatNG+Security+that+Builds+Trust</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/38e15c65-cda3-458b-a8cc-a200199cacaf/Ransomware_Susceptibility.gif</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/overwatch</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Overwatch Search All</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2543df8d-62ec-4c02-8752-8a232df505a4/Overwatch+Search+All+Facility</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/reconnaissance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eef17fed-d069-4dc0-8853-76c986a984c2/Reconnaissance+Hub</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/61a4408f-27ca-4ba4-a4e9-689658fbfabd/TNG_ICONS__OVERWATCH+SAC-13.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/40c9944e-58e4-4edf-96e8-d5f974f10fcd/TNG_022825_ICONS_SEARCH+ENGINE+ATTACK-27.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d01e8401-070d-4fbb-93aa-9b1b7a323f18/External+Contextual+Attack+Path+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eec6fd08-f00a-41f1-bbc1-48f98d6e9dbf/News+Feeds+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-adversary-view</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f490b2e4-38aa-4eb7-ba5f-39fa8ca18d0d/External+Adversary+View</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b88c698-5f7b-499a-bdd9-0b7ffcd53a1d/MITRE+ATT%26CK+Mitre+Attack</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/mitre-attack</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b88c698-5f7b-499a-bdd9-0b7ffcd53a1d/MITRE+ATT%26CK%C2%AE+Mapping+MITRE+ATTACK</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3b88c698-5f7b-499a-bdd9-0b7ffcd53a1d/MITRE+ATT%26CK+Mappings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/36a3748b-d008-4b0a-af02-1c24f3f16740/MITRE+ATT%26CK+Mappings+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b2e2e9f3-6759-4281-bad4-44e670095779/MITRE+ATT%26CK+Mapping+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5037fc18-cb5f-42d4-8428-3161fff16956/MITRE+ATT%26CK+Mapping+Sample+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/nist-csf</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>External NIST CSF Assessment</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96c6354c-a028-49f7-bd5e-d8a36e7478f3/External+NIST+CSF+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96c6354c-a028-49f7-bd5e-d8a36e7478f3/NIST+CSF+External+Assessment+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/baca222d-d0f8-4bcf-81d4-cb2ef29769e8/External+NIST+CSF+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/87b80580-8eb6-4876-861b-16fbbbe577bd/External+NIST+CSF+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/73ea081e-6bff-4924-8f8d-235944e0a881/External+NIST+CSF+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/reddit-discovery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Reddit Discovery</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e789d7ae-c45e-4c9f-b138-2c694c1899ab/Reddit+Discovery+EASM+External+Attack+Surface+Management+Digital+Risk+Protection+DRP+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/online-brand-impersonation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/account-takeover-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/continuous-threat-exposure-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/username-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>Username Exposure</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/410ca18f-cd4b-4711-8b3d-e297988e2c44/Username+Exposure+External+Attack+Surface+Management+EASM+Digital+Risk+Proterction+DRPS</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/linkedin-discovery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851499726-D4UMV5LHI62IO7KQ00AG/OSINT_ICONS_CLRBLK_FINAL_TRANS-02.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Social Media</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851634651-JJJR7R0QEANYZNKYW19T/OSINT_ICONS_CLRBLK_FINAL_TRANS-04.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Search Engine Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851385651-MCJ3T8787UMJPUJ3ZJ3L/OSINT_ICONS_CLRBLK_FINAL_TRANS-01.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Domain Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851568596-0FPXUUOXDXTCF3EULSHN/OSINT_ICONS_CLRBLK_FINAL_TRANS-03.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Sensitive Code Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851666519-3Z8DWOWZ2SJON2FZ751M/OSINT_ICONS_CLRBLK_FINAL_TRANS-05.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Cloud and SaaS Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851726359-MZBTD3S5LS6B4QPNSCNO/OSINT_ICONS_CLRBLK_FINAL_TRANS-06.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Online Sharing Exposure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851920521-LY1FYQXIM7ZVDY3M4KJA/OSINT_ICONS_CLRBLK_FINAL_TRANS-07.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Sentiment and Financials</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851957010-0E01Y8RKY3L0DJQ5AJLP/OSINT_ICONS_CLRBLK_FINAL_TRANS-08.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Archived Web Pages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618851999281-Q9A00MHP74MAIG75R4X4/OSINT_ICONS_CLRBLK_FINAL_TRANS-09.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Dark Web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1618852548053-33LV44NL45BTEKDU8GXL/OSINT_ICONS_CLRBLK_FINAL_TRANS-10.png</image:loc>
      <image:title>LinkedIn Discovery</image:title>
      <image:caption>Technology Stack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/40d2a286-f479-4ec0-a85f-c961aa311c17/LinkedIn+Discovery+EASM+External+Attack+Surface+Management+Digital+Risk+Protection+DRP+Security+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threat-exposure-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-06</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/ctem-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/Penetration+Testing+Pen+Test+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threatng-api</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/b06c6aac-a385-4c5b-aa67-1d2741756385/API+Application+Programming+Interface+EASM+Digital+Risk+Protection+DRPS+Security+Ratings</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/non-human-identity-exposure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f3bbfed5-2918-468d-9f0f-376f4f7546fb/NHI+Non-Human+Identity+External+Exposure+Security+Rating</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/badf0baa-ef9f-4899-a1ab-6c8208402ece/TNG_BANNERGRAPHICS_XSUSEX_FINAL_WHT.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/context-engine</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/732aa1cc-b09b-466b-a84f-3edc319d7644/Context+Engine+for+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be136700-2f69-4a44-a8cd-4334841d3bfe/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48e207e0-d667-4a73-8fc4-3c6787b6f199/Digital+Risk+Protection+DRPS+DRP</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ceae8347-9121-46e5-b157-e7fc5710752b/Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d61f742a-b37e-405b-93aa-f6d62c45f2ca/Brand+Protection</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/052acb89-f657-4c0a-8c84-aea470bd75de/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f71e7008-b298-4592-a72a-e3e787532c37/Third+Party+Risk+Management+TPRM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/13068d56-e844-46a6-a0e9-9e592323e4ee/Due+Diligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/certainty-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/aa572ae0-cfe8-4809-9ad6-bb4ef4c6b668/Certainty+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be136700-2f69-4a44-a8cd-4334841d3bfe/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48e207e0-d667-4a73-8fc4-3c6787b6f199/Digital+Risk+Protection+DRPS+DRP</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ceae8347-9121-46e5-b157-e7fc5710752b/Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d61f742a-b37e-405b-93aa-f6d62c45f2ca/Brand+Protection</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/052acb89-f657-4c0a-8c84-aea470bd75de/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f71e7008-b298-4592-a72a-e3e787532c37/Third+Party+Risk+Management+TPRM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/13068d56-e844-46a6-a0e9-9e592323e4ee/Due+Diligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-ai-attack-surface-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be136700-2f69-4a44-a8cd-4334841d3bfe/External+AI+Attack+Surface+Management</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be2b48bb-8e31-492f-85ef-19de299a2dc9/External+Discovery+AI+ML</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/732aa1cc-b09b-466b-a84f-3edc319d7644/Context+Engine</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/iso-27001</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/ISO+27001+External+Assessment</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/79a43c0e-ef62-47a2-b810-0732363476d8/TNG_120825_ICONS_ISO+27001-27-Picsart-BackgroundRemover.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/a735cbbd-60f4-471b-b7a2-549afb5519e9/ISO+27001+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/06e79ccc-0aef-4d69-b353-b85779e530d2/ISO+27001+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/2fe9e981-cfa7-4115-9507-7cfcad9ef994/ISO+27001+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/nist-800-53</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRPS+DRP+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f12f455a-b507-4bda-92eb-66eb72eb39f1/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/39798934-a4ad-4f7d-9273-7b34a8b40aed/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/cf4ef833-0684-467f-b833-249895276bfe/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d5ea8cbc-cbbf-48c3-a823-5af931311eb3/NIST+800-53+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dynamic-attack-surface-reduction</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/predictive-external-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/attack-path-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d01e8401-070d-4fbb-93aa-9b1b7a323f18/External+Contextual+Attack+Path+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/5b1033bd-a748-4fa4-8d86-bb93bb44b6d6/Attack+Path+Analysis+Intelligence+External+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be136700-2f69-4a44-a8cd-4334841d3bfe/External+Attack+Surface+Management+EASM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/48e207e0-d667-4a73-8fc4-3c6787b6f199/Digital+Risk+Protection+DRPS+DRP</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ceae8347-9121-46e5-b157-e7fc5710752b/Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/d61f742a-b37e-405b-93aa-f6d62c45f2ca/Brand+Protection</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/052acb89-f657-4c0a-8c84-aea470bd75de/Cloud+and+SaaS+Exposure</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/f71e7008-b298-4592-a72a-e3e787532c37/Third+Party+Risk+Management+TPRM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/13068d56-e844-46a6-a0e9-9e592323e4ee/Due+Diligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/attack-path-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/news</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/eec6fd08-f00a-41f1-bbc1-48f98d6e9dbf/News+Feeds+External+Attack+Surface+Management+EASM+Digital+Risk+Protection+DRP+DRPS+Security+Ratings+Cyber+Risk+Ratings</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/cmdb-reconciliation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/workflow-transformation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/pen-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/dpdpa</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/TNG_ICONS_1.14.26_DPDPA-11.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/da4379f6-544c-4f52-a57d-2f1a988fd8a2/DPDPA.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f7e4dee-09e8-40eb-a38f-180ebc878533/DPDPA+External+Assessment+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/78498f9c-2fb6-49d0-8fe8-22a78f72de3f/DPDPA++External+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/ef464335-890c-4747-8706-cffb2e0e4a1d/DPDPA+External+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4573940d-d93e-4f50-9ccc-d8c4206e57cb/DPDPA+External+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/soc-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/062eb78d-c284-4949-8e86-de0c2b90ee27/TNG_ICONS_1.14.26_SOC+2-12.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af22a532-be04-4112-a631-0d4a58c0f86c/GDPR+External+Assessment+Reports</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/751a3b5f-881d-426a-900e-0d3bda65ded0/SOC+2+External+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/972d5715-0a56-460c-a6f3-94a89493c081/SOC+2+External+Assessment+Report</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1c1ab5ec-4aa0-4c8e-91d0-4aee5bced056/SOC+2+External+Assessment+Repor</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/chief-risk-officer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/01b5de12-d9f1-40b9-8df8-7e5df7cca0be/Reconnaissance</image:loc>
      <image:title>Chief Risk Officer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/bc25f9e8-c4d2-4476-9f78-665205d7634c/Weaponization</image:loc>
      <image:title>Chief Risk Officer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/daa6cf45-ad35-45d4-9fd0-e548a02b8e2d/Impact</image:loc>
      <image:title>Chief Risk Officer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/workforce-attack-surface-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-threat-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-exposure-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/audit-and-validate</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/xsbom-external-sbom</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3f8c26d3-47ca-4e23-bee9-032530b01103/xSBOM+External+SBOM+Software+Bill+of+Materials</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/3d3dd5ca-9782-4cba-83e5-62ff98189e40/External+Software+Bill+of+Materials+xSBOM+SBOM</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/darcache-infostealer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1f101e96-42d3-4f11-84d7-1f0b7ab91c40/OSINT_ICONS_BW_FINALA_TRANS-09.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Dark Web: Scans underground for threats to your brand, VIPs, and assets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/90601e65-e467-4bac-b417-c7b6c7ed89d3/TNG_ESG_ICONS_FINAL_TRNSP-13.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache ESG: Tracks Environmental, Social, and Governance violations that signal broader risk culture issues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/af6210b7-002b-4506-9a1d-64c861cce8ff/TNG_DARCACHE_ICONS_FINAL_TRNS-04.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Ransomware: Tracks active gangs and their specific TTPs to move defense from reactive to proactive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/96d206c3-b442-40be-bf3a-39ed53746ad0/TNG_DARCACHE_ICONS_FINAL_TRNS-08.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Rupture: Monitors for compromised credentials and data leaks that lead to initial access.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/68da320c-699a-46d3-a9e9-53c455008e31/TNG_DARCACHE_ICONS_FINAL_TRNS-12.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Vulnerability: Fuses NVD, EPSS, KEV, and PoC Exploit data to prioritize patching based on active exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/6abf682b-7e00-44bb-a80d-a80913b74417/SUSEX_ICONS_FINAL-65.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Mobile: Detects hardcoded secrets, API keys, and platform identifiers in mobile applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/00b0f5f4-cdf8-40ec-b940-ad3f29897fb1/TNG_ICONS_082924_FINAL-BUG-05.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache Bug Bounty: Aggregates data on assets under active scrutiny by the researcher community.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4e8b343d-8edf-4775-a4e5-cfef7f326602/TNG_ICONS_SEC-06.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCache 8-K. Correlates cyber risk with SEC filings to provide the decisive financial context boards require.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/be1f006d-f175-48ad-8cb7-3f86cbd464f8/TNG_ICONS_BIN-07.png</image:loc>
      <image:title>Infostealer Intelligence Repository</image:title>
      <image:caption>DarCacvhe BIN: Monitors Bank Identification Numbers to detect and prevent payment fraud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/45aa607f-472a-4087-81f0-6386e8e183ec/DC_INFOSTEALER_FINAL-02.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/227e7379-85fc-4082-8f2b-aab9232844d0/DarCache+Infostealer+intelligence+Repository</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/52d69011-19d9-459a-afa6-9b13a62235c1/DarCache+Infostealer+Intelligence+Repository</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sec-cyber-disclosure-oversight-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Cybersecurity+Disclosures</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sec-insider-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Insider+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sec-cyber-investigation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Insider+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Cyber+Disclosure+and+Oversight+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Cyber+Disclosure+and+Oversight+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Cyber+Disclosure+and+Oversight+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Cyber+Disclosure+and+Oversight+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/sec-cybersecurity-disclosures-report</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/4a09185b-76e8-4169-a61b-8d76c8d6984d/SEC+Insider+Intelligence</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/db37b3d1-072b-4636-8df9-d8c99a708cba/SEC_Report.gif</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/external-partner-risk-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/threat-informed-easm</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/intelligence-driven-sales</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/e4b14ea4-d406-4cad-b520-6053b7a543ad/TNG_022825_ICONS_FAQ-21.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/store</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>57688-04-16</lastmod>
  </url>
  <url>
    <loc>https://www.threatngsecurity.com/store/p/dad-hat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300336461-YXBGT978QF1U8C083Q7P/classic-dad-hat-white-front-68cd88a628704.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300338142-856T15UGR16XSWCJPYZW/classic-dad-hat-white-back-68cd88a629611.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300339500-KVUNPR1JZUEH7C23889G/classic-dad-hat-white-right-side-68cd88a629d15.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300340842-9JNMWMW4XRH6U29LQEON/classic-dad-hat-white-left-side-68cd88a62a4fe.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300342593-M0V0N5QCIWZYWIQB79J8/classic-dad-hat-white-right-front-68cd88a62ac56.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300344009-2SG1E5RZXHKCI25T8CL9/classic-dad-hat-white-left-front-68cd88a62b3da.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300346628-3UWNFFPA2SW4YDZ2DC7D/classic-dad-hat-white-right-front-68cd88a62ba68.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5f36d14c1f72076cfa6b46fb/1758300349153-9PP2MX6LCFR9JEH8VS14/classic-dad-hat-white-front-68cd88a62c10a.jpg</image:loc>
      <image:title>Store - Dad hat</image:title>
    </image:image>
  </url>
</urlset>

