<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//armorpoint.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://armorpoint.com/2022/10/04/armorpoint-named-to-mssp-alerts-top-250-mssps-list-for-2022/</loc>
		<lastmod>2024-07-05T14:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_MSSPsListfor2022_20221004.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/08/16/armorpoint-pinpoints-increase-in-attacks-targeting-on-premise-exchange-servers/</loc>
		<lastmod>2024-07-05T16:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_ExchangeServers_20230816.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/05/25/corey-ayers-appointed-as-director-of-product-management-for-armorpoint/</loc>
		<lastmod>2024-07-11T13:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_CoreyAyers_20230525.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/5-key-elements-of-an-effective-soc/</loc>
		<lastmod>2025-08-06T17:52:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/05/AdobeStock_186828315_860x480.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/08/13/lummac2-infostealer-malware-what-businesses-need-to-know-about-the-latest-cisa-advisory-aa25-141b/</loc>
		<lastmod>2025-08-13T18:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/08/AP_Blog_ThreatIntel_LummaC2-Infostealer-Malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/10/27/prioritizing-cybersecurity-in-a-hybrid-workplace/</loc>
		<lastmod>2025-08-15T18:41:49+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2021/10/AP_Blog-With-Words_HybridWorkCybersecurity_20211027.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/02/armorpoint-becomes-national-cybersecurity-month-champion/</loc>
		<lastmod>2025-08-18T15:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/ncsam-pr-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/20/should-you-partner-with-an-mssp-during-covid-19/</loc>
		<lastmod>2025-08-18T15:42:23+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Should-You-Switch-to-an-MSSP-During-COVID-19_-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/27/internal-or-third-party-it/</loc>
		<lastmod>2025-08-18T15:42:40+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Break-into-New-Markets-During-Economic-Uncertainty-with-MSSPs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/29/mssp-is-the-answer-to-your-compliance-challenges/</loc>
		<lastmod>2025-08-18T15:43:18+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Is-an-MSSP-the-Answer-to-Your-IT-and-Compliance-Challenges_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/03/10/the-cybersecurity-solution-youve-been-looking-for-xdr-is-here/</loc>
		<lastmod>2025-08-18T15:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/What-is-xdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2022/01/07/armorpoint-partners-with-tsa-choice/</loc>
		<lastmod>2025-08-18T16:15:33+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2022/01/AP_Blog-Jan-7-2022-1024x597-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/10/13/why-you-should-consider-a-cyber-career/</loc>
		<lastmod>2025-08-18T16:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2021/10/AP_Blog-With-Words_CyberSecurityCareer_20211013.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/11/19/black-friday-and-cyber-monday-online-safety-tips/</loc>
		<lastmod>2025-08-18T16:16:42+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_BlackFriday_20211119.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/12/07/armorpoint-named-2021-winner-in-the-big-award-for-business/</loc>
		<lastmod>2025-08-18T16:16:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_BIGAward_20211207.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/10/11/armorpoint-foils-emotet-threat-with-quick-detection-and-mitigation/</loc>
		<lastmod>2025-08-18T16:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_Emotet_20231011.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/11/01/a-new-era-of-cybersecurity-introducing-nist-2-0/</loc>
		<lastmod>2025-08-18T16:24:33+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_NewEraofCybersecurity_20231101.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/NIST-Cybersecurity-Framework-2-296x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/11/NIST-mock-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/11/06/the-importance-of-risk-management-in-nist-2-0/</loc>
		<lastmod>2025-08-18T16:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_RiskManagement_20231106.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/11/NIST-mock-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/11/13/5-ways-to-prepare-to-implement-nist-2-0/</loc>
		<lastmod>2025-08-18T16:26:05+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_PreparingforNIST2_20241113.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/11/NIST-mock-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/01/04/the-limitations-of-firewalls-in-modern-security/</loc>
		<lastmod>2025-08-18T16:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_Firewalls_20240104.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/01/The-Limitations-of-Firewalls-in-Modern-Security-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/01/09/soc-vs-mdr-vs-xdr-vs-siem/</loc>
		<lastmod>2025-08-18T16:30:36+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/01/AP_Blog_SIEM_Jan-4-2024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/01/16/email-account-compromise-on-the-rise/</loc>
		<lastmod>2025-08-18T16:31:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_EmailCompromise_20240116.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/01/Email-Account-Compromise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/01/22/striking-the-right-balance-with-managed-risk/</loc>
		<lastmod>2025-08-18T16:32:23+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_ManagedRisk_20240122.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/03/21/armorpoint-analytics-discover-increased-malicious-use-of-advanced-ip-scanner/</loc>
		<lastmod>2025-08-18T16:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/03/AP_Blog-With-Words_ThreatIntel_20240321.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/04/03/top-cloud-computing-risks-and-how-to-mitigate-them/</loc>
		<lastmod>2025-08-18T16:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/04/AP_Blog-With-Words_CloudSecurity_20240403.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/04/17/april-2024-cybersecurity-roundup-the-xeno-effect-and-beyond/</loc>
		<lastmod>2025-08-18T16:49:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/04/AP_Blog-With-Words_ThreatIntelApril2024_20240417.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/04/29/the-people-element-in-cybersecurity/</loc>
		<lastmod>2025-08-18T16:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/04/AP_Blog-With-Words_HumanRiskManagement_20240426.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/05/15/rise-of-shadow-it-risks-in-the-age-of-freemium-saas/</loc>
		<lastmod>2025-08-18T16:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/05/AP_Blog_ShadowIT_20240508.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2022/12/12/what-are-the-advantages-of-siem-for-your-business/</loc>
		<lastmod>2025-08-18T16:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_AdvantagesofSIEM_20221212.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/02/08/minimizing-cybersecurity-risks-in-the-age-of-tech-layoffs/</loc>
		<lastmod>2025-08-18T16:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_TechLayoffs_20230208.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/05/16/from-vulnerable-to-vigilant-cpls-cybersecurity-transformation-with-armorpoint/</loc>
		<lastmod>2025-08-18T16:56:39+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/05/AP_Blog_Case-Study_Cpl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/06/12/understanding-the-shift-to-continuous-threat-exposure-management/</loc>
		<lastmod>2025-08-18T16:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/06/AP_Blog_CTEM_20240506_IGSize.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/06/19/how-to-build-a-mature-cybersecurity-program/</loc>
		<lastmod>2025-08-18T16:57:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/06/AP_Blog_HowtoBuildaMatureCybersecurityProgram_20240610.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/06/CPMR_Infographic_Socials_Carousel2-02-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/06/CPMR_Infographic_Socials_Carousel2-03-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/06/26/addressing-the-cybersecurity-regulations-impacting-the-european-market-nis2-cra-dora/</loc>
		<lastmod>2025-08-18T16:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/06/AP_Blog_CybersecurityNewsEurope_20240624_FeaturedImage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/07/09/inside-the-soc-essential-tools-and-technologies-for-cyber-defense/</loc>
		<lastmod>2025-08-19T15:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_FeaturedImage_Inside-the-SOC-EssentialToolsandTechnologiesforCyberDefense_20240708.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/07/24/kaspersky-is-officially-out-of-the-us-market-now-what/</loc>
		<lastmod>2025-08-19T15:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_Kaspersky-is-Officially-Out-of-the-US-Market-Now-What_20240723.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/07/26/building-a-risk-based-vulnerability-management-program/</loc>
		<lastmod>2025-08-19T15:31:40+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_Building-a-Risk-Based-Vulnerability-Management-Program_20240724.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_Building-a-Risk-Based-Vulnerability-Management-Program_20240724_In-BlogImage_V02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/07/30/7-essential-security-assessments-every-business-needs/</loc>
		<lastmod>2025-08-19T15:32:27+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_7-Essential-Security-Assessments-Every-Business-Needs_20240718.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/06/mdr-vs-edr-key-differences-and-how-to-choose-the-best-solution/</loc>
		<lastmod>2025-08-19T15:32:41+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_MDR-vs.-EDR-Key-Differences-and-How-to-Choose-the-Best-Solution_20240724.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/16/automated-penetration-testing-services-5-things-to-know-before-you-buy/</loc>
		<lastmod>2025-08-19T15:33:41+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Automated-Penetration-Testing-Services_20240731.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/22/implementing-effective-risk-assessments-in-finserv/</loc>
		<lastmod>2025-08-19T15:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Implementing-Effective-Risk-Assessments-in-FinServ_20240812.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/23/building-a-ctem-framework-understanding-the-validation-stage/</loc>
		<lastmod>2025-08-19T15:34:28+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Building-a-CTEM-Framework_20240816.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Building-a-CTEM-Framework-Understanding-the-Validation-Stage_20240815_In-BlogImage-Recovered-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/27/understanding-advanced-endpoint-protection/</loc>
		<lastmod>2025-08-19T15:34:53+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Understanding-Advanced-Endpoint-Protection_20240809.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/09/06/a-finserv-leaders-guide-to-crafting-a-risk-management-program/</loc>
		<lastmod>2025-08-19T15:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_A-FinServ-Leaders-Guide-to-Crafting-a-Resilient-Cybersecurity-Risk-Management-Program_20240823.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/09/27/selecting-a-cybersecurity-consultant-insights-from-a-seasoned-vciso/</loc>
		<lastmod>2025-08-19T15:36:47+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Selecting-a-Cybersecurity-Consultant-Insights-from-a-Seasoned-vCISO_20240823.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/10/02/6-core-components-of-effective-phishing-simulation-programs/</loc>
		<lastmod>2025-08-19T15:37:07+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/09/AP_Blog_6-Core-Components-of-Effective-Phishing-Simulation-Programs_20240904.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/10/09/the-essential-role-of-threat-intelligence-in-security-operation-centers/</loc>
		<lastmod>2025-08-19T15:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_The-Essential-Role-of-Threat-Intelligence-in-Security-Operation-Centers_20240815.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/10/16/how-to-detect-and-prevent-insider-threats/</loc>
		<lastmod>2025-08-19T15:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/09/AP_Blog_How-to-Detect-and-Prevent-Insider-Threats-in-Your-Organization_20240919.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/10/22/business-email-compromise-scams-explained/</loc>
		<lastmod>2025-08-19T15:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/10/AP_Blog_Business-Email-Compromise-BEC-Scams-Explained_20240501.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/10/23/building-cyber-resilience-with-scenario-based-tabletop-exercises/</loc>
		<lastmod>2025-08-19T15:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/09/AP_Blog_Building-Cyber-Resilience-with-Scenario-Based-Tabletop-Exercises_20240916.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/11/19/6-myths-about-endpoint-security-and-protection/</loc>
		<lastmod>2025-08-19T15:43:13+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/11/AP_Blog_6-Myths-About-Endpoint-Security-Protection_20241118.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/12/11/soc-metrics-that-matter/</loc>
		<lastmod>2025-08-19T15:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/12/AP_Blog_SOC-Metrics-That-Matter-KPIs-Every-Security-Team-Should-Track_20241203.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/12/13/how-to-choose-an-mdr-provider/</loc>
		<lastmod>2025-08-19T15:45:41+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/12/AP_Blog_How-to-Choose-an-MDR-Provider_20241203.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/12/18/the-rise-of-ai-powered-secops/</loc>
		<lastmod>2025-08-19T15:46:35+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/12/AP_Blog_The-Rise-of-AI-Powered-SecOps_20241211.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/01/08/how-to-overcome-top-cybersecurity-challenges-in-2025/</loc>
		<lastmod>2025-08-19T15:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/AP_Blog_How-to-Overcome-Top-Cybersecurity-Challenges-in-2025_20250108.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/AP_NativeAd_On-DemandWebinar_V01.3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/01/17/preparing-for-pci-dss-v4-0-1/</loc>
		<lastmod>2025-08-19T15:47:08+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/AP_Blog_Preparing-for-PCI-DSS-v4.0.1_20250116.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/PCIDSS_RequirementsTimeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/PCIDSS_RequirementsTable.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/01/22/what-is-user-and-entity-behavior-analytics-ueba/</loc>
		<lastmod>2025-08-19T15:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/AP_Blog_What-is-User-and-Entity-Behavior-Analytics-UEBA__20250116.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/01/What-is-User-and-Entity-Behavior-Analytics-UEBA_In-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/02/06/overcoming-alert-fatigue-with-outsourced-soc-services/</loc>
		<lastmod>2025-08-19T15:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/02/AP_Blog_Overcoming-Alert-Fatigue-with-Outsourced-SOC-Services_20250206.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/02/AP_Blog_Alias_20250206_In-BlogImages_Quotes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/02/12/pci-dss-v4-0-1-enforcement-5-proactive-measures-to-help-achieve-compliance/</loc>
		<lastmod>2025-08-19T15:49:21+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/02/AP_Blog_PCI-DSS-v4.0.1-Enforcement_20250211.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/02/26/why-every-modern-soc-needs-a-cmdb/</loc>
		<lastmod>2025-08-19T15:49:48+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/02/AP_Blog_Why-Every-Modern-SOC-Needs-a-CMDB_20250221.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/03/20/soc-automation-7-uses-cases-for-the-modern-soc/</loc>
		<lastmod>2025-08-19T15:52:35+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/03/AP_Blog_SOC-Automation-7-Uses-Cases-for-the-Modern-SOC_20250314.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/16/top-5-reasons-to-adopt-managed-soc-services/</loc>
		<lastmod>2025-08-19T15:53:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/04/AP_Blog_Top-5-Reasons-to-Adopt-Managed-SOC-Services_20250403.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/29/emergency-ready-pike-township-fire-departments-cybersecurity-initiative/</loc>
		<lastmod>2025-08-19T15:54:30+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/04/AP_Blog_Case-Study_PikeTownship.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/30/aligning-security-operations-with-the-mitre-attck-framework/</loc>
		<lastmod>2025-08-19T15:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/04/AP_Blog_Aligning-Security-Operations-with-the-MITRE-ATTCK-Framework_20250415.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/07/soc-dashboards-key-features-functions-and-kpis/</loc>
		<lastmod>2025-08-19T15:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_ManagedSOCTools_20250506.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/21/what-is-cis-18-a-guide-to-the-critical-security-controls/</loc>
		<lastmod>2025-08-19T15:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_CIS18Explained_20250519-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/06/11/threat-mapping-101-how-to-visualize-and-prioritize-cyber-risk/</loc>
		<lastmod>2025-08-19T15:58:03+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_Threat-Mapping-101-How-to-Visualize-and-Prioritize-Cyber-Risk_20250528.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/Dashboard_ManagedSOC_ThreatMapping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/01/what-is-file-integrity-monitoring-and-why-it-matters/</loc>
		<lastmod>2025-08-19T15:59:27+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/06/AP_Blog_What-Is-File-Integrity-Monitoring-and-Why-It-Matters_20250620-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/03/log-data-analysis-explained/</loc>
		<lastmod>2025-08-19T15:59:29+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/06/AP_Blog_Log-Data-Analysis-Explained_20250701.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/08/what-is-iso-27001-a-beginners-guide/</loc>
		<lastmod>2025-08-19T15:59:34+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_WhatisISO27001_20250701.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/10/log-management-vs-log-analysis-why-both-matter-for-cyber-defense/</loc>
		<lastmod>2025-08-19T16:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_Log-Management-vs.-Log-Analysis-Why-Both-Matter-for-Cyber-Defense_20250702.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/15/how-workload-protection-powers-smarter-threat-detection/</loc>
		<lastmod>2025-08-19T16:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_How-Workload-Protection-Powers-Smarter-Threat-Detection_20250709.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/18/top-7-cybersecurity-threats-in-the-manufacturing-industry/</loc>
		<lastmod>2025-08-19T16:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_Top-Cybersecurity-Threats-Facing-the-Manufacturing-Industry_20250715.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/22/what-is-threat-hunting/</loc>
		<lastmod>2025-08-19T16:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_ThreatHunting_20250717.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/24/top-cybersecurity-breaches-in-manufacturing-and-what-you-can-learn-from-them/</loc>
		<lastmod>2025-08-19T16:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_Lessons-Learned-from-Breaches-in-Manufacturing_20250718.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/29/understanding-network-traffic-analysis/</loc>
		<lastmod>2025-08-19T16:02:28+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_NetworkThreatAnalysis_20250722.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/07/31/malware-detection-explained/</loc>
		<lastmod>2025-08-19T16:02:46+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_MalwareDetection_20250731.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/08/05/top-6-cybersecurity-frameworks-manufacturers-need-to-know/</loc>
		<lastmod>2025-08-19T16:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/07/AP_Blog_Cybersecurity-Frameworks-Impacting-Manufacturing_20250729.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/08/22/from-collection-to-action-the-process-of-operationalizing-threat-intelligence/</loc>
		<lastmod>2025-08-22T14:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/08/AP_Blog_Why-Operationalizing-Threat-Intelligence-is-a-Game-Changer_20250815.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/08/29/top-7-cyber-threats-facing-retailers-in-2025/</loc>
		<lastmod>2025-09-03T13:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/08/AP_Blog_Top-Cyber-Threats-Facing-Retailers-in-2025_20250827.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/09/04/why-every-organization-needs-cybersecurity-incident-response-playbooks/</loc>
		<lastmod>2025-09-04T08:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_Playbooks-That-Work-Designing-Incident-Response-Workflows-with-Real-Impact_20250826.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/09/12/lessons-learned-from-cybersecurity-breaches-in-retail/</loc>
		<lastmod>2025-09-12T19:53:18+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_Lessons-from-Breaches-in-Retail_20250904.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/09/23/threat-intel-emerging-email-client-threats-to-watch/</loc>
		<lastmod>2025-09-23T07:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_ThreatIntel_Emerging-Email-Client-Threats-to-Watch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/09/23/top-cybersecurity-frameworks-impacting-the-retail-industry/</loc>
		<lastmod>2025-09-23T20:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_Cybersecurity-Frameworks-Every-Retailer-Should-Know_20250915-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/07/the-rise-of-infostealers-why-theyre-outpacing-ransomware/</loc>
		<lastmod>2025-10-07T08:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_Infostealers_20250923.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/17/windows-10-end-of-life-whats-next-for-your-security-strategy/</loc>
		<lastmod>2025-11-04T18:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/10/AP_Blog_Windows10EOL_20251016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/07/10/armorpoint-thwarts-royal-ransomwares-latest-threat/</loc>
		<lastmod>2025-11-05T00:16:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_RansomwaresLatestThreat_20230710.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/10/02/exploring-baseline-security-maturity-levels/</loc>
		<lastmod>2025-11-05T00:16:09+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_SecurityMaturity_20231002.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Security-maturity-spectrum.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/10/02/how-to-outsmart-phishing-attempts/</loc>
		<lastmod>2025-11-05T00:16:12+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_OutsmartPhishingAttempts_20231002.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/10/01/4-tips-for-effective-software-updates/</loc>
		<lastmod>2025-11-05T00:16:15+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_SoftwareUpdates_20231001.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/10/01/the-power-of-strong-passwords-and-password-managers/</loc>
		<lastmod>2025-11-05T00:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_StrongPasswords_20231023.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/08/31/armorpoint-halts-rce-attack/</loc>
		<lastmod>2025-11-05T00:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_RCEAttack_20230831.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/07/sell-deeper-into-your-it-services-customer-base/</loc>
		<lastmod>2025-11-06T14:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Copy-of-Creating-a-Culture-of-Compliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/10/15/break-into-new-markets-during-economic-uncertainty-with-mssps/</loc>
		<lastmod>2025-11-06T14:50:40+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Break-into-New-Markets-During-Economic-Uncertainty-with-MSSPs-1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/08/07/collaboration-vs-construction-choosing-armorpoints-expertise-to-augment-in-house-soc/</loc>
		<lastmod>2025-11-06T15:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog-Case-Study_AliasCyberSecurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/11/20/from-msp-to-cybersecurity-leader-high-touch-technologies-journey-with-armorpoint/</loc>
		<lastmod>2025-11-06T15:19:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/11/AP_Blog_Case-Study_HighTouch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/11/AP_Blog_HighTouchCaseStudy_20241105_In-BlogImages_Quotes-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/11/AP_Blog_HighTouchCaseStudy_20241105_In-BlogImages_Quotes-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/02/20/interworks-journey-to-24x7-soc-services-with-armorpoint/</loc>
		<lastmod>2025-11-06T15:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/02/AP_Blog_Case-Study_InterWorks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/03/25/from-msp-to-mssp-seize-the-cybersecurity-opportunity-in-2025/</loc>
		<lastmod>2025-11-06T15:22:49+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/03/AP_Blog_From-MSP-to-MSSP-Seize-the-Cybersecurity-Opportunity-in-2025_20250325.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/08/7-reasons-to-start-selling-cybersecurity-in-2025/</loc>
		<lastmod>2025-11-06T15:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/04/AP_Blog_Why-Now-is-the-Right-Time-to-Become-an-MSSP_20250408-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/23/msps-expanding-into-cyber-6-key-mistakes-and-how-to-avoid-them/</loc>
		<lastmod>2025-11-06T15:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/04/AP_Blog_6-Key-Mistakesand-How-to-Avoid-Them_20250423.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/09/building-your-first-cybersecurity-service-stack-as-an-msp/</loc>
		<lastmod>2025-11-06T15:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_Building-Your-First-Cybersecurity-Service-Stack-as-an-MSP_20250509.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/16/how-esi-reduced-alert-fatigue-and-strengthened-client-trust-with-armorpoint/</loc>
		<lastmod>2025-11-06T15:27:08+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_Case-Study_ESI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/28/mastering-the-art-of-cybersecurity-sales-a-guide-for-msps/</loc>
		<lastmod>2025-11-06T15:28:48+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_Mastering-the-Art-of-Cybersecurity-Sales-A-Guide-for-MSPs_20250408.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/Mastering-the-Art-of-Cybersecurity-Sales_A-Guide-for-MSPs_Table1_V2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/Mastering-the-Art-of-Cybersecurity-Sales_A-Guide-for-MSPs_Table2_V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/09/16/how-msps-can-use-threat-intelligence-to-deliver-proactive-cybersecurity/</loc>
		<lastmod>2025-11-06T15:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_ThreatIntelligence_20250904.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/02/06/managed-strategy-in-cybersecurity/</loc>
		<lastmod>2025-11-10T16:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_ManagedStrategy_20240206.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/02/20/viatel-partnerships-with-armorpoint/</loc>
		<lastmod>2025-11-10T16:53:44+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/02/AP_Blog-Case-Study_Viatel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/03/12/how-ai-is-supercharging-phishing-and-social-engineering-attacks/</loc>
		<lastmod>2025-11-10T16:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/03/AP_Blog_How-AI-is-Supercharging-Phishing-and-Social-Engineering-Attacks_20250312.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/12/03/us-cybersecurity-regulations-impacting-financial-firms/</loc>
		<lastmod>2025-11-10T16:56:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/12/AP_Blog_US-Cybersecurity-Regulations-Impacting-Financial-Firms_20241202.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/09/13/balancing-innovation-and-security-ai-in-the-financial-sector/</loc>
		<lastmod>2025-11-10T16:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/08/AP_Blog_Balancing-Innovation-and-Security-AI-in-the-Financial-Sector_20240823.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/07/03/key-takeaways-from-the-top-cybersecurity-breaches-of-2024/</loc>
		<lastmod>2025-11-10T16:59:56+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/07/AP_Blog_Key-Takeaways-from-the-Top-Cybersecurity-Breaches-of-2024_20241218.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/16/budgeting-for-cyber-resilience-how-local-governments-can-adapt-after-the-ms-isac-transition/</loc>
		<lastmod>2025-11-10T17:10:35+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/10/AP_Blog_Budgeting-for-Cyber-Resilience_20251016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/24/what-the-ms-isac-transition-means-for-k-12-and-public-education/</loc>
		<lastmod>2025-11-10T17:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/10/AP_Blog_MS-ISAC-What-the-MS-ISAC-Transition-Means-for-K%E2%80%9312-and-Public-Education_20251022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/30/strengthening-civic-cyber-resilience-after-the-ms-isac-funding-shift/</loc>
		<lastmod>2025-11-10T17:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/10/AP_Blog_MS-ISAC-Rethinking-Collaboration-How-Municipalities-Can-Share-Cyber-Resources-Regionally_20251027-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2023/12/01/inside-harborshields-successful-expansion-into-cybersecurity/</loc>
		<lastmod>2025-11-10T17:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-Case-Study_HarborShield-1200x675-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/swatch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2020/10/AP_Blog_NativeAd-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/03/29/the-change-healthcare-breach-unpacked/</loc>
		<lastmod>2025-11-10T17:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/03/AP_Blog-With-Words_HealthcareRansomware_20240327.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/10/14/2026-prep-for-cisos-embedding-cybersecurity-into-company-culture/</loc>
		<lastmod>2025-11-10T17:16:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/09/AP_Blog_PrepforCISO_20250924.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/11/14/selling-cyber-inside-armorpoints-co-delivery-model/</loc>
		<lastmod>2025-11-14T15:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/11/AP_Blog_APCo-Delivery_20251027-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/11/25/key-cybersecurity-kpis-and-metrics-to-report-to-the-boardroom/</loc>
		<lastmod>2025-11-25T08:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/11/AP_Blog_2026-Prep-for-CISOs-Essential-Metrics-and-KPIs-to-Report-to-the-Boardroom_20251116.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/11/13/top-cyber-threats-during-the-holiday-season/</loc>
		<lastmod>2025-11-17T21:27:47+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/11/AP_Blog_Top-Threats-During-Holiday-Season_20251001-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/11/20/edr-evasion-tactics-on-the-rise/</loc>
		<lastmod>2025-11-20T08:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/11/AP_Blog_ThreatIntel_EDREvasion-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/15/avoiding-shelfware-siem-implementation-best-practices/</loc>
		<lastmod>2025-11-20T14:48:31+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/73621889_860x480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/04/20/take-the-long-view-on-cybersecurity-management-for-secure-remote-access/</loc>
		<lastmod>2025-11-20T14:48:44+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Copy-of-What-to-do-if-Your-Personal-Information-Has-Been-Exposed-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/03/31/what-to-do-if-your-account-has-been-hacked/</loc>
		<lastmod>2025-11-20T14:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Copy-of-What-to-do-if-Your-Personal-Information-Has-Been-Exposed-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2020/03/27/what-to-do-if-your-information-has-been-exposed/</loc>
		<lastmod>2025-11-20T14:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Copy-of-What-to-do-if-Your-Personal-Information-Has-Been-Exposed-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/14/it-leaders-guide-to-the-right-siem-deployment-method/</loc>
		<lastmod>2025-11-20T14:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/14/smb-benefits-of-managed-siem/</loc>
		<lastmod>2025-11-20T14:49:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/14/youve-been-hacked-now-what-the-cybersecurity-incident-response-guide/</loc>
		<lastmod>2025-11-20T14:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/13/security-breach-vs-ransomware-whats-the-difference/</loc>
		<lastmod>2025-11-20T14:49:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/13/how-smbs-can-control-it-security-costs/</loc>
		<lastmod>2025-11-20T14:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/13/where-most-siem-deployments-go-wrong/</loc>
		<lastmod>2025-11-20T14:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/10/dos-ddos-and-zero-day-ddos-what-is-the-difference/</loc>
		<lastmod>2025-11-20T14:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/10/5-steps-to-streamline-compliance-management/</loc>
		<lastmod>2025-11-20T14:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/dont-noc-it-until-you-try-it-the-emerging-impact-of-managed-noc-security/</loc>
		<lastmod>2025-11-20T14:50:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/how-your-legacy-it-infrastructure-is-putting-you-at-risk/</loc>
		<lastmod>2025-11-20T14:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/what-to-look-for-when-hiring-an-mssp/</loc>
		<lastmod>2025-11-20T14:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/dollars-in-the-dark-solving-for-shadow-it/</loc>
		<lastmod>2025-11-20T14:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/08/what-is-a-ddos-attack-and-how-i-can-prevent-one/</loc>
		<lastmod>2025-11-20T14:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/25/deciphering-the-data-compliance-landscape-in-2019/</loc>
		<lastmod>2025-11-20T14:51:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/15/the-nist-cybersecurity-framework-your-handy-how-to-guide/</loc>
		<lastmod>2025-11-20T14:51:42+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_73743476_860x480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/04/the-it-leaders-guide-to-choosing-the-right-siem-deployment-method/</loc>
		<lastmod>2025-11-20T14:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_122829912_860x480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/03/uncovering-the-business-value-of-siem/</loc>
		<lastmod>2025-11-20T14:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_234404592-860x480-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/01/what-is-next-gen-antivirus-and-why-do-i-need-it/</loc>
		<lastmod>2025-11-20T14:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/AdobeStock_193300639_860x480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/01/protecting-your-business-during-the-rise-of-ransomware/</loc>
		<lastmod>2025-11-20T14:52:59+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_206924855_860x480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/03/29/the-executives-guide-to-creating-a-cyber-security-plan/</loc>
		<lastmod>2025-11-20T14:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/134240213-blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/NIST-framework-graphic-1024x706.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/14/implementing-enterprise-level-security-on-an-smb-budget/</loc>
		<lastmod>2025-11-20T14:53:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/01/16/the-comprehensive-checklist-for-selecting-a-managed-soc-provider/</loc>
		<lastmod>2025-11-21T23:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_ManagedSOCChecklist_20240116.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/12/11/moving-beyond-compliance-how-cisos-can-build-programs-that-actually-reduce-risk/</loc>
		<lastmod>2025-12-11T08:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/12/AP_Blog_2026-Prep-for-CISOs-Moving-Beyond-Compliance-How-CISOs-Can-Build-Programs-That-Actually-Reduce-Risk_20251118-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/12/10/the-top-cybersecurity-threats-law-firms-face/</loc>
		<lastmod>2025-12-11T15:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/12/AP_Blog_Top-Cybersecurity-Threats-Law-Firms-Face_20251105-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/12/19/avoiding-credential-theft-attacks-during-the-holiday-season/</loc>
		<lastmod>2025-12-19T20:23:06+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/12/AP_Blog_ThreatIntel_Avoiding-Credential-Theft-Attacks-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/01/07/how-performance-monitoring-enhances-threat-detection-and-reduces-mttr/</loc>
		<lastmod>2026-01-07T08:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/12/AP_Blog_Product-Focus-1-Continuous-Monitoring-Visibility-Performance-Monitoring_20251218.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/01/14/what-is-a-managed-network-sensor-deep-network-visibility-explained/</loc>
		<lastmod>2026-01-14T08:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/12/AP_Blog_Product-Focus-2-Connectivity-Ecosystem-Managed-Network-Sensor_20260114.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/01/21/what-is-rogue-device-detection-eliminating-blind-spots-across-your-network/</loc>
		<lastmod>2026-01-21T08:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/01/AP_Blog_ProductFocus3-RogueDevice_20260109-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/01/27/the-rise-of-ransomware-as-a-service-and-what-it-means-for-defenders/</loc>
		<lastmod>2026-01-27T15:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/01/AP_Blog_ThreatIntel_The-Rise-of-Ransomware-as-a-Service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/02/06/how-siem-correlates-vulnerability-scanner-data-to-prioritize-real-threats/</loc>
		<lastmod>2026-02-06T14:29:08+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/02/AP_Blog_Product-Focus-4-Vulnerability-Risk-Management_20260203_Horizontal-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/05/28/windows-7-end-of-life-what-you-need-to-know-about-your-legacy-systems/</loc>
		<lastmod>2026-02-11T21:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Windows-7-End-of-Life-What-You-Need-to-Know-About-Your-Legacy-Systems-1024x536-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/06/24/meet-cmmc-requirements-with-armorpoint/</loc>
		<lastmod>2026-02-11T21:53:10+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2021/06/AP_Blog-With-Words_CMMC_20210624.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2021/06/25/what-you-need-to-know-about-ccpa-compliance/</loc>
		<lastmod>2026-02-11T21:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2021/06/AP_Blog-With-Words_CCPACompliance_20210625.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2022/12/12/safest-ways-to-ensure-data-integrity-a-quick-look/</loc>
		<lastmod>2026-02-11T21:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AP_Blog-With-Words_EnsureDataIntegrity_20221212.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/11/01/understanding-the-role-of-remediation-and-mitigation-in-cybersecurity/</loc>
		<lastmod>2026-02-11T22:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/09/AP_Blog_Understanding-the-Role-of-Remediation-and-Mitigation-in-Cybersecurity_20240917.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/10/14/armorpoint-threat-insider-new-smartphone-and-bluetooth-vulnerabilities/</loc>
		<lastmod>2026-02-12T15:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/Copy-of-What-to-do-if-Your-Personal-Information-Has-Been-Exposed-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/shutterstock_136199795.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/shutterstock_1260320983.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/shutterstock_349952822-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/02/18/siem-detection-rules-explained-how-tuning-improves-accuracy/</loc>
		<lastmod>2026-02-18T16:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/02/AP_Blog_Product-Focus-5-SOC_20260206_Horizontal-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/02/10-ways-to-secure-electronic-health-records-without-breaking-the-bank/</loc>
		<lastmod>2026-02-20T19:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_201433848_860x480.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/04/12/the-ultimate-guide-to-hipaa-compliance/</loc>
		<lastmod>2026-02-20T19:49:53+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/AdobeStock_135560228_860x480.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/04/18/understanding-the-hhs-cybersecurity-performance-goals/</loc>
		<lastmod>2026-02-20T19:51:48+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/04/AP_Blog-HHS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/03/27/whats-going-on-with-cybersecurity-regulations-in-healthcare/</loc>
		<lastmod>2026-02-20T19:52:43+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/03/AP_Blog-With-Words_Healthcare_20240327.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/05/22/rethinking-risk-in-healthcare-a-unified-approach-to-cyber-and-enterprise-risk-management/</loc>
		<lastmod>2026-02-20T19:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/05/AP_Blog_EnterpriseRiskManagement_20240514.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/06/25/cybersecurity-breaches-of-2025/</loc>
		<lastmod>2026-02-20T19:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/06/AP_Blog_Key-Takeaways-from-the-Top-Cybersecurity-Breaches-of-2025_20250623-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/11/06/top-10-healthcare-cybersecurity-best-practices/</loc>
		<lastmod>2026-02-20T19:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/11/AP_Blog_Top-10-Healthcare-Cybersecurity-Best-Practices_20241031.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2019/05/14/mssp-security-exploring-the-small-business-benefit/</loc>
		<lastmod>2026-02-20T19:57:42+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2023/12/211565856_860x480.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/04/24/understanding-the-importance-of-ir-dr-and-bcp/</loc>
		<lastmod>2026-02-20T19:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/04/AP_Blog-CrisistoContinuity_20240412.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2019/04/IndustryGuide_Healthcare_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/03/04/how-active-directory-integration-speeds-up-incident-containment/</loc>
		<lastmod>2026-03-04T09:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/02/AP_Blog_Product-Focus-_7-SOC-Active-Directory_03042026_Horizontal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/02/25/sandboxing-101-validating-suspicious-files-without-risk/</loc>
		<lastmod>2026-02-25T16:19:01+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/02/AP_Blog_Product-Focus-6-SOC_20260219_Horizontal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2024/05/08/a-step-by-step-guide-to-incident-response-practical-guidance-from-nist-sp-800-61/</loc>
		<lastmod>2026-02-26T19:45:31+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/05/AP_Blog_IncidentResponseNIST_20240501.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2024/05/AP_Blog-IRNIST800-61_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/03/11/the-alert-queue-how-modern-socs-prioritize-what-matters/</loc>
		<lastmod>2026-03-11T16:41:30+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/03/AP_Blog_Product-Focus-8-SOC-Alert-Incident-Queues_20260310_Horizontal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/03/16/siem-data-ingestion-explained-how-unlimited-models-improve-threat-detection/</loc>
		<lastmod>2026-03-16T14:35:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/03/AP_Blog_Product-Focus-9-Continuous-Monitoring-Visibility-%E2%80%93-Unlimited-Data-Ingest_20260318_Horizontal-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/05/14/5-major-k-12-data-breaches-and-what-they-teach-us/</loc>
		<lastmod>2026-03-27T19:06:19+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/05/AP_Blog_5-Major-K%E2%80%9312-Data-Breaches-and-What-They-Teach-Us_20250508.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/03/IndustryGuide_Education_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/06/16/making-sense-of-k-12-cybersecurity-frameworks-and-requirements/</loc>
		<lastmod>2026-03-27T19:07:25+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/06/AP_Blog_Making-Sense-of-K-12-Cybersecurity-Frameworks-and-Requirements_20250603.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/03/IndustryGuide_Education_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2025/04/02/top-k-12-cybersecurity-challenges-and-how-to-avoid/</loc>
		<lastmod>2026-03-27T19:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/03/AP_Blog_Top-K-12-Cybersecurity-Challenges-and-How-to-Avoid_20250324-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2025/03/AP_Blog_Top-K-12-Cybersecurity-Challenges-and-How-to-Avoid_20250324_In-BlogImages_Stats_dark.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/03/IndustryGuide_Education_Mockup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/04/06/what-is-managed-extended-detection-and-response-mxdr/</loc>
		<lastmod>2026-04-06T14:52:53+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/04/AP_Blog_What-is-MXDR_20260330_Horizontal-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/04/08/optimizing-syslog-collection-best-practices-for-high-volume-environments/</loc>
		<lastmod>2026-04-08T14:01:45+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/04/AP_Blog_Product-Focus-10-Syslog-Forwarding_20260408_Horizontal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://armorpoint.com/2026/04/08/top-cybersecurity-threats-in-the-oil-and-gas-industry/</loc>
		<lastmod>2026-04-08T15:08:05+00:00</lastmod>
		<image:image>
			<image:loc>https://armorpoint.com/wp-content/uploads/2026/04/AP_Blog_Cybersecurity-in-Oil-Gas_20260408_Horizontal.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->
<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Minified using Disk

Served from: armorpoint.com @ 2026-04-09 20:54:47 by W3 Total Cache
-->