<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://cyvexsecurity.com</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/about</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/contact</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/book-demo</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/careers</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/case-studies</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/compliance-automation</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breach-digest</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breach-response-playbook</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/continuous-vs-one-off-security-scans</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/cyvex-platform</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/how-cyber-attacks-start-in-small-businesses</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/how-cyvex-works</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/iso-27001-certification</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/managed-security-services</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/partners</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/penetration-testing</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/platform</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/pricing</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/security-disclosure-policy</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/soc-2-compliance</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/soc2-readiness-checklist</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/videos</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/video-creator</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/vulnerability-scanning</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/vulnerability-scanning-for-smes</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/what-is-vulnerability-scanning</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/threat-intelligence</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/solutions/cloud-security-posture-management</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/solutions/ransomware-incident-response</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/cookie-policy</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/privacy-policy</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/terms</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-intel-defensive-strategies</loc><lastmod>2026-05-08T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/zero-day-vulnerabilities-may-2026</loc><lastmod>2026-05-08T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/biometric-authentication-advancements</loc><lastmod>2026-05-07T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/government-cybersecurity-initiatives-2026-05-06</loc><lastmod>2026-05-06T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-intel-actors</loc><lastmod>2026-05-05T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cybersecurity-incident-response-best-practices</loc><lastmod>2026-05-05T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/blockchain-technology-cybersecurity</loc><lastmod>2026-05-05T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-intelligence-report-may-2026</loc><lastmod>2026-05-03T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-intel-sharing</loc><lastmod>2026-05-02T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/data-breach-trends-2026-05-02</loc><lastmod>2026-05-02T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cloud-security-best-practices</loc><lastmod>2026-05-02T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cybersecurity-research-trends-2026</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/ransomware-threats-2026</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cloud-security-best-practices</loc><lastmod>2026-04-30T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/security-briefing-best-practices-2026-04-28</loc><lastmod>2026-04-28T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/iot-security-protocols</loc><lastmod>2026-04-28T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/ransomware-trends-report</loc><lastmod>2026-04-28T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-intel-automation</loc><lastmod>2026-04-25T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/emerging-cyber-attacks-2026-04-25</loc><lastmod>2026-04-25T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/ransomware-trends-2026</loc><lastmod>2026-04-25T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cyber-risk-assessment-study</loc><lastmod>2026-04-25T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cybersecurity-training-trends</loc><lastmod>2026-04-25T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/cyber-threat-intel-trends</loc><lastmod>2026-04-21T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/threat-landscape-update-2026-04-20</loc><lastmod>2026-04-20T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/blog/zero-trust-security-update</loc><lastmod>2026-04-15T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/billing</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/security</loc><lastmod>2026-05-14T12:35:03.582Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started/first-day-setup</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started/invite-your-team</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started/connect-first-asset</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started/understand-dashboard</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/getting-started/configure-alerts</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning/schedule-scans</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-scope</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning/authenticated-scans</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-exclusions</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/scanning/read-scan-report</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance/soc2-evidence-basics</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance/iso-27001-mapping</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance/cyber-essentials-prep</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance/export-audit-report</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/compliance/vuln-evidence-retention</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations/slack-integration</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations/jira-integration</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations/github-integration</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations/aws-integration</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/integrations/sso-integration</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/billing/manage-seats</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/billing/invoices-vat</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/billing/change-plan</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/security/enforce-mfa</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/security/api-keys</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/knowledge-base/security/audit-logs</loc><lastmod>2026-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/researcher-drops-yellowkey-greenplasma-windows-zero-days</loc><lastmod>2026-05-14T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/nitrogen-ransomware-claims-massive-data-theft-from-foxconn</loc><lastmod>2026-05-14T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/hackers-targeted-praisonai-vulnerability-hours-after-disclos</loc><lastmod>2026-05-14T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/high-severity-vulnerability-patched-in-vmware-fusion</loc><lastmod>2026-05-14T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/famoussparrow-targets-azerbaijani-energy-sector-in-multi-wav</loc><lastmod>2026-05-14T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/foxconn-confirms-north-american-factories-hit-by-cyberattack</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/microsoft-palo-alto-networks-find-many-vulnerabilities-by-us</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/sweet-security-launches-agentic-ai-red-teaming-to-counter-my</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/webinar-today-roi-for-cyber-physical-security-programs</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/government-to-scrutinize-instructure-over-canvas-disruption-</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/716-000-impacted-by-openloop-health-data-breach</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/microsoft-patches-critical-zero-click-outlook-vulnerability-</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/fortinet-ivanti-patch-critical-vulnerabilities</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/chipmaker-patch-tuesday-intel-and-amd-patch-70-vulnerabiliti</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/alleged-dream-market-admin-arrested-in-germany-after-us-indi</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/european-commission-head-pushes-creation-of-new-law-delaying</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/uk-moves-to-shield-security-researchers-in-cybercrime-law-ov</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/microsoft-on-pace-to-break-annual-vulnerability-record-as-ai</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/microsoft-patch-tuesday-for-may-2026-fix-138-bugs-some-of-th</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/openloop-health-confirms-january-2026-data-breach-affecting-</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/quest-kace-sma-flaw-cve-2025-32975-when-one-unpatched-tool-o</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
<url><loc>https://cyvexsecurity.com/breaches/instructure-settles-with-hackers-following-massive-student-d</loc><lastmod>2026-05-13T00:00:00.000Z</lastmod></url>
</urlset>