<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<urlset xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>
  <url>
    <loc>https://www.defense.com</loc>
    <priority>1.0</priority>
  </url>
    <url>
    <loc>https://www.defense.com/cyber-security-videos</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.defense.com/mission</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.defense.com/integrations</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.defense.com/pricing</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.defense.com/features</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.defense.com/asset-profile</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/threat-recon</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/penetration-testing</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/endpoint-detection-response</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/penetration-testing/cloud-pen-testing</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/penetration-testing/web-application</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/penetration-testing/infrastructure-testing</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/penetration-testing/mobile-penetration-testing</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/vulnerability-scanning</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/application-scanning</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/ai-cyber-security-powered-mcp</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/endpoint-protection</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/phishing-simulator</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/log-monitoring</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/managed-siem</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/managed-soc</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/microsoft-365</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/managed-detection-and-response</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/managed-security-service-provider</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/extended-detection-response</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-essentials</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/solutions/pci-dss</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/industries/healthcare</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/industries/education</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/security-awareness-training</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-security-management-it-managers</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/advanced-cyber-security-business-owners</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-security-risk-management-tool</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-security-solution-startups</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/small-business-cyber-security-solution</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-security-solution-mid-market</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/enterprise-security-solution</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/case-studies</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/case-studies/1st-line-defense</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/case-studies/fintech-startup-pci-dss</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/case-studies/managed-siem-housing-provider</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/case-studies/trivallis</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/microsoft-365-guide</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/new-cyber-bill-msp-risks</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/sme-guide</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/managed-siem-buyers-guide</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/free-trial</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.defense.com/terms</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/orbital-agent</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/cyber-resilience</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/ftc-safeguards-rule-guide</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/cyber-insurance</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/msp-outsource-soc-siem</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/siem-strategy</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/mdr-soc-and-siem</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/what-is-multi-factor-authentication</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/what-is-log-monitoring</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/outsourcing-your-soc</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/security-risks-in-cloud-computing</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/the-importance-of-patch-management</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/the-importance-of-removing-user-access</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/10-things-it-manager-should-know-cyber-security</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/4-cyber-security-quick-wins-for-SME-business-owners</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/channel-partners-it-security</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/guide-to-cyber-security-for-smes</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/what-is-phishing</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/what-smes-can-learn-from-breaches</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/why-cyber-essentials-not-enough</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/changes-to-cyber-essentials</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/defense-vs-microsoft-defender</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/getting-started-compliance</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/how-to-get-team-excited-cyber-security-training</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/why-we-built-defense-com</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/log4j-vulnerability-advice</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/post-breach-remediation</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/public-sector-budgeting-for-cyber-security</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/ransomware-top-tips</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/threat-management-updates</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/ukraine-crisis-cyber-security-guidance</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/virtual-ciso</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/pci-dss-4</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/iso-27001</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/how-to-perform-a-cyber-security-risk-assessment</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/reduce-data-breaches-with-siem</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/secure-by-design</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/getting-board-buy-in</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/avoiding-cyber-burnout</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/product-update-microsoft-365-integration</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/siem-vs-edr</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/crowdstrike-microsoft-outage-guidance</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/ransomware-demands-record-breaking-fee</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/product-update-phishing-training</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/product-update-threat-management</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/latest-product-updates-nov-24</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/latest-product-updates-jan-25</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/latest-product-updates-mar-25</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/rsac-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/blog/webinar-may-25</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/xchange-uk-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/uk-cyber-week-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/infosecurity-europe-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/texas-technology-summit-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/rsac-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/secureworld-houston-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/turning-risks-into-resilience-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/events/the-resilience-briefing-2025</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/contact</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.defense.com/privacy</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cookies</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/appropriate-policy-document</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/cyber-security-glossary</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/ftc-safeguards-rule</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/guides</loc>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.defense.com/platform</loc>
    <priority>0.6</priority>
  </url>
</urlset>
