<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.exabeam.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-harnessing-the-power-of-automation-in-cybersecurity/</loc>
		<lastmod>2023-11-28T18:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Harnessing-the-Power-of-Automation-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-92-The-Power-of-Automation-Which-Tools-Can-Help-Your-Security-Team-with-guest-Peter-Frochtenicht-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-july-2023/</loc>
		<lastmod>2023-11-28T18:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-July-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/igniting-passion-for-corporate-communications-my-exabeam-internship-experience/</loc>
		<lastmod>2023-11-28T18:22:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Igniting-Passion-for-Corporate-Communications-My-Exabeam-Internship-Experience-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-promo-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/reflections-on-my-internship-insights-teamwork-and-growth-at-exabeam/</loc>
		<lastmod>2023-11-28T18:23:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Reflections-on-My-Internship-Insights-Teamwork-and-Growth-at-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Reflections-on-My-Internship-inpage-01-1024x599.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-promo-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/a-transformative-journey-my-internship-experience-at-exabeam/</loc>
		<lastmod>2023-11-28T18:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-My-Internship-Experience-at-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-inpage-01-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-promo-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/revolutionizing-soc-efficiency-cribl-observability-pipelines-in-cloud-native-siem/</loc>
		<lastmod>2023-11-30T19:33:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Revolutionizing-SOC-Efficiency-Cribl-Observability-Pipelines-in-Cloud-Native-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/from-wargames-to-wall-street-frank-vesces-cybersecurity-journey/</loc>
		<lastmod>2023-11-30T20:07:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-From-WarGames-to-Wall-Street-Frank-Vesces-Cybersecurity-Journey-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/CUSTOMER-Secure-Soft-bg-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/human-connections-in-tech-a-dialogue-with-brad-sexton/</loc>
		<lastmod>2023-11-30T20:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Human-Connections-in-Tech-A-Dialogue-With-Brad-Sexton-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-CISOs-Roadmap-Enhancing-Detection-Automation-and-Empowerment-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/neurodivergence-vulnerability-and-happiness-a-fresh-take-on-cybersecurity-leadership/</loc>
		<lastmod>2023-11-30T23:54:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Neurodivergence-Vulnerability-and-Happiness-A-Fresh-Take-on-Cybersecurity-Leadership-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/navigating-cybersecurity-leadership-debunking-excuses-and-embracing-change/</loc>
		<lastmod>2023-12-01T00:02:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Navigating-Cybersecurity-Leadership-Debunking-Excuses-and-Embracing-Change-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-91-Taking-Extreme-Ownership-How-3-Common-Excuses-Hurt-Security-Leaders-with-guest-Michael-Meis-feature-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-new-paradigm-for-cisos-aligning-security-with-revenue-generation/</loc>
		<lastmod>2023-12-01T00:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-New-Paradigm-for-CISOs-Aligning-Security-with-Revenue-Generation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-How-To-Build-Trust-Within-Your-Team-Your-Business-and-Yourself-with-guest-Adam-Currie-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-journey-to-ciso-success-through-authenticity-and-adaptability/</loc>
		<lastmod>2023-12-01T00:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Journey-to-CISO-Success-Through-Authenticity-and-Adaptability-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Be-Comfortable-Being-Uncomfortable-Managing-New-Roles-and-Next-Steps-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-resilient-ciso-balancing-mental-health-team-dynamics-and-incident-response/</loc>
		<lastmod>2023-12-01T00:17:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Resilient-CISO-Balancing-Mental-Health-Team-Dynamics-and-Incident-Response-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-Patient-Safety-Model-Developing-a-Hospitals-Security-Culture-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/overcoming-data-limitations-with-observability-pipelines/</loc>
		<lastmod>2023-12-01T00:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Overcoming-Data-Limitations-With-Observability-Pipelines-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Cloud-native-SIEM-featured-01-2-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-june-2023/</loc>
		<lastmod>2023-12-01T00:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-June-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-role-of-todays-ciso-opportunities-challenges-and-personal-liabilities/</loc>
		<lastmod>2023-12-01T00:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Role-of-Todays-CISO-Opportunities-Challenges-and-Personal-Liabilities-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-What-Would-a-Breach-Cost-You-Personal-Risk-vs-Reward-as-a-CISO-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/uncategorized/invisible-threats-data-breaches-ai-and-the-lgbtqia-community/</loc>
		<lastmod>2023-12-01T00:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Invisible-Threats-Data-Breaches-AI-and-the-LGBTQIA-Community-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/demystifying-insider-threats-an-insightful-discussion/</loc>
		<lastmod>2023-12-01T00:54:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-Insider-Threats-An-Insightful-Discussion-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-The-Hidden-Threat-Understanding-Insider-Risks-featured-03-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-cisos-role-building-security-mindfulness-credibility-and-influence/</loc>
		<lastmod>2023-12-01T01:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISOs-Role-Building-Security-Mindfulness-Credibility-and-Influence-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-5-Top-Tips-for-Boosting-Security-Mindfulness-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/from-farming-to-the-white-house-mark-weatherfords-journey-to-becoming-a-ciso/</loc>
		<lastmod>2023-12-01T01:34:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-From-Farming-to-the-White-House-Mark-Weatherfords-Journey-to-Becoming-a-CISO-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Be-the-One-Who-Gets-the-Call-The-Keys-to-Landing-New-Opportunities-featured-01-1024x535.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Are-You-Ready-to-be-a-CISO-Why-Mentors-Matter-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-importance-of-data-science-in-cybersecurity-insights-from-steve-magowan/</loc>
		<lastmod>2023-12-01T01:43:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Importance-of-Data-Science-in-Cybersecurity-Insights-from-Steve-Magowan-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Protecting-Your-Revenue-with-Machine-Learning-and-Data-Science-with-Steve-Magowan-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-august-2022/</loc>
		<lastmod>2023-12-01T02:44:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-August-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-june-2022/</loc>
		<lastmod>2023-12-01T03:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-June-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/who-cares-exabeam-cares/</loc>
		<lastmod>2023-12-01T03:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Who-Cares-Exabeam-Cares-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-september-2023/</loc>
		<lastmod>2023-12-01T05:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-September-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-october-2023/</loc>
		<lastmod>2023-12-01T05:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-inpage-06-1024x544.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-inpage-02-1024x425.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-inpage-03-1024x622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-October-2023-inpage-05-1024x758.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-future-of-cybersecurity-leadership-lessons-from-cisos-in-the-trenches/</loc>
		<lastmod>2023-12-01T19:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Future-of-Cybersecurity-Leadership-Lessons-from-CISOs-in-the-Trenches-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-79-Building-Your-Framework-for-Fulfillment-with-Demetrios-Lazarikos-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-april-2023/</loc>
		<lastmod>2023-12-01T19:50:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-April-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/maximizing-your-cybersecurity-investment-evaluating-and-implementing-effective-ueba-solutions/</loc>
		<lastmod>2023-12-01T20:38:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Maximizing-Your-Cybersecurity-Investment-Evaluating-and-Implementing-Effective-UEBA-Solutions-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-exabeam-third-annual-partner-of-year-awards-have-been-announced-and-the-winners-are/</loc>
		<lastmod>2023-12-01T21:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Exabeam-Third-Annual-Partner-of-Year-Awards-Have-Been-Announced.-And-the-Winners-Are-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-february-2023/</loc>
		<lastmod>2023-12-01T21:31:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-games-siem-vendors-play-statistics-vs-machine-learning-and-malware-vs-compromised-credential-detection/</loc>
		<lastmod>2023-12-01T23:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Games-SIEM-Vendors-Play-Statistics-vs-Machine-Learning-and-Malware-vs-Compromised-Credential-Detection-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-Forrester-The-Total-Economic-Impact-of-Exabeam-Fusion-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-games-siem-vendors-play-public-cloud-and-user-security/</loc>
		<lastmod>2023-12-01T23:43:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Games-SIEM-Vendors-Play-Public-Cloud-and-User-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-Forrester-The-Total-Economic-Impact-of-Exabeam-Fusion-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-games-siem-vendors-play-pricing-and-scalability/</loc>
		<lastmod>2023-12-01T23:44:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Games-SIEM-Vendors-Play-Pricing-and-Scalability-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-Forrester-The-Total-Economic-Impact-of-Exabeam-Fusion-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-january-2023/</loc>
		<lastmod>2023-12-01T23:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-January-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/are-systems-integrators-pricey-not-if-you-consider-how-they-reduce-costs-long-term/</loc>
		<lastmod>2023-12-02T00:03:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Are-Systems-Integrators-Pricey-Not-If-You-Consider-How-They-Reduce-Costs-Long-Term-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-How-to-build-an-Insider-Threat-program-with-Exabeam-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/human-resources-predictions-for-2023/</loc>
		<lastmod>2023-12-02T00:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Human-Resources-Predictions-for-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-Preventing-Insider-Threats-with-UEBA-featured-02-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeamers-make-cybersecurity-predictions-for-2023/</loc>
		<lastmod>2023-12-02T01:23:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeamers-Make-Cybersecurity-Predictions-for-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Cybersecurity-Trends-for-2022-Tyler-Farrar-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Steve-Moore-headshot-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Cybersecurity-Trends-for-2022-Samantha-Humphries-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Richard-Orange-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Matthieu-Rider-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-How-to-build-an-Insider-Threat-program-with-Exabeam-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-achieves-iso-27017-and-iso-27018-certifications/</loc>
		<lastmod>2023-12-02T01:33:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Achieves-ISO-27017-and-ISO-27018-Certifications-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/organizational-downsizing-and-insider-threats-detecting-the-undetectable-to-reduce-risk/</loc>
		<lastmod>2023-12-02T01:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Organizational-Downsizing-and-Insider-Threats-Detecting-the-Undetectable-to-Reduce-Risk-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Organizational-Downsizing-and-Insider-Threats-Detecting-the-Undetectable-to-Reduce-Risk-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Organizational-Downsizing-and-Insider-Threats-Detecting-the-Undetectable-to-Reduce-Risk-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Organizational-Downsizing-and-Insider-Threats-Detecting-the-Undetectable-to-Reduce-Risk-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/looking-back-at-the-evolution-of-siem/</loc>
		<lastmod>2023-12-04T19:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Looking-Back-at-the-Evolution-of-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/whats-new-in-exabeam-product-development-september-2022/</loc>
		<lastmod>2023-12-04T19:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-September-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/to-all-women-cis-and-trans-we-see-you-we-honor-you/</loc>
		<lastmod>2023-12-04T22:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/anatomy-of-a-retail-point-of-sale-cyberattack/</loc>
		<lastmod>2023-12-04T23:47:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anatomy-of-a-Retail-Point-of-Sale-Cyberattack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anatomy-of-a-Retail-Point-of-Sale-Cyberattack-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anatomy-of-a-Retail-Point-of-Sale-Cyberattack-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-Why-You-Need-an-Incident-Response-Plan-featured-01-1024x536.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/deloitte-implements-exabeam-for-advanced-analytics-on-insider-threats/</loc>
		<lastmod>2023-12-04T23:52:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deloitte-Implements-Exabeam-for-Advanced-Analytics-on-Insider-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-july-2022/</loc>
		<lastmod>2023-12-05T00:06:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOGWhats-New-in-Exabeam-Product-Development-July-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-july-18-2022/</loc>
		<lastmod>2023-12-05T00:08:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-July-18-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-validation-of-open-xdr/</loc>
		<lastmod>2023-12-05T01:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Validation-of-Open-XDR-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/one-week-of-gartner-security-risk-summit-2022-in-10-minutes/</loc>
		<lastmod>2023-12-05T01:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-One-Week-of-Gartner-Security-and-Risk-Summit-2022-in-10-Minutes-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-june-6-2022/</loc>
		<lastmod>2023-12-05T01:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-June-6-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/16-infosec-resources-you-might-have-missed-in-may/</loc>
		<lastmod>2023-12-05T01:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-16-InfoSec-Resources-You-Might-Have-Missed-in-May-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-may-2022/</loc>
		<lastmod>2023-12-05T01:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-a-multiplier-for-any-zero-trust-strategy/</loc>
		<lastmod>2023-12-05T01:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-A-Multiplier-for-Any-Zero-Trust-Strategy-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-A-Multiplier-for-Any-Zero-Trust-Strategy-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-A-Multiplier-for-Any-Zero-Trust-Strategy-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/you-cant-defend-what-you-cant-see-the-top-three-questions-for-every-ciso/</loc>
		<lastmod>2023-12-05T01:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-You-Cant-Defend-What-You-Cant-See-The-Top-Three-Questions-for-Every-CISO-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/what-can-we-learn-from-the-lapsus-attacks/</loc>
		<lastmod>2023-12-05T01:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-Can-We-Learn-From-the-Lapsus-Attacks-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/incident-response-automation-and-security-orchestration-with-soar/</loc>
		<lastmod>2023-12-05T01:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Automation-and-Security-Orchestration-with-SOAR-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Automation-and-Security-Orchestration-with-SOAR-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Automation-and-Security-Orchestration-with-SOAR-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Automation-and-Security-Orchestration-with-SOAR-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/why-i-joined-exabeam-mdc/</loc>
		<lastmod>2023-12-05T17:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-I-Joined-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-invest-in-people-as-much-as-tools/</loc>
		<lastmod>2023-12-05T19:19:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Invest-in-People-as-Much-as-Tools-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-60-Invest-in-People-as-Much-as-Tools-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-managing-your-first-zero-day-attack/</loc>
		<lastmod>2023-12-05T19:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Managing-Your-First-Zero-Day-Attack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-63-Managing-Your-First-Zero-Day-Attack-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/whats-the-big-deal-with-big-data-analytics/</loc>
		<lastmod>2023-12-05T19:54:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-the-Big-Deal-with-Big-Data-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-demonstrating-your-value-of-your-program-to-the-layperson/</loc>
		<lastmod>2023-12-05T19:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Demonstrating-Your-Value-of-Your-Program-to-the-Layperson-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-62-Demonstrating-the-Value-of-Your-Program-to-the-Layman-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/our-journey-to-diversity-and-inclusion-in-the-workplace/</loc>
		<lastmod>2023-12-05T19:55:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Journey-to-Diversity-and-Inclusion-in-the-Workplace-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-12-posts-from-the-exabeam-blog/</loc>
		<lastmod>2023-12-05T20:05:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-12-Posts-from-the-Exabeam-Blog-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/and-the-winners-of-the-exabeam-cybersecurity-scholarships-are/</loc>
		<lastmod>2023-12-05T20:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-And-the-Winners-of-the-Exabeam-Cybersecurity-Scholarships-Are-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/why-i-joined-exabeam/</loc>
		<lastmod>2023-12-05T20:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-I-Joined-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/shields-up-bolstering-your-security-posture-following-ukraine-invasion/</loc>
		<lastmod>2023-12-05T21:10:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-Bolstering-Your-Security-Posture-Following-Ukraine-Invasion-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/managed-detection-and-response-dispelling-the-myth-of-transparency/</loc>
		<lastmod>2023-12-05T21:28:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Managed-Detection-and-Response-Dispelling-the-Myth-of-Transparency-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/edr-vs-epp-what-is-the-difference/</loc>
		<lastmod>2023-12-06T00:51:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-EDR-vs-EPP-What-is-the-Difference-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/4-stages-of-vulnerability-management-a-process-for-risk-mitigation/</loc>
		<lastmod>2023-12-06T00:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-4-Stages-of-Vulnerability-Management-A-Process-for-Risk-Mitigation-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/5-security-questions-to-consider-this-holiday-season/</loc>
		<lastmod>2023-12-06T01:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Security-Questions-to-Consider-this-Holiday-Season-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Security-Questions-to-Consider-this-Holiday-Season-inpage-01-1024x768.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/our-customers-have-spoken-exabeam-named-a-2021-gartner-peer-insights-customers-choice-for-siem/</loc>
		<lastmod>2023-12-06T01:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Customers-Have-Spoken-Exabeam-named-a-2021-Gartner-Peer-Insights-Customers-Choice-for-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/telecommunications-giant-teams-up-with-exabeam-to-mitigate-internal-fraud/</loc>
		<lastmod>2023-12-06T01:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Telecommunications-Giant-Teams-Up-with-Exabeam-to-Mitigate-Internal-Fraud-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/youve-suffered-a-breach-now-what/</loc>
		<lastmod>2023-12-06T01:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Youve-Suffered-a-Breach-Now-What-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-signs-respect-in-security-pledge/</loc>
		<lastmod>2023-12-06T01:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Signs-Respect-in-Security-Pledge-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/mitre-attck-update-covers-insider-threat-attack-techniques/</loc>
		<lastmod>2023-12-06T02:04:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MITRE-ATTCK-Update-Covers-Insider-Threat-Attack-Techniques-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/siem-gartner-get-the-2021-magic-quadrant-report/</loc>
		<lastmod>2023-12-06T02:08:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-Gartner-Get-the-2021-Magic-Quadrant-Report-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-challenges-of-todays-ciso-navigating-the-balance-of-compliance-and-security/</loc>
		<lastmod>2023-12-06T02:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Challenges-of-Todays-CISO-Navigating-the-Balance-of-Compliance-and-Security-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/automated-socs-musings-from-industry-analysts-and-ex-analysts/</loc>
		<lastmod>2023-12-06T02:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Automated-SOCs-Musings-from-Industry-Analysts-and-Ex-analysts-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/introducing-the-xdr-alliance/</loc>
		<lastmod>2023-12-06T02:15:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-the-XDR-Alliance-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/user-behavior-analytics-uba-ueba-the-key-to-uncovering-insider-and-unknown-security-threats/</loc>
		<lastmod>2023-12-06T16:30:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Analytics-UBA-UEBA-The-Key-to-Uncovering-Insider-and-Unknown-Security-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/dazed-and-confused-by-the-xdr-telenovela/</loc>
		<lastmod>2023-12-06T18:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Dazed-and-Confused-by-the-XDR-Telenovela-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/helping-retailers-deliver-a-secure-omnichannel-experience/</loc>
		<lastmod>2023-12-06T18:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Helping-Retailers-Deliver-a-Secure-Omnichannel-Experience-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/demystifying-the-soc-part-5-the-new-soc-maturity-model-based-on-outcomes/</loc>
		<lastmod>2023-12-06T18:51:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-the-SOC-Part-5-The-New-SOC-Maturity-Model-based-on-Outcomes-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/lessons-from-a-new-ciso-a-conversation-with-ous-aaron-baillio/</loc>
		<lastmod>2023-12-06T19:24:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Lessons-From-a-New-CISO-A-Conversation-with-OUs-Aaron-Baillio-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/demystifying-the-soc-part-3-whether-you-know-it-or-not-you-have-a-soc/</loc>
		<lastmod>2023-12-06T19:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-the-SOC-Part-3-Whether-You-Know-It-or-Not-You-Have-a-SOC-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/demystifying-the-soc-part-2-prevention-isnt-enough-assume-compromise/</loc>
		<lastmod>2023-12-06T19:29:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-the-SOC-Part-2-Prevention-isnt-Enough-Assume-Compromise-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-attackers-leverage-pentesting-tools-in-the-wild/</loc>
		<lastmod>2023-12-06T19:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Attackers-Leverage-Pentesting-Tools-in-the-Wild-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-growth-and-the-opportunity-ahead/</loc>
		<lastmod>2023-12-06T19:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Growth-and-the-Opportunity-Ahead-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/demystifying-the-soc-part-1-whether-you-know-it-or-not-you-need-a-soc/</loc>
		<lastmod>2023-12-06T19:38:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-the-SOC-Part-1-Whether-You-Know-It-or-Not-You-Need-a-SOC-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/equipping-sitech-services-with-the-tools-to-tackle-insider-threats-head-on/</loc>
		<lastmod>2023-12-06T19:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Equipping-Sitech-Services-with-the-Tools-to-Tackle-Insider-Threats-Head-On-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/why-does-the-xdr-market-exist/</loc>
		<lastmod>2023-12-06T19:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-does-the-XDR-market-exist-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/an-exchange-vulnerability-in-ransomware/</loc>
		<lastmod>2023-12-06T20:33:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-Exchange-Vulnerability-in-Ransomware-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/introducing-exabeam-alert-triage/</loc>
		<lastmod>2023-12-06T20:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-Alert-Triage-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/Alert_Triage_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/Alert_Triage_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/Alert_Triage_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/Alert_Triage_4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/zero-days-like-hafnium-attacks-on-exchange-servers-are-the-new-norm-why-ueba-matters-more-than-ever/</loc>
		<lastmod>2023-12-06T20:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Zero-days-Like-HAFNIUM-Attacks-on-Exchange-Servers-Are-the-New-Norm-Why-UEBA-Matters-More-Than-Ever-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/04/4_AA-Lateral-Movement-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/detecting-zerologon-cve-2020-1472-using-exabeam-data-lake/</loc>
		<lastmod>2023-12-06T20:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Zerologon-CVE-2020-1472-Using-Exabeam-Data-Lake-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/zero-trust-architecture-practical-considerations-for-implementation/</loc>
		<lastmod>2023-12-06T21:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Zero-Trust-Architecture-Practical-Considerations-for-Implementation-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/us-australia-security-teams-are-behind-the-times-in-gender-pay-equality/</loc>
		<lastmod>2023-12-06T21:25:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-US-Australia-Security-Teams-are-Behind-the-Times-in-Gender-Pay-Equality-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/recent-breaches-show-why-federal-agencies-need-these-3-requirements-from-modern-siems/</loc>
		<lastmod>2023-12-06T21:26:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Recent-Breaches-Show-Why-Federal-Agencies-Need-These-3-Requirements-From-Modern-SIEMs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/compromised-credentials-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/compromised-credentials-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/compromised-credentials-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/ciso-liability-and-lawsuits-in-the-face-of-a-crisis-part-2/</loc>
		<lastmod>2023-12-06T21:27:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-CISO-Liability-and-Lawsuits-in-the-Face-of-a-Crisis-Part-2-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/escaping-dantes-soc-inferno-dont-leave-me-in-limbo/</loc>
		<lastmod>2023-12-06T21:31:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-Dont-Leave-Me-in-Limbo-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-announces-first-ever-scholarship-competition/</loc>
		<lastmod>2023-12-06T23:23:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Announces-First-Ever-Scholarship-Competition-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/escaping-dantes-soc-inferno-a-question-of-lust/</loc>
		<lastmod>2023-12-07T00:48:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-A-Question-of-Lust-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/helping-swedbank-secure-a-global-financial-network/</loc>
		<lastmod>2023-12-07T00:54:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Helping-Swedbank-Secure-a-Global-Financial-Network-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/escaping-dantes-soc-inferno-the-anger-of-shattered-dreams/</loc>
		<lastmod>2023-12-07T00:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-The-Anger-of-Shattered-Dreams-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/outsmart-the-odds/</loc>
		<lastmod>2023-12-07T00:57:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Outsmart-the-Odds-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/escaping-dantes-soc-inferno-the-heresy-of-orthodox-secops/</loc>
		<lastmod>2023-12-07T00:57:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-The-Heresy-of-Orthodox-SecOps-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-configure-windows-event-forwarding-wef-using-supercharger/</loc>
		<lastmod>2023-12-07T01:03:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Configure-Windows-Event-Forwarding-WEF-using-Supercharger-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-1-collectors-300x53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-2-quick-start-300x87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-4-implement-gpo-300x100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-5-setup-subscription-300x65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-5-setup-subscription-1-300x65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-6-new-subscription-300x164.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-7-new-policy-300x224.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-8-forwarders-300x294.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-9-forwarder-test-300x197.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-10-filters-300x277.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-11-submit-300x293.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-12-collector-setup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/section-3-13-check-forwarders-300x86.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/escaping-dantes-soc-inferno-the-violence-of-destructive-metrics/</loc>
		<lastmod>2023-12-07T01:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-The-Violence-of-Destructive-Metrics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/7-tips-for-successfully-onboarding-your-analysts/</loc>
		<lastmod>2023-12-07T01:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-7-Tips-for-Successfully-Onboarding-Your-Analysts-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/escaping-dantes-soc-inferno-the-treachery-of-siem-lies/</loc>
		<lastmod>2023-12-07T01:08:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-The-Treachery-of-SIEM-Lies-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-castra-leverages-the-power-of-exabeam/</loc>
		<lastmod>2023-12-07T01:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Castra-Leverages-the-Power-of-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/riot-games-chris-hymes-on-cybersecurity-for-the-gaming-industry/</loc>
		<lastmod>2023-12-07T01:20:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Riot-Games-Chris-Hymes-on-Cybersecurity-for-the-Gaming-Industry-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/understanding-insider-threat-detection-tools/</loc>
		<lastmod>2023-12-07T01:22:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-Insider-Threat-Detection-Tools-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/apache-nifi-sql-server-and-kerberos-authentication/</loc>
		<lastmod>2023-12-07T01:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Apache-NiFi-SQL-Server-and-Kerberos-Authentication-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/figure-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/detecting-sigred-cve-2020-1350-with-exabeam/</loc>
		<lastmod>2023-12-07T01:24:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-SIGRed-CVE-2020-1350-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/sigred-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/sigred-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/sigred-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/insider-threats-what-your-business-needs-to-know-infographic/</loc>
		<lastmod>2023-12-07T01:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threats-What-Your-Business-Needs-to-Know-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/insider-threat-profiles-300x157.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/insider-threat-cost-300x157.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/insider-threat-infographic-300x206.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/femsa-improves-security-and-supercharges-their-soc-with-exabeam/</loc>
		<lastmod>2023-12-07T01:26:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-FEMSA-Improves-Security-and-Supercharges-Their-SOC-With-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/what-the-twitter-attack-teaches-us-about-manipulated-insiders/</loc>
		<lastmod>2023-12-07T01:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-the-Twitter-Attack-Teaches-Us-About-Manipulated-Insiders-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/who-is-apt29/</loc>
		<lastmod>2023-12-07T01:32:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Who-is-APT29-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/its-better-to-see-in-3d-announcing-the-3d-technology-partner-program/</loc>
		<lastmod>2023-12-07T03:25:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Its-Better-to-See-in-3D-Announcing-the-3D-Technology-Partner-Program-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/a-day-in-the-life-of-an-exabeamer/</loc>
		<lastmod>2023-12-07T03:33:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Day-in-the-Life-of-an-Exabeamer-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/uncategorized/new-gtlds-and-old-unicode-issues/</loc>
		<lastmod>2023-12-07T18:57:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-gTLDs-and-Old-Unicode-Issues-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/add-intelligence-to-elastics-siem-with-exabeam/</loc>
		<lastmod>2023-12-07T19:04:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Add-Intelligence-to-Elastics-SIEM-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/elastic-and-exabeam-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/elastic-and-exabeam-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/elastic-and-exabeam-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/elastic-and-exabeam-4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/elastic-and-exabeam-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/getting-visibility-of-high-risk-activity-across-your-cloud-applications/</loc>
		<lastmod>2023-12-07T19:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Getting-Visibility-of-High-Risk-Activity-Across-Your-Cloud-Applications-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/are-passwords-a-thing-of-the-past-getting-ahead-of-credential-stuffing-attacks/</loc>
		<lastmod>2023-12-07T19:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Are-Passwords-a-Thing-of-the-Past-Getting-Ahead-of-Credential-Stuffing-Attacks-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-ed-kiledjian-on-recovering-from-a-bad-ciso/</loc>
		<lastmod>2023-12-07T19:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Ed-Kiledjian-on-Recovering-from-a-Bad-CISO-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/dark-mode-now-available-for-exabeam-customers/</loc>
		<lastmod>2023-12-07T19:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Dark-Mode-Now-Available-for-Exabeam-Customers-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/04/Dark-Mode-Timeline-1024x652.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/detecting-credential-stuffing-attacks-and-lateral-movement/</loc>
		<lastmod>2023-12-07T19:37:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Credential-Stuffing-Attacks-and-Lateral-Movement-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/kubernetes-security-monitoring-how-to-gain-visibility-and-prevent-breaches/</loc>
		<lastmod>2023-12-07T19:40:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Kubernetes-Security-Monitoring-How-to-Gain-Visibility-and-Prevent-Breaches-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/operational-technology-the-hidden-threat-lurking-in-your-network/</loc>
		<lastmod>2023-12-07T19:40:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Operational-Technology-The-Hidden-Threat-Lurking-in-Your-Network-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ransomware-targets-healthcare/</loc>
		<lastmod>2023-12-07T20:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Targets-Healthcare-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-inside-security-emea-learning-fun-charity-and-prizes-thats-a-big-yes/</loc>
		<lastmod>2023-12-07T20:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Inside-Security-EMEA-Learning-Fun-Charity-and-Prizes-Thats-a-Big-Yes-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/05/Inside-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/military-awareness-month-helping-veterans-start-a-career-in-cybersecurity/</loc>
		<lastmod>2023-12-07T20:37:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Military-Awareness-Month-Helping-Veterans-Start-a-Career-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-syslog-windows-logs-for-free/</loc>
		<lastmod>2023-12-07T20:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Syslog-Windows-Logs-for-Free-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/05/NXLog-Data-Lake.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/are-your-systems-nist-800-171-compliant-what-you-need-to-know/</loc>
		<lastmod>2023-12-07T20:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Are-Your-Systems-NIST-800-171-Compliant-What-You-Need-to-Know-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-self-study-to-become-a-software-engineer-part-1/</loc>
		<lastmod>2023-12-07T20:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Self-study-to-Become-a-Software-Engineer-Part-1-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/7-cloud-security-tools-to-watch-for-in-2020/</loc>
		<lastmod>2023-12-07T20:46:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-7-Cloud-Security-Tools-to-Watch-for-in-2020-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-martin-littmann-on-managing-a-remote-team/</loc>
		<lastmod>2023-12-07T20:46:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Martin-Littmann-on-Managing-a-Remote-Team-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-cybersecurity-best-practices-for-the-hybrid-cloud/</loc>
		<lastmod>2023-12-07T21:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Cybersecurity-Best-Practices-for-the-Hybrid-Cloud-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/securing-your-remote-workforce-part-3-how-to-detect-malware-in-the-guise-of-productivity-tools/</loc>
		<lastmod>2023-12-07T21:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Securing-Your-Remote-Workforce-Part-3-How-to-Detect-Malware-in-the-Guise-of-Productivity-Tools-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/are-vulnerabilities-in-our-u-s-elections-insurmountable-part-1/</loc>
		<lastmod>2023-12-07T21:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Are-Vulnerabilities-in-our-U.S.-Elections-Insurmountable-Part-1-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/plugging-aws-into-your-siem-a-practical-guide/</loc>
		<lastmod>2023-12-07T21:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Plugging-AWS-Into-Your-SIEM-A-Practical-Guide-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/mssp-mdr-or-saas-siem/</loc>
		<lastmod>2023-12-07T23:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MSSP-MDR-or-SaaS-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-exabeam-helps-blue-teams-counter-red-team-attacks/</loc>
		<lastmod>2023-12-07T23:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Exabeam-Helps-Blue-Teams-Counter-Red-Team-Attacks-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/recent-ransomware-attacks-raise-the-stakes-for-data-exfiltration/</loc>
		<lastmod>2023-12-07T23:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Recent-Ransomware-Attacks-Raise-the-Stakes-for-Data-Exfiltration-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/strategies-for-protecting-iot-devices-behavior-analytics-vulnerability-scanning-and-edr/</loc>
		<lastmod>2023-12-07T23:59:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Strategies-for-Protecting-IoT-Devices-Behavior-Analytics-Vulnerability-Scanning-and-EDR-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/keeping-tabs-on-fast-moving-endpoints-how-exabeam-helps-baker-donelson-maintain-visibility-into-user-behavior/</loc>
		<lastmod>2023-12-08T00:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Keeping-Tabs-on-Fast-moving-Endpoints-How-Exabeam-Helps-Baker-Donelson-Maintain-Visibility-Into-User-Behavior-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/gaining-an-edge-on-attackers-with-the-mitre-attck-knowledge-base/</loc>
		<lastmod>2023-12-08T00:02:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Gaining-an-Edge-on-Attackers-with-the-MITRE-ATTCK-Knowledge-Base-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ransomware-tackling-the-new-wave-of-targeted-attacks/</loc>
		<lastmod>2023-12-08T00:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Tackling-the-New-Wave-of-Targeted-Attacks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/02/Screen-Shot-2020-02-06-at-2.31.41-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/leverage-mitre-attck-to-gain-iranian-cyberattack-insights/</loc>
		<lastmod>2023-12-08T00:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Leverage-MITRE-ATTCK-to-Gain-Iranian-Cyberattack-Insights-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/02/Iran-MITRE-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/02/Iran-MITRE-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/02/Iran-MITRE-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/using-ai-to-prevent-sensitive-data-loss-from-law-firms/</loc>
		<lastmod>2023-12-08T00:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Using-AI-to-Prevent-Sensitive-Data-Loss-from-Law-Firms-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/new-features-in-exabeam-content-library-now-available/</loc>
		<lastmod>2023-12-08T00:08:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Features-in-Exabeam-Content-Library-Now-Available-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/content-library.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/cl-vendor-scroll-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/cl-use-case-scroll.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/5-preemptive-measures-your-soc-can-take-to-protect-your-organization/</loc>
		<lastmod>2023-12-08T00:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Preemptive-Measures-Your-SOC-Can-Take-to-Protect-Your-Organization-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/12-cybersecurity-podcasts-for-your-playlist/</loc>
		<lastmod>2023-12-08T00:12:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-12-Cybersecurity-Podcasts-For-Your-Playlist-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-reduce-your-attack-surface-with-11-proven-tips/</loc>
		<lastmod>2023-12-08T00:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Reduce-Your-Attack-Surface-with-11-Proven-Tips-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-lakshmi-hanspals-six-pillars-of-responsibility/</loc>
		<lastmod>2023-12-08T00:18:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Lakshmi-Hanspals-Six-Pillars-of-Responsibility-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-build-logging-pipelines-that-outlast-your-security-vendor/</loc>
		<lastmod>2023-12-08T00:18:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Build-Logging-Pipelines-That-Outlast-Your-Security-Vendor-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/lifting-the-veil-on-cloud-security/</loc>
		<lastmod>2023-12-08T00:19:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Lifting-the-Veil-on-Cloud-Security-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-11-posts-on-incident-response-dlp-soc-siem-and-information-security-from-the-exabeam-blog/</loc>
		<lastmod>2023-12-08T00:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-11-Posts-on-Incident-Response-DLP-SOC-SIEM-and-Information-Security-from-the-Exabeam-Blog-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/mitre-attck-using-exabeam-for-threat-hunting-and-investigations/</loc>
		<lastmod>2023-12-08T00:22:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MITRE-ATTCK-Using-Exabeam-for-Threat-Hunting-and-Investigations-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/5-steps-to-ensure-your-cloud-migration-is-secure/</loc>
		<lastmod>2023-12-08T00:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Steps-to-Ensure-Your-Cloud-Migration-is-Secure-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-build-a-modern-soc/</loc>
		<lastmod>2023-12-08T00:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Build-a-Modern-SOC-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/beat-cyber-threats-with-security-automation/</loc>
		<lastmod>2023-12-08T00:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beat-Cyber-Threats-with-Security-Automation-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-to-automate-threat-hunting/</loc>
		<lastmod>2023-12-08T00:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Automate-Threat-Hunting-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/morris-worm-how-a-simple-experiment-led-to-the-first-computer-worm/</loc>
		<lastmod>2023-12-08T19:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Morris-Worm-How-a-Simple-Experiment-Led-to-the-First-Computer-Worm-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-10-threat-hunting-terms-for-the-security-practitioner/</loc>
		<lastmod>2023-12-08T19:20:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-10-Threat-Hunting-Terms-for-the-Security-Practitioner-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/keeping-up-with-insider-risk-management-in-an-ever-changing-landscape/</loc>
		<lastmod>2023-12-08T19:24:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Keeping-Up-with-Insider-Risk-Management-in-an-Ever-Changing-Landscape-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-a-threat-intelligence-platform-can-help-you/</loc>
		<lastmod>2023-12-08T19:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-a-Threat-Intelligence-Platform-Can-Help-You-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-story-behind-the-anonymous-mask/</loc>
		<lastmod>2023-12-08T19:26:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Story-Behind-the-Anonymous-Mask-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-david-tyburski-on-cybersecurity-education-vs-training-and-the-best-sushi-in-vegas/</loc>
		<lastmod>2023-12-08T19:27:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-David-Tyburski-on-Cybersecurity-Education-vs-Training-and-the-Best-Sushi-in-Vegas-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/09/The-New-CISO-David-Tyburski.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/5-top-benefits-of-ueba-and-machine-learning/</loc>
		<lastmod>2023-12-08T19:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Top-Benefits-of-UEBA-and-Machine-Learning-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/insider-threat-awareness-month-top-4-concerns/</loc>
		<lastmod>2023-12-08T19:29:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threat-Awareness-Month-Top-4-Concerns-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/gartner-peer-insights-voice-of-the-customer-security-information-and-event-management-rates-exabeam-as-a-top-rated-company/</loc>
		<lastmod>2023-12-08T19:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Gartner-Peer-Insights-Voice-of-the-Customer-Security-Information-and-Event-Management-Rates-Exabeam-as-a-Top-Rated-Company-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-case-for-automating-security-in-the-development-process/</loc>
		<lastmod>2023-12-08T21:13:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Case-for-Automating-Security-in-the-Development-Process-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-saas-cloud-solutions-available-globally/</loc>
		<lastmod>2023-12-08T21:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-SaaS-Cloud-Solutions-Available-Globally-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-rsa-and-the-diffie-hellman-key-exchange-became-the-most-popular-cryptosystems/</loc>
		<lastmod>2023-12-08T21:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/how-ueba-enhances-threat-detection-in-financial-institutions/</loc>
		<lastmod>2023-12-08T21:16:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-UEBA-Enhances-Threat-Detection-in-Financial-Institutions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/active-directory-a-new-product-for-a-new-millennium/</loc>
		<lastmod>2023-12-08T21:30:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Active-Directory-a-New-Product-for-a-New-Millennium-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/psst-weve-got-some-exciting-news-to-share/</loc>
		<lastmod>2023-12-09T00:15:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Psst-Weve-Got-Some-Exciting-News-to-Share-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/whats-in-a-good-story-context-plot-and-discovery/</loc>
		<lastmod>2023-12-09T00:18:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-In-a-Good-Story-Context-Plot-and-Discovery-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-1-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-2-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-3-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-5D-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-6E-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-7E-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-8E-Revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/07/Timeline-10E-Revised.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/protecting-data-in-university-and-higher-education-institutions/</loc>
		<lastmod>2023-12-09T00:18:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Protecting-Data-in-University-and-Higher-Education-Institutions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ntt-data-advances-global-enterprise-risk-detection-with-exabeam/</loc>
		<lastmod>2023-12-09T00:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NTT-DATA-Advances-Global-Enterprise-Risk-Detection-With-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/sircam-worm-virus-trojan-horse/</loc>
		<lastmod>2023-12-09T00:21:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Sircam-Worm-Virus-Trojan-Horse-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-an-airline-solves-unique-non-security-use-cases-with-exabeams-analytics/</loc>
		<lastmod>2023-12-09T00:21:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-an-Airline-Solves-Unique-Non-Security-Use-Cases-With-Exabeams-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/lessons-from-the-baltimore-and-cleveland-airport-ransomware-attacks/</loc>
		<lastmod>2023-12-09T00:28:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Lessons-from-the-Baltimore-and-Cleveland-Airport-Ransomware-Attacks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/05/Ransomware-scanning-process.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/05/Ransomware-encryption-process.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/05/Ransomware-detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/from-military-service-to-cybersecurity-veterans-share-their-experiences/</loc>
		<lastmod>2023-12-09T00:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-From-Military-Service-to-Cybersecurity-Veterans-Share-Their-Experiences-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/five-takeaways-from-google-next-on-how-to-secure-your-cloud-deployments/</loc>
		<lastmod>2023-12-09T00:34:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Five-Takeaways-from-Google-Next-on-how-to-Secure-Your-Cloud-Deployments-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/announcing-the-new-ciso-podcast/</loc>
		<lastmod>2023-12-09T00:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Announcing-The-New-CISO-Podcast-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cisos-on-the-board-and-5-actions-they-should-take/</loc>
		<lastmod>2023-12-09T00:40:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-CISOs-on-the-Board-and-5-Actions-They-Should-Take-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/new-exabeam-integrations-with-symantec-avaya-infowatch-onapsis-and-sentinelone/</loc>
		<lastmod>2023-12-09T00:41:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Exabeam-Integrations-with-Symantec-Avaya-InfoWatch-Onapsis-and-SentinelOne-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/is-now-the-right-time-for-enterprise-scale-siem-as-a-service/</loc>
		<lastmod>2023-12-09T00:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Is-Now-the-Right-Time-for-Enterprise-scale-SIEM-as-a-Service-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-new-breed-of-fileless-malware-and-how-it-can-be-stopped-with-behavioral-analytics-and-machine-learning/</loc>
		<lastmod>2023-12-09T00:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-Breed-of-Fileless-Malware-and-How-It-Can-Be-Stopped-with-Behavioral-Analytics-and-Machine-Learning-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/02/fileless-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/02/Fileless-malware2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/what-is-security-intelligence/</loc>
		<lastmod>2023-12-11T18:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-Security-Intelligence-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/alan-woodwards-top-10-cybersecurity-predictions-for-2019/</loc>
		<lastmod>2023-12-11T18:41:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOGAlan-Woodwards-Top-10-Cybersecurity-Predictions-for-2019-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-a-global-engineering-firm-protects-its-private-cloud/</loc>
		<lastmod>2023-12-11T19:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-a-Global-Engineering-Firm-Protects-its-Private-Cloud-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-a-global-apparel-company-prevents-source-code-theft-in-the-cloud/</loc>
		<lastmod>2023-12-11T19:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-a-Global-Apparel-Company-Prevents-Source-Code-Theft-in-the-Cloud-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/12/Figure2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-social-influencers-share-their-predictions-for-2019/</loc>
		<lastmod>2023-12-11T19:14:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Social-Influencers-Share-Their-Predictions-for-2019-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/12/Stuart-Peck.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/12/Tara-Black.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/12/Will-LaSalle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/12/Ray-REDACTED.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeams-2019-cybersecurity-predictions/</loc>
		<lastmod>2023-12-11T19:31:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeams-2019-Cybersecurity-Predictions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/preparing-for-the-log-data-tsunami-security-best-practices-for-the-exabeam-data-lake/</loc>
		<lastmod>2023-12-11T19:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preparing-for-the-Log-Data-Tsunami-Security-Best-Practices-for-the-Exabeam-Data-Lake-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Data-Lake-Field-Explorer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Data-Lake-Time-Picker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Data-Lake-Table-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Data-Lake-Compliance-Reports.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/how-ueba-overcomes-5-hurdles-to-achieving-effective-security-and-incident-response/</loc>
		<lastmod>2023-12-11T19:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-UEBA-Overcomes-5-Hurdles-to-Achieving-Effective-Security-and-Incident-Response-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-stop-cyberattacks-on-your-iot-infrastructure/</loc>
		<lastmod>2023-12-11T19:48:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Stop-Cyberattacks-on-Your-IoT-Infrastructure-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/09/IoT-attack1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/09/IoT-attack2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/09/IoT-attack3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/effective-strategies-for-detecting-and-stopping-malware-attacks/</loc>
		<lastmod>2023-12-11T19:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Effective-Strategies-for-Detecting-and-Stopping-Malware-Attacks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/09/Malware1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/09/Malware2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/preempt-a-cybersecurity-disaster-by-writing-a-mock-breach-notification-letter/</loc>
		<lastmod>2023-12-11T19:54:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preempt-a-Cybersecurity-Disaster-by-Writing-a-Mock-Breach-Notification-Letter-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/our-assessment-of-the-2017-gartner-magic-quadrant-for-security-information-and-event-management-siem/</loc>
		<lastmod>2023-12-11T19:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Assessment-of-the-2017-Gartner-Magic-Quadrant-for-Security-Information-and-Event-Management-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/preparing-a-cybersecurity-incident-response-plan-your-essential-checklist/</loc>
		<lastmod>2023-12-12T19:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preparing-a-Cybersecurity-Incident-Response-Plan-Your-Essential-Checklist-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/hidden-soc-killers-three-signs-your-soc-is-broken/</loc>
		<lastmod>2023-12-12T20:49:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Hidden-SOC-Killers-Three-Signs-Your-SOC-is-Broken-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/06/notepad_investigation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/on-the-job-cryptocurrency-mining-protecting-your-organization-from-energy-theft/</loc>
		<lastmod>2023-12-12T21:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-On-the-Job-Cryptocurrency-Mining-Protecting-your-organization-from-energy-theft-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/introducing-behavioral-analysis-for-devices-exabeam-entity-analytics/</loc>
		<lastmod>2023-12-12T21:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Behavioral-Analysis-for-Devices-Exabeam-Entity-Analytics-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/03/EA-watch-Lists3-1024x777.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/03/Entity-Timeline-1013x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/03/PIVOTING-FROM-USER-TO-ENTITY-1024x482.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-criminals-can-build-a-web-dossier-from-your-browser/</loc>
		<lastmod>2023-12-12T21:14:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Criminals-Can-Build-a-Web-Dossier-from-Your-Browser-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/03/image2018-2-5_15-3-34.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/is-this-chads-personal-e-mail-address-a-data-exfiltration-context/</loc>
		<lastmod>2023-12-12T21:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Is-this-Chads-Personal-E-mail-Address-A-Data-Exfiltration-Context-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/dfir-101-triage-collection/</loc>
		<lastmod>2023-12-12T21:17:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-DFIR-101-Triage-Collection-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/02/triage_data_categories.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/02/1-volatile5b15d.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/02/2-pecmd5b15d.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/02/3-autoruns5b15d.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/02/4-regedit5b15d.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-future-of-cybersecurity-industry-predictions/</loc>
		<lastmod>2023-12-12T21:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Future-of-Cybersecurity-and-Industry-Predictions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/announcing-exabeam-advanced-analytics-version-3-3/</loc>
		<lastmod>2023-12-12T21:20:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Announcing-Exabeam-Advanced-Analytics-Version-33-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-wins-red-herring-global-100-and-computing-security-excellence-awards/</loc>
		<lastmod>2023-12-12T21:20:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Wins-Red-Herring-Global-100-and-Computing-Security-Excellence-Awards-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-highlighted-in-the-expanding-cisco-security-technology-ecosystem/</loc>
		<lastmod>2023-12-12T21:21:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Highlighted-in-the-Expanding-Cisco-Security-Technology-Ecosystem-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/what-is-uba-ueba-siem-security-management-terms-defined/</loc>
		<lastmod>2023-12-12T21:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-UBA-UEBA-and-SIEM-Security-Management-Terms-Defined-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/VPN-data-points.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/Behavioral-Modeling.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/UEBA-Risk-Scores.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/Maximum-Overdrive.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/SIM-and-SEM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2017/07/Haystack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/too-many-alerts-just-give-me-the-interesting-ones/</loc>
		<lastmod>2023-12-12T21:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Too-Many-Alerts-Just-Give-Me-the-Interesting-Ones-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Too-Many-Alerts-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ransomworm-dont-cry-act/</loc>
		<lastmod>2023-12-12T21:29:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomworm-Dont-Cry-Act-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomworm-Dont-Cry-Act-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/5-aspects-to-consider-when-evaluating-siem-solutions/</loc>
		<lastmod>2023-12-12T21:30:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Aspects-to-Consider-When-Evaluating-SIEM-Solutions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/flipping-the-siem-value-equation/</loc>
		<lastmod>2023-12-12T21:32:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Flipping-the-SIEM-Value-Equation-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/on-true-positives-and-security-incidents/</loc>
		<lastmod>2023-12-12T21:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-On-True-Positives-and-Security-Incidents-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/first-time-access-to-an-asset-is-it-risky-or-not-a-machine-learning-question/</loc>
		<lastmod>2023-12-12T21:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-First-time-Access-to-an-Asset-Is-it-Risky-or-Not-A-Machine-Learning-Question-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-First-time-Access-to-an-Asset-Is-it-Risky-or-Not-A-Machine-Learning-Question-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-First-time-Access-to-an-Asset-Is-it-Risky-or-Not-A-Machine-Learning-Question-inpage-02a.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-First-time-Access-to-an-Asset-Is-it-Risky-or-Not-A-Machine-Learning-Question-inpage-02b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-First-time-Access-to-an-Asset-Is-it-Risky-or-Not-A-Machine-Learning-Question-inpage-02c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/check-out-exabeam-incident-responder/</loc>
		<lastmod>2023-12-12T21:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Check-Out-Exabeam-Incident-Responder-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-user-and-entity-behavior-analytics-scoring-system-explained/</loc>
		<lastmod>2023-12-12T21:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-Scoring-System-Explained-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-Scoring-System-Explained-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-Scoring-System-Explained-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/finding-a-security-unicorn/</loc>
		<lastmod>2023-12-13T00:46:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Finding-a-Security-Unicorn-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/who-do-i-belong-to-dynamic-peer-analysis-for-ueba-explained/</loc>
		<lastmod>2023-12-13T00:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Who-do-I-belong-to-Dynamic-Peer-Analysis-for-UEBA-Explained-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Who-do-I-belong-to-Dynamic-Peer-Analysis-for-UEBA-Explained-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/no-siem-no-problem/</loc>
		<lastmod>2023-12-13T00:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-No-SIEM-No-Problem-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-cleans-up-at-network-product-guides-2016-it-world-awards/</loc>
		<lastmod>2023-12-13T00:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Cleans-Up-At-Network-Product-Guides-2016-IT-World-Awards-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-challenge-of-using-a-siem-to-detect-ransomware/</loc>
		<lastmod>2023-12-13T00:49:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Challenge-of-Using-a-SIEM-to-Detect-Ransomware-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Challenge-of-Using-a-SIEM-to-Detect-Ransomware-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/beyond-detection-and-response-hidden-benefits-of-exabeam/</loc>
		<lastmod>2023-12-13T00:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-Detection-and-Response-Hidden-Benefits-of-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/a-forensics-experts-opinion-why-exabeam-matters/</loc>
		<lastmod>2023-12-13T00:51:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Forensics-Experts-Opinion-Why-Exabeam-Matters-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/its-not-always-the-hackers/</loc>
		<lastmod>2023-12-13T00:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Its-Not-Always-the-Hackers-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ransomware-why-steal-when-you-can-disrupt/</loc>
		<lastmod>2023-12-13T00:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Why-Steal-When-You-Can-Disrupt-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-user-and-entity-behavior-analytics-system-explained-part-2/</loc>
		<lastmod>2023-12-13T00:56:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-System-Explained-Part-II-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-user-and-entity-behavior-analytics-system-explained-part-1/</loc>
		<lastmod>2023-12-13T00:57:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-System-Explained-Part-I-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/data-science-and-security-research-two-parts-of-the-whole/</loc>
		<lastmod>2023-12-13T01:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Project-Data-Science-and-Security-Research-Two-Parts-of-the-Whole-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/project-alignment-hiring-shortfall-as-top-big-data-challenges/</loc>
		<lastmod>2023-12-13T01:02:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Project-Alignment-Hiring-Shortfall-As-Top-Big-Data-Challenges-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/my-top-security-data-science-predictions-for-2016/</loc>
		<lastmod>2023-12-13T01:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-My-Top-Security-Data-Science-Predictions-for-2016-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/circumstantial-your-honor/</loc>
		<lastmod>2023-12-13T01:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Circumstantial-Your-Honor-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-wrong-and-right-way-to-engage-data-science-in-security-analytics/</loc>
		<lastmod>2023-12-13T01:05:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Wrong-and-Right-Way-to-Engage-Data-Science-in-Security-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/thorough-analysis-for-using-data-science-to-detect-malicious-domains/</loc>
		<lastmod>2023-12-13T01:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Thorough-Analysis-For-Using-Data-Science-To-Detect-Malicious-Domains-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/exabeam-user-and-entity-behavior-analytics-solution-certified-with-hp-arcsight/</loc>
		<lastmod>2023-12-13T01:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-User-and-Entity-Behavior-Analytics-Solution-Certified-with-HP-ArcSight-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/data-science-and-stateful-user-tracking-the-two-key-uba-enablers/</loc>
		<lastmod>2023-12-13T01:10:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Science-And-Stateful-User-Tracking-The-Two-Key-UBA-Enablers-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/ted-plumis-why-i-joined-exabeam-a-user-behavior-analytics-company/</loc>
		<lastmod>2023-12-13T01:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ted-Plumis-Why-I-Joined-Exabeam-a-User-Behavior-Analytics-Company-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/security-issues-agencies-are-from-venus-legislators-are-from-mars/</loc>
		<lastmod>2023-12-13T01:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Issues-Agencies-Are-From-Venus-Legislators-Are-From-Mars-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/whats-wrong-with-todays-security-technologies-and-processes/</loc>
		<lastmod>2023-12-13T01:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-Wrong-With-Todays-Security-Technologies-and-Processes-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/data-science-engineering-and-security-3-legs-of-user-behavior-analytics/</loc>
		<lastmod>2023-12-13T01:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Science-Engineering-and-Security-3-Legs-of-User-Behavior-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-cybersecurity-personnel-shortage-identity-theft-fraud-at-the-irs/</loc>
		<lastmod>2023-12-13T01:21:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Cybersecurity-Personnel-Shortage-Identity-Theft-and-Fraud-at-the-IRS-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Cybersecurity-Personnel-Shortage-Identity-Theft-and-Fraud-at-the-IRS-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/security-breaches-and-the-crown-jewels-of-creativity-and-research/</loc>
		<lastmod>2023-12-13T01:22:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Breaches-and-the-Crown-Jewels-of-Creativity-and-Research-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/dyer-malware-updated-to-defeat-malware-sandboxing-solutions/</loc>
		<lastmod>2023-12-13T01:23:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Dyer-Malware-Updated-to-Defeat-Malware-Sandboxing-Solutions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/passing-the-hash-like-its-1999/</loc>
		<lastmod>2023-12-13T01:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Passing-the-Hash-Like-Its-1999-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/with-the-rsa-2015-security-conference-behind-us-what-do-i-do-now/</loc>
		<lastmod>2023-12-13T01:25:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-With-the-RSA-2015-Security-Conference-Behind-Us-What-do-I-do-Now-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/meritalks-cybersecurity-survey-too-much-data-and-no-complete-story/</loc>
		<lastmod>2023-12-13T01:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Meritalks-Cybersecurity-Survey-Too-Much-Data-and-No-Complete-Story-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/my-rsa-expectations-blinding-spotlights/</loc>
		<lastmod>2023-12-13T01:28:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-My-RSA-Expectations-Blinding-Spotlights-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/attack-of-the-cyber-vampires-phishing-at-the-white-house/</loc>
		<lastmod>2023-12-13T01:32:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Attack-of-the-Cyber-Vampires%E2%80%93phishing-at-the-White-House-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/user-behavior-analytics-automated-storytelling-for-incident-response/</loc>
		<lastmod>2023-12-13T01:33:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Analytics-Automated-Storytelling-for-Incident-Response-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/cyber-insurance-user-behavior-intelligence-and-lower-costs/</loc>
		<lastmod>2023-12-13T01:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyber-Insurance-User-Behavior-Intelligence-and-Lower-Costs-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-lessons-can-be-learned-from-credit-fraud-paradigm/</loc>
		<lastmod>2023-12-13T01:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Lessons-can-be-Learned-from-Credit-Fraud-Paradigm-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-five-stages-of-user-behavior-intelligence-acceptance/</loc>
		<lastmod>2023-12-13T01:38:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Five-Stages-of-User-Behavior-Intelligence-Acceptance-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/continuous-diagnostics-and-mitigation-cdm-what-civilian-agencies-need-to-know/</loc>
		<lastmod>2023-12-13T01:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuous-Diagnostics-and-Mitigation-CDM-What-Civilia-Agencies-Need-to-Know-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/head-in-the-sands-one-year-after-the-sands-casino-data-breach/</loc>
		<lastmod>2023-12-13T01:41:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Head-in-the-Sands-One-Year-After-the-Sands-Casino-Data-Breach-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/why-your-siem-doesnt-work/</loc>
		<lastmod>2023-12-13T01:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-Your-SIEM-Doesnt-Work-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/exabeam-get-user-behavior-intelligence-in-2015/</loc>
		<lastmod>2023-12-13T01:42:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Get-User-Behavior-Intelligence-in-2015-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/user-behavior-intelligence-drives-new-security-processes/</loc>
		<lastmod>2023-12-13T01:42:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Intelligence-Drives-New-Security-Processes-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/anthems-80-million-record-data-breach-interesting-insights/</loc>
		<lastmod>2023-12-13T01:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anthems-80-million-record-data-breach-interesting-insights-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/the-end-of-siem-as-we-know-it-or-why-i-joined-exabeam/</loc>
		<lastmod>2023-12-13T01:46:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-End-of-SIEM-as-We-Know-It-or-Why-I-joined-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/welcome-to-exabeam/</loc>
		<lastmod>2023-12-13T01:47:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Welcome-to-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/new-cloud-coverage-switzerland-exabeam-support-for-swiss-and-european-businesses-grows/</loc>
		<lastmod>2024-02-20T18:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Cloud-Coverage-Switzerland-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-february-2024/</loc>
		<lastmod>2024-03-05T02:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2024-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2024-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2024-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-February-2024-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-march-2024/</loc>
		<lastmod>2024-04-10T17:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-March-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-april-2024/</loc>
		<lastmod>2024-05-27T03:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-April-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-April-2024-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-April-2024-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/exabeam-channel-program-and-leaders-recognized-by-crn/</loc>
		<lastmod>2024-06-12T17:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PRESS-Exabeam-Channel-Program-and-Leaders-Recognized-by-CRN-socialshare-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/integrating-exabeam-with-google-cloud-ids/</loc>
		<lastmod>2024-06-20T13:19:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Integrating-Exabeam-with-Google-Cloud-IDS-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/twas-the-night-before-the-pen-test/</loc>
		<lastmod>2024-06-21T11:05:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Twas-the-Night-Before-the-Pen-Test-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-leads-the-future-of-siem-over-qradar-and-xsiam/</loc>
		<lastmod>2024-06-27T17:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Leads-the-Future-of-SIEM-Over-QRadar-and-XSIAM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-june-2024/</loc>
		<lastmod>2024-07-01T17:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-June-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-June-2024-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-June-2024-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/COMMUNITY-Stay-up-to-date-with-Exabeam-Community-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/pushing-the-boundaries-of-ai-driven-security-operations/</loc>
		<lastmod>2024-07-17T10:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Pushing-the-Boundaries-of-AI-Driven-Security-Operations-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/the-new-exabeam-brand-evolution-for-our-next-phase-of-innovation-and-growth/</loc>
		<lastmod>2024-07-17T10:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-Exabeam-Brand-Evolution-for-our-Next-Phase-of-Innovation-and-Growth-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-Exabeam-Brand-Evolution-for-our-Next-Phase-of-Innovation-and-Growth-inpage-01.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/a-new-era-for-vigilant-cisos/</loc>
		<lastmod>2024-07-17T10:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-New-Era-for-Vigilant-CISOs-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-july-2024/</loc>
		<lastmod>2024-08-01T17:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-July-2024-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-July-2024-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/COMMUNITY-Stay-up-to-date-with-Exabeam-Community-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/dream-jobs-and-diamonds-communicating-success-with-maria-sexton/</loc>
		<lastmod>2024-08-15T01:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Dream-Jobs-and-Diamonds-Communicating-Success-with-Maria-Sexton-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-99-Know-Your-Strengths-How-to-Lead-with-Skills-You-Already-Have-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/exabeam-opens-new-office-in-plano-tx-expands-customer-service-and-support-in-north-america/</loc>
		<lastmod>2024-08-15T01:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Opens-New-Office-in-Plano-TX-Expands-Customer-Service-and-Support-in-North-America-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Opens-New-Office-in-Plano-TX-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Opens-New-Office-in-Plano-TX-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Opens-New-Office-in-Plano-TX-inpage-03-1024x559.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/security-operations-center-roles-and-responsibilities/</loc>
		<lastmod>2024-08-16T00:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Operations-Center-Roles-and-Responsibilities-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SOC-Team-Roles-and-Responsibilities-Explained-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/advanced-encryption-standard-keeping-classified-information-safe/</loc>
		<lastmod>2024-08-17T00:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Advanced-Encryption-Standard-Keeping-Classified-Information-Safe-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/def-con-from-failed-party-and-movie-inspiration-to-global-dominance/</loc>
		<lastmod>2024-08-17T00:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-DEF-CON-From-Failed-Party-and-Movie-Inspiration-to-Global-Dominance-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-mag-stripes-revolutionized-the-payment-industry/</loc>
		<lastmod>2024-08-17T00:49:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Mag-Stripes-Revolutionized-the-Payment-Industry-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-weekly-news-roundup-may-23-2022/</loc>
		<lastmod>2024-08-17T00:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Weekly-News-Roundup-May-23-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-cyberversity-a-resource-for-cybersecurity-professionals/</loc>
		<lastmod>2024-08-17T00:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Cyberversity-A-Resource-for-Cybersecurity-Professionals-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/holidays-and-insider-threats-exabeam-answers-questions-from-the-field/</loc>
		<lastmod>2024-08-17T01:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Holidays-and-Insider-Threats-Exabeam-Answers-Questions-From-the-Field-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-How-to-build-an-Insider-Threat-program-with-Exabeam-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/siem-license-management-staying-in-control-of-ingestion-costs/</loc>
		<lastmod>2024-08-17T02:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-License-Management-Staying-in-Control-of-Ingestion-Costs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-License-Management-featured-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-License-Management-featured-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-License-Management-featured-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-translating-your-military-skills-for-security-success/</loc>
		<lastmod>2024-08-23T19:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Translating-Your-Military-Skills-for-Security-Success-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Episonde-76-Translating-Your-Military-Skills-for-Security-Success-with-Jason-Hamilton-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-broad-knowledge-is-power-building-a-better-security-team/</loc>
		<lastmod>2024-08-23T19:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Broad-Knowledge-is-Power-Building-a-Better-Security-Team-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Episode-75-Broad-Knowledge-is-Power-Building-a-Better-Security-Team-with-Bryan-Willett-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-success-after-ciso-how-to-become-your-own-boss/</loc>
		<lastmod>2024-08-23T19:12:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Success-After-CISO-How-to-Become-Your-Own-Boss-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-74-Success-After-CISO-How-to-Become-Your-Own-Boss-with-guest-Aaron-Bailey-from-The-Missing-Link-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-new-ciso-podcast-train-the-way-you-fight-fight-the-way-you-train/</loc>
		<lastmod>2024-08-23T19:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Train-the-Way-You-Fight-Fight-the-Way-You-Train-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Train-the-Way-You-Fight-Fight-the-Way-You-Train-with-Dr-Adrian-Mayers-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-landing-a-seat-in-the-c-suite/</loc>
		<lastmod>2024-08-23T19:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Landing-a-Seat-in-the-C-Suite-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Episode-72-Landing-a-Seat-in-the-C-Suite-with-Mike-Woodson-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-trusting-your-tech-to-tackle-human-problems/</loc>
		<lastmod>2024-08-23T19:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Trusting-Your-Tech-to-Tackle-Human-Problems-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-70-Trusting-Your-Tech-to-Tackle-Human-Problems-with-Dr-Adrian-Mayers-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-new-ciso-podcast-solving-security-puzzles/</loc>
		<lastmod>2024-08-23T19:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Solving-Security-Puzzles-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Episode-69-Solving-Security-Puzzles-with-Kevin-DeLange-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/fantastic-attack-types-and-how-to-find-them/</loc>
		<lastmod>2024-08-23T19:14:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Fantastic-Attack-Types-and-How-to-Find-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Fantastic-Attack-Types-and-How-to-Find-Them-featured-03-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-insider-threat-dilemma-why-it-matters-more-than-you-think/</loc>
		<lastmod>2024-08-23T19:18:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Insider-Threat-Dilemma-Why-It-Matters-More-Than-You-Think-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-CISOs-Guide-to-Rethinking-Insider-Threats-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/overview-of-exabeam-siem-and-security-analytics-product-innovations/</loc>
		<lastmod>2024-08-29T17:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Overview-of-Exabeam-SIEM-and-Security-Analytics-Product-Innovations-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-self-study-to-become-a-software-engineer-part-2/</loc>
		<lastmod>2024-08-29T17:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Self-study-to-Become-a-Software-Engineer-Part-2-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2020/04/Coding-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-significance-and-role-of-firewall-logs/</loc>
		<lastmod>2024-08-29T17:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Significance-and-Role-of-Firewall-Logs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Significance-and-Role-of-Firewall-Logs-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Significance-and-Role-of-Firewall-Logs-inpage-02-885x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Significance-and-Role-of-Firewall-Logs-inpage-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/outcomes-above-all-helping-security-teams-outsmart-the-odds/</loc>
		<lastmod>2024-08-29T17:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Outcomes-Above-All-Helping-Security-Teams-Outsmart-the-Odds-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-cisos-guide-to-communicating-risk/</loc>
		<lastmod>2024-08-29T20:50:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-CISOs-Guide-to-Communicating-Risk-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-3-questions-from-the-cisos-guide-to-communicating-risk-webinar/</loc>
		<lastmod>2024-08-29T20:52:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-3-Questions-from-the-CISOs-Guide-to-Communicating-Risk-Webinar-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-massive-data-breach-reducing-dwell-time-and-the-resulting-damage/</loc>
		<lastmod>2024-09-10T13:31:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Massive-Data-Breach-Reducing-Dwell-Time-and-the-Resulting-Damage-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-union-bank-gets-the-most-from-its-data-loss-prevention-solution/</loc>
		<lastmod>2024-09-10T13:31:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Union-Bank-Gets-the-Most-from-Its-Data-Loss-Prevention-Solution-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/5-things-to-know-about-exabeam-data-lake/</loc>
		<lastmod>2024-09-10T14:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Things-to-Know-About-Exabeam-Data-Lake-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/01/Exabeam_-_Data_Lake_Reports-1024x540.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/01/Data-Lake_Enhanced-Log-View-1024x324.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/01/Exabeam_-_Data_Lake_visualization-1024x640.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/new-logging-standard-for-federal-cyber-detection-and-response/</loc>
		<lastmod>2024-09-10T14:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Logging-Standard-for-Federal-Cyber-Detection-and-Response-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/nca-otcc-12022-logrhythm-siem/</loc>
		<lastmod>2024-09-10T14:38:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Comply-with-National-Cybersecurity-Authority-OTCC-1-2022-Using-LogRhythm-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/data-loss-prevention-solutions-making-your-choice/</loc>
		<lastmod>2024-09-10T14:39:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Loss-Prevention-Solutions-Making-Your-Choice-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-adds-new-global-log-retention-capabilities-to-new-scale-siem/</loc>
		<lastmod>2024-09-10T14:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-New-Global-Log-Retention-Capabilities-to-New-Scale-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/complying-with-nydfs-cybersecurity-regulations-with-exabeam/</loc>
		<lastmod>2024-09-10T14:39:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Complying-with-NYDFS-Cybersecurity-Regulations-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/gdpr-and-the-security-monitoring-challenge/</loc>
		<lastmod>2024-09-10T14:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-GDPR-and-the-Security-Monitoring-Challenge-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-successfully-completes-soc-2-type-ii-audit-examination/</loc>
		<lastmod>2024-09-10T14:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Successfully-Completes-SOC-2-Type-II-Audit-Examination-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-achieves-federal-common-criteria-certification/</loc>
		<lastmod>2024-09-10T14:40:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Achieves-Federal-Common-Criteria-Certification-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/tackling-cybersecurity-challenges-in-healthcare/</loc>
		<lastmod>2024-09-10T14:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Tackling-Cybersecurity-Challenges-in-Healthcare-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-successfully-completes-the-annual-system-and-organization-controls-soc-2-type-ii-audit/</loc>
		<lastmod>2024-09-10T14:42:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Successfully-Completes-the-Annual-System-and-Organization-Controls-SOC-2-Type-II-Audit-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/prudential-standard-cps-234-how-exabeam-aligns-with-the-australian-financial-standard/</loc>
		<lastmod>2024-09-10T14:42:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Prudential-Standard-CPS-234-How-Exabeam-Aligns-With-the-Australian-Financial-Standard-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/safeguarding-banks-with-security-updates-patching-and-pen-testing/</loc>
		<lastmod>2024-09-10T14:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Safeguarding-Banks-With-Security-Updates-Patching-and-Pen-Testing-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/virtual-cisos-balancing-security-compliance-and-collaboration/</loc>
		<lastmod>2024-09-10T14:42:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Virtual-CISOs-Balancing-Security-Compliance-and-Collaboration-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Self-Sufficient-Security-The-Perks-of-Being-a-vCISO-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/british-library-exabeam-insights-into-lessons-learned/</loc>
		<lastmod>2024-09-27T19:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG_British-Library-Exabeam-Insights-into-Lessons-Learned-socialshare-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/powershell-and-command-line-logging-with-logrhythm/</loc>
		<lastmod>2024-09-30T20:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-PowerShell-and-Command-Line-Logging-inpage-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/enable-process-creation-events-to-track-malware/</loc>
		<lastmod>2024-09-30T20:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Enable-Process-Creation-Events-to-Track-Malware-and-Threat-Activity-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/see-the-threats-that-matter-with-ai-driven-logrhythm-intelligence/</loc>
		<lastmod>2024-10-01T12:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-See-the-Threats-that-Matter-with-AI-Driven-LogRhythm-Intelligence-socialshare-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-exabeam-product-development-q3-2024/</loc>
		<lastmod>2024-10-01T19:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-Q3-2024-socialshare-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-Q3-2024-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-Q3-2024-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-Q3-2024-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/COMMUNITY-Stay-up-to-date-with-Exabeam-Community-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/education-cybersecurity-compliance-malaysia/</loc>
		<lastmod>2024-10-01T20:04:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Your-Guide-to-Education-Cybersecurity-Compliance-in-Malaysia-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-prove-security-effectiveness-with-a-cybersecurity-board-report/</loc>
		<lastmod>2024-10-01T22:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Prove-Security-Effectiveness-with-a-Cybersecurity-Board-Report-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/8-critical-considerations-for-defending-against-insider-threats/</loc>
		<lastmod>2024-10-08T16:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-Critical-Considerations-For-Defending-Against-Insider-Threats-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Insider-Threats-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-august-2023/</loc>
		<lastmod>2024-10-08T16:53:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-August-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/augmenting-microsoft-sentinel-siem-the-power-of-exabeam-for-ueba-and-tdir/</loc>
		<lastmod>2024-10-08T16:55:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Augmenting-Microsoft-Sentinel-SIEM-socialshare-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Augmenting-Microsoft-Sentinel-SIEM-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Five-Benefits-of-Augmenting-Microsoft-Sentinel-with-Exabeam-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-ai-driven-exabeam-security-operations-platform-revolutionizing-threat-detection-investigation-and-response/</loc>
		<lastmod>2024-10-08T16:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-AI-Driven-Exabeam-Security-Operations-Platform-Revolutionizing-Threat-Detection-Investigation-and-Response-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-AI-Driven-Exabeam-Security-Operations-Platform-inpage-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-may-2024/</loc>
		<lastmod>2024-10-08T18:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2024-socialshare-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2024-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2024-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2024-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-May-2024-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/COMMUNITY-Stay-up-to-date-with-Exabeam-Community-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/why-it-is-taking-the-state-department-so-long-to-root-out-hackers/</loc>
		<lastmod>2024-10-08T20:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-it-is-Taking-the-State-Department-So-Long-to-Root-Out-Hackers-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/security-event-management-basics-what-weve-seen-companies-are-not-doing/</loc>
		<lastmod>2024-10-08T20:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Event-Management-Basics-What-Weve-Seen-Companies-Are-Not-Doing-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/demystifying-the-soc-part-4-the-old-soc-maturity-model-based-on-speeds-and-feeds/</loc>
		<lastmod>2024-10-08T20:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Demystifying-the-SOC-Part-4-The-Old-SOC-Maturity-Model-based-on-Speeds-and-Feeds-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/new-ciso-5-things-to-achieve-in-your-first-90-days/</loc>
		<lastmod>2024-10-08T20:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-CISO-5-Things-to-Achieve-In-Your-First-90-Days-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Things-to-Achieve-In-Your-First-90-Days-inpage-01-1024x633.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Things-to-Achieve-In-Your-First-90-Days-inpage-02-1024x462.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/shields-up-what-you-can-do-following-new-reports-of-destructive-malware-in-ukraine-latvia-and-lithuania/</loc>
		<lastmod>2024-10-08T20:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-of-Destructive-Malware-in-Ukraine-Latvia-and-Lithuania-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-09-734x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-04-824x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-05-995x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shields-Up-What-You-Can-Do-Following-New-Reports-inpage-01-649x1024.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-achieves-iso-27001-certification/</loc>
		<lastmod>2024-10-08T20:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Achieves-ISO-27001-Certification-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/new-scale-siem-where-big-data-meets-cybersecurity/</loc>
		<lastmod>2024-10-08T21:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Where-Big-Data-Meets-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/panacea-or-money-pit-six-design-considerations-for-your-security-data-lake/</loc>
		<lastmod>2024-10-08T21:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Panacea-or-Money-Pit-Six-Design-Considerations-for-Your-Security-Data-Lake-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-strategic-value-of-the-modular-app-centric-exabeam-security-operations-platform/</loc>
		<lastmod>2024-10-08T21:02:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Strategic-Value-of-the-Modular-App-centric-Exabeam-Security-Operations-Platform-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/new-scale-siem-brings-powerful-behavioral-analytics-and-automated-investigation-to-threat-detection-investigation-and-response/</loc>
		<lastmod>2024-10-08T21:03:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-and-Automated-Investigation-to-Threat-Detection-Investigation-and-Response-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Brings-Powerful-Behavioral-Analytics-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-december-2022/</loc>
		<lastmod>2024-10-08T21:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-December-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/whats-new-in-exabeam-product-development-march-2023/</loc>
		<lastmod>2024-10-08T21:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-March-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/protecting-your-organization-against-insider-threats-best-practices-and-real-world-examples/</loc>
		<lastmod>2024-10-08T21:04:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Protecting-Your-Organization-Against-Insider-Threats-Best-Practices-and-Real-world-Examples-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Overcoming-the-Limitations-of-Addressing-Insider-Threat-Real-Solutions-for-Real-Security-Challenges-with-Exabeam-featured-03-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/real-world-examples-of-insider-threats-and-detection-points-for-identifying-them/</loc>
		<lastmod>2024-10-08T21:04:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Real-world-Examples-of-Insider-Threats-and-Detection-Points-for-Identifying-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Insider-Threats-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/enhancing-the-exabeam-customer-experience-top-five-updates-for-fall-2023/</loc>
		<lastmod>2024-10-08T21:04:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-Exabeam-Customer-Experience-Top-Five-Updates-for-Fall-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeams-Cloud-based-Security-Operations-Platform-Improves-Insights-and-Efficiency-for-BBS-index-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Fantastic-Attack-Types-and-How-to-Find-Them-index-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Five-Steps-to-Effectively-Identify-Insider-Threats-index-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-vs-Splunk-Six-Ways-to-Compare-and-Evaluate-index-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-User-and-Entity-Behavior-Analytics-Solution-Certified-with-HP-ArcSight-index-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-siem-bridging-the-gaps-for-advanced-soc-functionality/</loc>
		<lastmod>2024-10-08T21:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-SIEM-Bridging-the-Gaps-for-Advanced-SOC-Functionality-index-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-SIEM-Bridging-the-Gaps-for-Advanced-SOC-Functionality-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-SIEM-Bridging-the-Gaps-for-Advanced-SOC-Functionality-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-SIEM-Bridging-the-Gaps-for-Advanced-SOC-Functionality-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Not-all-SIEMs-are-Created-Equal-featured-02-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-november-2023/</loc>
		<lastmod>2024-10-08T21:05:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-Release-2023-inpage-01-1024x476.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-Release-2023-inpage-02a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-Release-2023-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/whats-new-in-exabeam-product-development-january-2024/</loc>
		<lastmod>2024-10-08T21:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-January-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-January-2024-inpage-01-1024x532.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-January-2024-inpage-02-1024x537.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-January-2024-inpage-03-859x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/meet-omb-21-31-memorandum-requirements-with-logrhythm-siem/</loc>
		<lastmod>2024-10-16T20:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Implementing-the-OMB-21-31-Memorandum-socialshare-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/expand-log-source-collection-and-flexibility-with-logrhythm-siem-7-17/</loc>
		<lastmod>2024-10-16T20:55:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Log-Source-Collection-and-Flexibility-with-LogRhythm-7-17-inpage-05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/benefits-of-json-log-source-collection-for-logrhythm-siem-users/</loc>
		<lastmod>2024-10-16T20:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Benefits-of-JSON-Log-Source-Collection-for-LogRhythm-Customers-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Benefits-of-JSON-Log-Source-Collection-for-LogRhythm-Customers-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Benefits-of-JSON-Log-Source-Collection-for-LogRhythm-Customers-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Benefits-of-JSON-Log-Source-Collection-for-LogRhythm-Customers-inpage-03.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/detect-ransomware-mitre-attck-module-logrhythm/</loc>
		<lastmod>2024-10-16T20:55:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-Ransomware-Detection-Techniques-inpage-08.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/cut-dashboard-noise-and-easily-retire-log-sources-with-logrhythm-siem-7-16/</loc>
		<lastmod>2024-10-16T20:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Dashboard-Noise-and-Easily-Retire-Log-Sources-with-LogRhythm-7-16-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Dashboard-Noise-and-Easily-Retire-Log-Sources-with-LogRhythm-7-16-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Dashboard-Noise-and-Easily-Retire-Log-Sources-with-LogRhythm-7-16-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Dashboard-Noise-and-Easily-Retire-Log-Sources-with-LogRhythm-7-16-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Dashboard-Noise-and-Easily-Retire-Log-Sources-with-LogRhythm-7-16-inpage-04.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/cut-log-source-onboarding-time-by-50-with-logrhythm-siem/</loc>
		<lastmod>2024-10-16T20:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Log-Source-Onboarding-Time-by-50-with-LogRhythm-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Log-Source-Onboarding-Time-by-50-with-LogRhythm-SIEM-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Log-Source-Onboarding-Time-by-50-with-LogRhythm-SIEM-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Log-Source-Onboarding-Time-by-50-with-LogRhythm-SIEM-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cut-Log-Source-Onboarding-Time-by-50-with-LogRhythm-SIEM-inpage-04.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/making-your-job-easier-with-logrhythm-siem-7-14/</loc>
		<lastmod>2024-10-16T20:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Making-Your-Job-Easier-with-LogRhythm-7-14-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Making-Your-Job-Easier-with-LogRhythm-7-14-inpage-01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Making-Your-Job-Easier-with-LogRhythm-7-14-inpage-03.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/how-to-conduct-an-information-security-risk-assessment/</loc>
		<lastmod>2024-10-16T20:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Conducting-an-Information-Security-Risk-Assessment-Successfully-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/total-economic-impact-study-reveals-258-roi-for-logrhythm-siem/</loc>
		<lastmod>2024-10-16T20:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Total-Economic-Impact-Study-Reveals-258-ROI-for-LogRhythm-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/improve-log-source-administration-management-with-logrhythm-siem-7-13/</loc>
		<lastmod>2024-10-16T20:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-04.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-05.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-06.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-07.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improve-Log-Source-Administration-Management-with-LogRhythm-7-13-inpage-08.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/enhancing-log-collection-with-logrhythm-siems-oc-admin/</loc>
		<lastmod>2024-10-16T20:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-06.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BOG-Enhancing-Log-Collection-with-LogRhythm-OC-dmin-inpage-07.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/logrhythm-siem-7-15-leverage-new-beats-and-platform-improvements/</loc>
		<lastmod>2024-10-16T20:56:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-SIEM-7-15-Leverage-New-Beats-and-Platform-Improvements-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-SIEM-7-15-Leverage-New-Beats-and-Platform-Improvements-inpage-01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-SIEM-7-15-Leverage-New-Beats-and-Platform-Improvements-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-SIEM-7-15-Leverage-New-Beats-and-Platform-Improvements-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-SIEM-7-15-Leverage-New-Beats-and-Platform-Improvements-inpage-04.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-to-detect-and-respond-to-ss7-attacks-with-logrhythm-siem/</loc>
		<lastmod>2024-10-16T20:56:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Comply-with-National-Cybersecurity-Authority-OTCC-1-2022-Using-LogRhythm-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Detect-and-Respond-to-SS7-Attacks-OT-Telco-Use-Cases-inpage-07.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/logging-best-practices-that-can-improve-your-cybersecurity-game/</loc>
		<lastmod>2024-10-17T01:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Logging-Best-Practices-That-Can-Improve-Your-Cybersecurity-Game-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EXPLAINER-A-SIEM-Security-Primer-Evolution-and-Next-Gen-Capabilities-inpage-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ai-an-innovation-or-exfiltration-tool/</loc>
		<lastmod>2024-10-17T01:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AI-An-Innovation-or-Exfiltration-Tool-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TDIR-2023-tdir-global-report-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/threat-intelligence-feeds-keeping-ahead-of-the-attacker/</loc>
		<lastmod>2024-10-18T17:49:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Threat-Intelligence-Feeds-Keeping-Ahead-of-the-Attacker-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-rising-threat-of-compromised-credentials-in-state-and-local-governments-the-case-for-ueba/</loc>
		<lastmod>2024-10-23T21:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Rising-Threat-of-Compromised-Credentials-in-State-and-Local-Governments-The-Case-for-UEBA-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Six-Ways-to-Combat-Credential-Attacks-in-State-and-Local-Government-Agencies-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/using-logrhythm-siem-to-monitor-remote-desktop-connections/</loc>
		<lastmod>2024-10-24T20:50:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Deepen-Your-Remote-Desktop-Protocol-Visibility-with-Log-Sources-inpage-08.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/protecting-utilities-using-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-LogRhythm-NextGen-SIEM-for-Electricity-Utility-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-monitor-kubernetes-audit-logs-with-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:50:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-To-Monitor-Kubernetes-Audit-Logs-inpage-07.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/centralize-aws-multi-account-logging-detect-defense-evasion-with-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-14.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-16.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AWS-Defense-Evasion-and-Centralized-Multi-Account-Logging-inpage-17.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/detect-water-utility-cyberattacks-with-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Water-Critical-Infrastructure-Cybersecurity-Detecting-an-Attack-inpage-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/guide-to-cybersecurity-compliance-in-singapore/</loc>
		<lastmod>2024-10-24T20:51:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Law-by-Law-Your-Guide-to-Cybersecurity-Compliance-in-Singapore-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/detecting-microsoft-exchange-zero-day-exploits-using-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Microsoft-Exchange-Zero-Day-Exploits-inpage-05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/customer-success/enhancing-the-user-experience-with-logrhythm-siem-7-12/</loc>
		<lastmod>2024-10-24T20:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-04.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-05.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-06.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enhancing-the-User-Experience-with-LogRhythm-SIEM-7-12-inpage-08.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/complying-with-rmit-malaysia-using-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:51:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bank-Negara-of-Malaysias-Risk-Management-in-Technology-RMiT-inpage-05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/supercharged-protection-preventing-ev-chargers-cyberattacks-with-logrhythm/</loc>
		<lastmod>2024-10-24T20:51:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supercharged-Protection-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supercharged-Protection-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supercharged-Protection-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supercharged-Protection-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supercharged-Protection-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/upgrade-your-siem-and-ueba-functions-with-logrhythm-7-11/</loc>
		<lastmod>2024-10-24T20:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Continuing-the-Momentum-for-SIEM-and-UEBA-with-LogRhythm-7-11-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/preventing-healthcare-cyberattacks-via-hl7-exploits-with-logrhythm-siem/</loc>
		<lastmod>2024-10-24T20:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-14.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-16.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Preventing-Healthcare-Cyberattacks-inpage-17.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/logrhythm-siem-playbooks-for-compliance/</loc>
		<lastmod>2024-10-24T20:51:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Leverage-LogRhythm-SIEM-Playbooks-for-Compliance-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Leverage-LogRhythm-SIEM-Playbooks-for-Compliance-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Leverage-LogRhythm-SIEM-Playbooks-for-Compliance-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/what-to-know-about-w2-phishing-scams/</loc>
		<lastmod>2024-10-24T21:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Lookout-for-W2-Phishing-Attacks-During-Tax-Season-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/your-siem-is-lying-to-you-why-you-need-ueba-to-uncover-the-truth/</loc>
		<lastmod>2025-01-10T06:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Your-SIEM-is-Lying-to-You-socialshare-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Your-SIEM-is-Lying-to-You-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Your-SIEM-is-Lying-to-You-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-kpmg-joint-special-session-after-report/</loc>
		<lastmod>2025-01-22T20:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-KPMG-Joint-Special-Session-After-Report-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-KPMG-Joint-Special-Session-After-Report-inpage-01-1-1024x572.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-KPMG-Joint-Special-Session-After-Report-inpage-02-1-1024x529.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-KPMG-Joint-Special-Session-After-Report-inpage-03-1-1024x578.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/challenges-of-building-a-security-data-science-practice/</loc>
		<lastmod>2025-01-23T17:21:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Challenges-Of-Building-A-Security-Data-Science-Practice-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-user-and-entity-behavior-analytics-system-explained-part-3/</loc>
		<lastmod>2025-01-23T17:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-User-and-Entity-Behavior-Analytics-System-Explained-Part-III-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/creeper-the-worlds-first-computer-virus/</loc>
		<lastmod>2025-01-24T08:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Creeper-The-Worlds-First-Computer-Virus-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-cisos-analysis-the-2024-state-of-security-report/</loc>
		<lastmod>2025-01-24T08:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Our-Analysis-of-The-2024-State-of-Security-Report-inpage-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/product-strategy-our-commitment-to-logrhythm-siem-customers/</loc>
		<lastmod>2025-01-24T08:59:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Product-Strategy-Our-Commitment-to-LogRhythm-SIEM-Customers-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-clipper-chip-how-once-upon-a-time-the-government-wanted-to-put-a-backdoor-in-your-phone/</loc>
		<lastmod>2025-01-24T09:02:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Clipper-Chip-How-Once-Upon-a-Time-the-Government-Wanted-to-Put-a-Backdoor-in-Your-Phone-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/take-a-deep-dive-into-plugx-malware/</loc>
		<lastmod>2025-01-24T09:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-a-Deep-Dive-into-PlugX-Malware-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-a-Deep-Dive-into-PlugX-Malware-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-a-Deep-Dive-into-PlugX-Malware-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-a-Deep-Dive-into-PlugX-Malware-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-a-Deep-Dive-into-PlugX-Malware-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-siem-helps-with-cyber-insurance/</loc>
		<lastmod>2025-01-24T09:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-SIEM-Helps-With-Cyber-Insurance-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-candid-ten18-analysis-the-state-of-threat-detection-investigation-and-response-report-2023/</loc>
		<lastmod>2025-01-24T09:03:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Candid-TEN18-Analysis-The-State-of-Threat-Detection-Investigation-and-Response-Report-2023-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TDIR-2023-tdir-global-report-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-value-of-a-false-positive-part-two-a-new-definition/</loc>
		<lastmod>2025-01-24T09:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Value-of-a-False-Positive-Part-Two-A-New-Definition-socialshare-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Value-of-a-False-Positive-Part-Two-A-New-Definition-inpage-01a.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Value-of-a-False-Positive-Part-Two-A-New-Definition-inpage-02a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-value-of-a-false-positive-part-one-measurement/</loc>
		<lastmod>2025-01-24T09:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Value-of-a-False-Positive-Part-One-Measurement-socialshare-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/empowering-security-teams-with-best-practices-for-threat-hunting/</loc>
		<lastmod>2025-01-24T09:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Empowering-Security-Teams-with-Best-Practices-for-Threat-Hunting-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-challenge-of-threat-hunting-for-the-security-operations-center/</loc>
		<lastmod>2025-01-24T09:05:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Challenge-of-Threat-Hunting-for-the-Security-Operations-Center-socialshare-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/seamless-security-automating-sigma-rule-conversion-with-generative-ai/</loc>
		<lastmod>2025-01-24T09:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-01a.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Seamless-Security-Automating-SIGMA-Rule-Conversion-with-Generative-AI-inpage-14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/beyond-the-hype-seven-ai-trends-every-security-pro-needs-to-know-for-2025/</loc>
		<lastmod>2025-02-04T18:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-the-Hype-Seven-AI-Trends-Every-Security-Pro-Needs-to-Know-for-2025-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-the-Hype-Seven-AI-Trends-Every-Security-Pro-Needs-to-Know-for-2025-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/LEADERSHIP-Steve-Wilson-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-the-Hype-Seven-AI-Trends-Every-Security-Pro-Needs-to-Know-for-2025-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TEN18-Steve-Povolny-headshot-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/AUTHOR-Kevin-Kirkwood-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-the-Hype-Seven-AI-Trends-Every-Security-Pro-Needs-to-Know-for-2025-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/AUTHOR-Gabrielle-Hempel-headshot-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/2025-cybersecurity-trends-nine-ways-the-future-could-thrill-challenge-and-surprise-us/</loc>
		<lastmod>2025-02-04T18:06:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-2025-Cybersecurity-Trends-Nine-Ways-the-Future-Could-Thrill-Challenge-and-Surprise-Us-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/AUTHOR-Kevin-Kirkwood-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/AUTHOR-Gabrielle-Hempel-headshot-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TEN18-Steve-Povolny-headshot-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/LEADERSHIP-Steve-Wilson-headshot-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/integrating-instead-of-disrupting-how-ai-will-impact-security/</loc>
		<lastmod>2025-02-04T18:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Integrating-Instead-of-Disrupting-How-AI-Will-Impact-Security-isocialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Integrating-Instead-of-Disrupting-How-AI-Will-Impact-Security-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-named-a-leader-for-the-5th-straight-time-in-gartner-magic-quadrant-for-security-information-and-event-management-siem/</loc>
		<lastmod>2025-02-04T18:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-Gartner-Magic-Quadrant-for-SIEM-2024-socialshare-01-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-Gartner-Magic-Quadrant-for-SIEM-2024-socialshare-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/top-10-ways-exabeam-support-for-openapi-will-transform-security-operations/</loc>
		<lastmod>2025-02-04T20:34:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-10-Ways-Exabeam-Support-for-OpenAPI-Will-Transform-Security-Operations-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/launching-a-new-era-in-soc-productivity-exabeam-new-scale-analytics-and-automation-management/</loc>
		<lastmod>2025-02-04T20:36:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Launching-a-New-Era-in-SOC-Productivity-Exabeam-New-Scale-Analytics-and-Automation-Management-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Launching-a-New-Era-in-SOC-Productivity-Exabeam-New-Scale-Analytics-and-Automation-Management-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Launching-a-New-Era-in-SOC-Productivity-Exabeam-New-Scale-Analytics-and-Automation-Management-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Launching-a-New-Era-in-SOC-Productivity-Exabeam-New-Scale-Analytics-and-Automation-Management-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Launching-a-New-Era-in-SOC-Productivity-Exabeam-New-Scale-Analytics-and-Automation-Management-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/best-of-breed-security-is-always-important-but-for-siem-its-imperative/</loc>
		<lastmod>2025-02-06T16:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Best-of-Breed-Security-Is-Always-Important-but-for-SIEM-Its-Imperative-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/choose-your-infrastructure-why-vendor-selection-should-matter-to-cisos/</loc>
		<lastmod>2025-02-18T15:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Choose-Your-Infrastructure-Why-Vendor-Selection-Should-Matter-to-CISOs-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-rise-of-ai-generated-attacks-why-ueba-is-the-best-defense/</loc>
		<lastmod>2025-02-24T17:06:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Rise-of-AI-Generated-Attacks-Why-UEBA-is-the-Best-Defense-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/recreating-an-incident-timeline-a-manual-vs-automated-process-part-1/</loc>
		<lastmod>2025-02-27T16:58:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Recreating-an-Incident-Timeline%E2%80%93a-Manual-vs.-Automated-Process-Part-1-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-recreating-an-incident-timeline-a-manual-vs-automated-process-part-1-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-recreating-an-incident-timeline-a-manual-vs-automated-process-part-1-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-recreating-an-incident-timeline-a-manual-vs-automated-process-part-1-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-recreating-an-incident-timeline-a-manual-vs-automated-process-part-1-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/recreating-an-incident-timeline-a-manual-vs-automated-process-part-2/</loc>
		<lastmod>2025-02-27T17:03:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Recreating-an-Incident-Timeline%E2%80%93a-Manual-vs.-Automated-Process-Part-2-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-recreating-an-incident-timeline-a-manual-vs-automated-process-part-2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-start-security-automation-with-exabeam/</loc>
		<lastmod>2025-02-27T17:17:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Start-Security-Automation-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-start-security-automation-with-exabeam-inpage-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/advanced-analytics-use-case-detecting-compromised-credentials/</loc>
		<lastmod>2025-02-27T17:45:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Advanced-Analytics-Use-Case-Detecting-Compromised-Credentials-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-notable-user-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-abnormal-activity-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-user-risk-trend-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-user-risk-trend-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-risk-reasons-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-login-details-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-OS-and-browser-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-account-switch-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-webcam-inpage-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-advanced-analytics-use-case-detecting-compromised-credentials-webcam-inpage-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/security-big-data-analytics-past-present-and-future/</loc>
		<lastmod>2025-03-11T18:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-03-1024x487.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-04-1024x487.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Big-Data-Analytics-Past-Present-and-Future-inpage-08.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/bots-in-socs-the-rise-of-ai-in-security-operations-centers/</loc>
		<lastmod>2025-03-11T18:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bots-in-SOCs-The-Rise-of-AI-in-Security-Operations-Centers-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bots-in-SOCs-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bots-in-SOCs-inpage-02-1024x83.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-What-is-the-Future-of-AI-in-IT-and-Security-thumbnail-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-launches-cloud-delivered-fusion-siem-and-fusion-xdr-to-address-security-needs-at-scale/</loc>
		<lastmod>2025-03-11T19:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Launches-Cloud-delivered-Fusion-SIEM-and-Fusion-XDR-to-Address-Security-Needs-at-Scale-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-cloud-delivered-fusion-siem-and-fusion-xdr-to-address-security-needs-at-scale-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-cloud-delivered-fusion-siem-and-fusion-xdr-to-address-security-needs-at-scale-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-cloud-delivered-fusion-siem-and-fusion-xdr-to-address-security-needs-at-scale-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/detecting-malicious-usage-of-microsoft-binaries-with-exabeam/</loc>
		<lastmod>2025-03-12T20:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Malicious-Usage-of-Microsoft-Binaries-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-malicious-usage-of-microsoft-binaries-with-exabeam-inpage-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/an-xdr-prerequisite-prescriptive-threat-centric-use-cases/</loc>
		<lastmod>2025-03-12T20:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-XDR-Prerequisite-Prescriptive-Threat-Centric-Use-Cases-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-xdr-prerequisite-prescriptive-threat-centric-use-cases-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-xdr-prerequisite-prescriptive-threat-centric-use-cases-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-xdr-prerequisite-prescriptive-threat-centric-use-cases-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-xdr-prerequisite-prescriptive-threat-centric-use-cases-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics/</loc>
		<lastmod>2025-03-12T21:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Anomalous-Activity-in-Financial-SWIFT-Transactions-With-Machine-Learning-and-Behavioral-Analytics-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-anomalous-activity-in-financial-swift-transactions-with-machine-learning-and-behavioral-analytics-inpage-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/security-data-lakes-comparing-the-do-it-yourself-deployments-versus-commercial-solutions/</loc>
		<lastmod>2025-03-14T20:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Data-Lakes-Comparing-the-Do-It-Yourself-Deployments-Versus-Commercial-Solutions-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-security-data-lakes-comparing-the-do-it-yourself-deployments-versus-commercial-solutions-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/guide-to-evaluating-ueba-top-10-criteria/</loc>
		<lastmod>2025-03-14T21:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Guide-to-Evaluating-UEBA-Top-10-Criteria-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/what-ueba-stands-for-and-a-5-minute-ueba-primer/</loc>
		<lastmod>2025-03-14T21:01:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-UEBA-Stands-For-And-a-5-Minute-UEBA-Primer-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-to-ingest-files-and-netflow-with-apache-nifi/</loc>
		<lastmod>2025-03-14T21:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Ingest-Files-and-NetFlow-with-Apache-NiFi-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-ingest-files-and-netflow-with-apache-nifi-inpage-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages/</loc>
		<lastmod>2025-03-18T16:05:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Expand-Coverage-Against-Threats-with-Exabeam-Content-Library-and-TDIR-Use-Case-Packages-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-expand-coverage-against-threats-with-exabeam-content-library-and-tdir-use-case-packages-inpage-06.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/insider-threats-and-compromised-devices-how-network-monitoring-uncovers-security-blind-spots/</loc>
		<lastmod>2025-03-20T17:04:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-insider-threats-and-compromised-devices-how-network-monitoring-uncovers-security-blind-spots-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/apache-nifi-send-from-mysql-to-syslog/</loc>
		<lastmod>2025-03-20T17:33:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Apache-Nifi-Send-From-MySQL-to-Syslog-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-apache-nifi-send-from-mysql-to-syslog-inpage-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/exabeam-unveils-2023-partner-of-the-year-award-winners/</loc>
		<lastmod>2025-03-20T22:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Unveils-2023-Partner-of-the-Year-Award-Winners-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-hybrid-security-strategy-balancing-on-prem-siem-with-cloud-flexibility/</loc>
		<lastmod>2025-03-25T21:50:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-hybrid-security-strategy-balancing-on-prem-siem-with-cloud-flexibility-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-story-behind-exabeam-nova-shining-a-light-on-cybersecurity-threats/</loc>
		<lastmod>2025-04-01T13:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-story-behind-exabeam-nova-shining-a-light-on-cybersecurity-threats-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-story-behind-exabeam-nova-shining-a-light-on-cybersecurity-threats-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/logrhythm-siem-7-20-expanded-dashboard-visibility-and-enhanced-data-ingestion/</loc>
		<lastmod>2025-04-01T13:06:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-logrhythm-siem-7-20-expanded-dashboard-visibility-and-enhanced-data-ingestion-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-launches-the-first-fully-integrated-multi-agent-ai-for-security-operations/</loc>
		<lastmod>2025-04-01T13:59:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-the-first-fully-integrated-multi-agent-ai-for-security-operations-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-the-first-fully-integrated-multi-agent-ai-for-security-operations-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-launches-the-first-fully-integrated-multi-agent-ai-for-security-operations-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/benefits-of-using-exabeam-to-augment-your-siem/</loc>
		<lastmod>2025-04-07T22:37:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Benefits-of-Using-Exabeam-to-Augment-Your-SIEM-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-benefits-of-using-exabeam-to-augment-your-siem-augmenting-splunk-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/smart-timelines-nine-benefits-for-detecting-and-investigating-security-incidents/</loc>
		<lastmod>2025-04-08T15:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Smart-Timelines-Nine-Benefits-for-Detecting-and-Investigating-Security-Incidents-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-smart-timelines-nine-benefits-for-detecting-and-investigating-security-incidents-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-smart-timelines-nine-benefits-for-detecting-and-investigating-security-incidents-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-smart-timelines-nine-benefits-for-detecting-and-investigating-security-incidents-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/trends-in-ransomware-attacks-on-high-value-critical-infrastructure-targets/</loc>
		<lastmod>2025-04-08T15:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Trends-in-Ransomware-Attacks-on-High-Value-Critical-Infrastructure-Targets-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-trends-in-ransomware-attacks-on-high-value-critical-infrastructure-targets-attack-chain-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-trends-in-ransomware-attacks-on-high-value-critical-infrastructure-targets-ransomware-scanning-process-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-trends-in-ransomware-attacks-on-high-value-critical-infrastructure-targets-ransomware-encryption-process-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team/</loc>
		<lastmod>2025-04-08T16:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Survey-Finds-35-of-Security-Professionals-Say-the-Blue-Team-Rarely-Catches-the-Red-Team-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-survey-finds-35-of-security-professionals-say-the-blue-team-rarely-catches-the-red-team-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-security-log-management-because-security-operations-isnt-it-operations/</loc>
		<lastmod>2025-04-08T16:50:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-Because-Security-Operations-Isnt-IT-Operations-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-01a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-05a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Log-Management-inpage-07.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/detecting-printnightmare-cve-2021-1675-34527-using-exabeam/</loc>
		<lastmod>2025-04-08T16:54:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Printnightmare-CVE-2021-1675-34527-Using-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-printnightmare-cve-2021-1675-34527-using-exabeam-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-printnightmare-cve-2021-1675-34527-using-exabeam-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-printnightmare-cve-2021-1675-34527-using-exabeam-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/mitre-attck-technique-t1503-credentials-from-web-browsers/</loc>
		<lastmod>2025-04-08T17:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MITRE-ATTCK-Technique-T1503-Credentials-from-Web-Browsers-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-attck-technique-t1503-credentials-from-web-browsers-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-attck-technique-t1503-credentials-from-web-browsers-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-attck-technique-t1503-credentials-from-web-browsers-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-attck-technique-t1503-credentials-from-web-browsers-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-attck-technique-t1503-credentials-from-web-browsers-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/an-outcome-based-approach-to-use-cases-solving-for-lateral-movement/</loc>
		<lastmod>2025-04-08T17:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-Outcome-based-Approach-to-Use-Cases-Solving-for-Lateral-Movement-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Solving-for-Lateral-Movement-inpage-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/enable-smarter-workflows-using-exabeam-threat-intelligence-service/</loc>
		<lastmod>2025-04-08T17:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Enable-Smarter-Workflows-Using-Exabeam-Threat-Intelligence-Service-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enable-smarter-workflows-using-exabeam-threat-intelligence-service-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enable-smarter-workflows-using-exabeam-threat-intelligence-service-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enable-smarter-workflows-using-exabeam-threat-intelligence-service-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enable-smarter-workflows-using-exabeam-threat-intelligence-service-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enable-smarter-workflows-using-exabeam-threat-intelligence-service-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/5-best-practices-for-your-incident-response-plan/</loc>
		<lastmod>2025-04-08T17:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Best-Practices-for-Your-Incident-Response-Plan-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-best-practices-for-your-incident-response-plan-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-best-practices-for-your-incident-response-plan-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/insider-threat-use-cases-how-modern-siem-solutions-detect-malicious-activity/</loc>
		<lastmod>2025-04-08T18:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threat-Use-Cases-How-Modern-SIEM-Solutions-Detect-Malicious-Activity-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Insider-Threats-socialshare-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-management-tools/</loc>
		<lastmod>2025-04-08T18:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Management-Tools-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-64-Management-Training-Learning-How-To-Manage-Managers-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/threat-intelligence-threat-feeds-tools-and-challenges/</loc>
		<lastmod>2025-04-08T18:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Threat-Intelligence-Threat-Feeds-Tools-and-Challenges-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-threat-intelligence-threat-feeds-tools-and-challenges-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-threat-intelligence-threat-feeds-tools-and-challenges-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/detecting-the-new-petitpotam-attack-with-exabeam/</loc>
		<lastmod>2025-04-08T18:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-the-New-PetitPotam-Attack-With-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-new-petitpotam-attack-with-exabeam-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-new-petitpotam-attack-with-exabeam-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/mitre-publishes-domain-generation-algorithm-t1483-in-the-attck-framework/</loc>
		<lastmod>2025-04-08T19:02:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MITRE-Publishes-Domain-Generation-Algorithm-T1483-in-the-ATTCK-Framework-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-publishes-domain-generation-algorithm-t1483-in-the-attck-framework-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-publishes-domain-generation-algorithm-t1483-in-the-attck-framework-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-publishes-domain-generation-algorithm-t1483-in-the-attck-framework-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/introducing-ten18-by-exabeam-where-technical-knowledge-meets-business-trust/</loc>
		<lastmod>2025-04-08T19:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-TEN18-by-Exabeam-index-01-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TEN18-Steve-Moore-headshot-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TEN18-Tyler-Farrar-headshot-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TEN18-Steve-Povolny-headshot-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-TEN18-by-Exabeam-index-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office/</loc>
		<lastmod>2025-04-08T19:50:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeam-for-Contact-Tracing-to-Keep-Employees-Safe-When-They-Return-to-the-Office-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-NetworkZones-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-Exabeam-Data-Lake-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-Query-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-Builder-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-contact-tracing-to-keep-employees-safe-when-they-return-to-the-office-inpage-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell/</loc>
		<lastmod>2025-04-08T19:57:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-the-Exploitation-of-Pentesting-Tools-Gaining-Power-Over-PowerShell-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-the-exploitation-of-pentesting-tools-gaining-power-over-powershell-inpage-05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck/</loc>
		<lastmod>2025-04-08T20:20:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Look-at-the-Capital-One-Data-Breach-Through-the-Lens-of-MITRE-ATTCK-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-look-at-the-capital-one-data-breach-through-the-lens-of-mitre-attck-inpage-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/cyber-espionage-and-the-us-elections-what-are-russian-hackers-possibly-doing-and-how-can-they-be-stopped/</loc>
		<lastmod>2025-04-08T20:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyber-Espionage-and-the-US-Elections-What-are-Russian-Hackers-Possibly-Doing-and-How-Can-They-be-Stopped-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cyber-espionage-and-the-us-elections-what-are-russian-hackers-possibly-doing-and-how-can-they-be-stopped-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cyber-espionage-and-the-us-elections-what-are-russian-hackers-possibly-doing-and-how-can-they-be-stopped-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them/</loc>
		<lastmod>2025-04-08T20:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-the-Challenges-of-Frontline-Security-Teams-and-the-CISOs-who-Lead-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-ExabeamSOCInfographic-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understanding-the-challenges-of-frontline-security-teams-and-the-cisos-who-lead-them-inpage-08.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/incident-investigation-how-understanding-context-aids-informed-decision-making/</loc>
		<lastmod>2025-04-08T20:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Investigation-How-Understanding-Context-Aids-Informed-Decision-making-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-03a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-03b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-03c.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-05a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-05b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-incident-investigation-how-understanding-context-aids-informed-decision-making-inpage-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack/</loc>
		<lastmod>2025-04-08T20:59:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Has-the-Notorious-Carbanak-Cybercrime-Spree-Reached-its-Finale-What-You-Need-to-Know-About-Stopping-the-Next-APT-Attack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-has-the-notorious-carbanak-cybercrime-spree-reached-its-finale-what-you-need-to-know-about-stopping-the-next-apt-attack-inpage-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/census-security-solutions-for-protecting-complex-cloud-systems/</loc>
		<lastmod>2025-04-08T21:09:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Census-Security-Solutions-for-Protecting-Complex-Cloud-Systems-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-census-security-solutions-for-protecting-complex-cloud-systems-1890_US_Census_form-inpage-01-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-census-security-solutions-for-protecting-complex-cloud-systems-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-census-security-solutions-for-protecting-complex-cloud-systems-inpage-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/time-for-an-upgrade-why-banks-should-ditch-legacy-siem-technology-for-cloud-native-siem/</loc>
		<lastmod>2025-04-08T21:57:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Time-for-an-Upgrade-Why-Banks-Should-Ditch-Legacy-SIEM-Technology-for-Cloud-native-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Five-Cybersecurity-Essentials-for-Banks-in-Uncertain-Times-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cultivating-a-risk-aware-culture-employee-training-and-awareness-in-bank-cybersecurity/</loc>
		<lastmod>2025-04-08T21:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cultivating-a-Risk-aware-Culture-Employee-Training-and-Awareness-in-Bank-Cybersecurity-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Five-Cybersecurity-Essentials-for-Banks-in-Uncertain-Times-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/bolstering-bank-cybersecurity-combating-external-and-insider-threats-with-mfa/</loc>
		<lastmod>2025-04-08T21:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Bolstering-Bank-Cybersecurity-Combating-External-and-Insider-Threats-with-MFA-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Five-Cybersecurity-Essentials-for-Banks-in-Uncertain-Times-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/nis2-expands-its-scope-for-eu-entities/</loc>
		<lastmod>2025-04-08T22:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NIS2-Expands-Its-Scope-for-EU-Entities-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NIS2-Expands-Its-Scope-inpgae-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NIS2-Expands-Its-Scope-inpgae-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NIS2-Expands-Its-Scope-inpgae-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-NIS2-Expands-Its-Scope-inpgae-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/aligning-with-dora-for-financial-entities-in-the-eu/</loc>
		<lastmod>2025-04-08T22:04:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Aligning-With-DORA-for-Financial-Entities-in-the-EU-socialshare-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Aligning-With-DORA-for-Financial-Entities-in-the-EU-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Aligning-With-DORA-for-Financial-Entities-in-the-EU-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Aligning-With-DORA-for-Financial-Entities-in-the-EU-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-power-of-prioritization-and-analysis-understanding-threat-investigation/</loc>
		<lastmod>2025-04-08T22:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Power-of-Prioritization-and-Analysis-Understanding-Threat-Investigation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/take-tdir-to-a-whole-new-level-achieving-security-operations-excellence/</loc>
		<lastmod>2025-04-08T22:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Take-TDIR-to-a-Whole-New-Level-Achieving-Security-Operations-Excellence-index-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/sophisticated-attacks-and-subtle-anomalies-why-modern-detection-matters/</loc>
		<lastmod>2025-04-08T22:06:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Sophisticated-Attacks-and-Subtle-Anomalies-Why-Modern-Detection-Matters-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/centralized-tdir-from-exabeam-with-new-threat-center-automation-management-and-exabeam-copilot/</loc>
		<lastmod>2025-04-08T22:07:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Centralized-TDIR-From-Exabeam-With-New-Threat-Center-Automation-Management-and-Exabeam-Copilot-index-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Centralized-TDIR-From-Exabeam-With-New-Threat-Center-Automation-Management-and-Exabeam-Copilot-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Centralized-TDIR-From-Exabeam-With-New-Threat-Center-Automation-Management-and-Exabeam-Copilot-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/action-remediation-and-lessons-learned-implementing-incident-response/</loc>
		<lastmod>2025-04-08T22:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Action-Remediation-and-Lessons-Learned-Implementing-Incident-Response-socialshare-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Action-Remediation-and-Lessons-Learned-Implementing-Incident-Response-inpage-01-1024x98.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/strengthening-cyber-defenses-innovative-solutions-for-tdir-challenges/</loc>
		<lastmod>2025-04-08T22:08:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Strengthening-Cyber-Defenses-Innovative-Solutions-for-TDIR-Challenges-socialshare-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/redefining-ma-a-strategic-blueprint-for-tech-debt-mitigation/</loc>
		<lastmod>2025-04-08T22:09:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Redefining-MandA-A-Strategic-Blueprint-for-Tech-Debt-Mitigation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/introducing-exabeam-copilot-your-new-generative-ai-cybersecurity-virtual-assistant/</loc>
		<lastmod>2025-04-08T22:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-Copilot-Your-New-Generative-AI-Cybersecurity-Virtual-Assistant-socialshare-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-Copilot-Your-New-Generative-AI-Cybersecurity-Virtual-Assistant-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-Copilot-Your-New-Generative-AI-Cybersecurity-Virtual-Assistant-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/beyond-the-horizon-navigating-the-evolving-cybersecurity-landscape-of-2024/</loc>
		<lastmod>2025-04-08T22:09:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Beyond-the-Horizon-Navigating-the-Evolving-Cybersecurity-Landscape-of-2024-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-TDIR-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-empowering-people-to-bring-their-whole-self-to-work/</loc>
		<lastmod>2025-04-08T22:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Empowering-People-to-Bring-Their-Whole-Self-to-Work-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-59-Empowering-People-to-Bring-Their-Whole-Self-to-Work-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/detecting-suspicious-lateral-movements-during-a-cybersecurity-breach/</loc>
		<lastmod>2025-04-08T22:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Suspicious-Lateral-Movements-During-a-Cybersecurity-Breach-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-suspicious-lateral-movements-during-a-cybersecurity-breach-Lateral-Movement-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-suspicious-lateral-movements-during-a-cybersecurity-breach-Incomplete-log-timeline-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-suspicious-lateral-movements-during-a-cybersecurity-breach-lateral-movement-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-suspicious-lateral-movements-during-a-cybersecurity-breach-Smart-timelines-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-suspicious-lateral-movements-during-a-cybersecurity-breach-Exabeam-Threat-Hunter-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/guardians-of-patient-data-jackie-mattinglys-journey-to-protecting-healthcare-information-security/</loc>
		<lastmod>2025-04-08T22:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Guardians-of-Patient-Data-Jackie-Mattinglys-Journey-to-Protecting-Healthcare-Information-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Life-After-Breach-How-Hospitals-Can-Protect-Patient-Data-with-Jackie-Mattingly-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-completes-information-security-registered-assessors-program-irap-assessment-at-the-protected-level/</loc>
		<lastmod>2025-04-08T22:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Completes-Information-Security-Registered-Assessors-Program-IRAP-Assessment-at-the-PROTECTED-Level-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Leveraging-AI-to-Monitor-Analyse-and-Respond-to-Threats-thumbnail-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-irap-assessment-completion-creates-new-opportunities-for-partners-in-australia/</loc>
		<lastmod>2025-04-08T22:44:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-IRAP-Assessment-Completion-Creates-New-Opportunities-for-Partners-in-Australia-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Leveraging-AI-to-Monitor-Analyse-and-Respond-to-Threats-thumbnail-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-importance-of-storytelling-and-collaboration-for-cisos/</loc>
		<lastmod>2025-04-08T22:46:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Importance-of-Storytelling-and-Collaboration-for-CISOs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Storytelling-For-CISOs-How-to-Make-Your-Message-Resonate-with-Tom-August-socialshare-01.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/is-our-u-s-election-process-too-large-and-complex-to-secure-part-2/</loc>
		<lastmod>2025-04-08T22:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Is-Our-US-Election-Process-Too-Large-and-Complex-to-Secure-Part-2-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-is-our-u-s-election-process-too-large-and-complex-to-secure-part-2-Election-Process-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-protect-your-business-when-credentials-fail/</loc>
		<lastmod>2025-04-08T22:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Protect-Your-Business-When-Credentials-Fail-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-protect-your-business-when-credentials-fail-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-protect-your-business-when-credentials-fail-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-protect-your-business-when-credentials-fail-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-web-browser-a-critical-source-for-digital-forensic-and-cybersecurity-investigations/</loc>
		<lastmod>2025-04-08T22:59:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Web-Browser-A-Critical-Source-for-Digital-Forensic-and-Cybersecurity-Investigations-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-web-browser-a-critical-source-for-digital-forensic-and-cybersecurity-investigations-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-web-browser-a-critical-source-for-digital-forensic-and-cybersecurity-investigations-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-web-browser-a-critical-source-for-digital-forensic-and-cybersecurity-investigations-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-web-browser-a-critical-source-for-digital-forensic-and-cybersecurity-investigations-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/modernizing-your-siem-one-piece-at-a-time/</loc>
		<lastmod>2025-04-08T23:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Modernizing-Your-SIEM-One-Piece-at-a-Time-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-modernizing-your-siem-one-piece-at-a-time-Modularity-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeams-cloud-based-security-operations-platform-improves-insights-and-efficiency-for-bbs/</loc>
		<lastmod>2025-04-08T23:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeams-Cloud-based-Security-Operations-Platform-Improves-Insights-and-Efficiency-for-BBS-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeams-cloud-based-security-operations-platform-improves-insights-and-efficiency-for-bbs-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-challenges-of-cloud-security/</loc>
		<lastmod>2025-04-08T23:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Challenges-of-Cloud-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-challenges-of-cloud-security-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/improving-cloud-security-through-monitoring-and-analytics/</loc>
		<lastmod>2025-04-08T23:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improving-Cloud-Security-Through-Monitoring-and-Analytics-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-improving-cloud-security-through-monitoring-and-analytics-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-improving-cloud-security-through-monitoring-and-analytics-Salesforce-cloud-security-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/attack-of-the-clones-how-generative-ai-tools-are-redefining-phishing/</loc>
		<lastmod>2025-04-09T18:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-attack-of-the-clones-how-generative-ai-tools-are-redefining-phishing-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-rise-of-script-kiddies-in-an-ai-world/</loc>
		<lastmod>2025-04-10T13:29:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-rise-of-script-kiddies-in-an-ai-world-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/why-i-joined-exabeam-brook/</loc>
		<lastmod>2025-04-11T18:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-i-joined-exabeam-brook-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/siem-best-practices-to-help-you-comply-with-indonesias-personal-data-protection-law/</loc>
		<lastmod>2025-04-14T16:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-siem-best-practices-to-help-you-comply-with-indonesias-personal-data-protection-law-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/ai-at-the-core-elevating-steve-wilson-to-chief-ai-and-product-officer/</loc>
		<lastmod>2025-04-17T22:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ai-at-the-core-elevating-steve-wilson-to-chief-ai-and-product-officer-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-fix-burnout-in-the-soc-and-why-ciso-turnover-keeps-climbing/</loc>
		<lastmod>2025-04-18T13:12:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-fix-burnout-in-the-soc-andand-why-ciso-turnover-keeps-climbing-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/theres-hope-beyond-the-hype-why-agentic-ai-is-the-future-of-cybersecurity/</loc>
		<lastmod>2025-04-22T13:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-theres-hope-beyond-the-hype-why-agentic-ai-is-the-future-of-cybersecurity-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-From-Hype-to-Help-How-AI-Is-Really-Transforming-Cybersecurity-in-2025-thumbnail-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/HOME-From-Hype-to-Help-How-AI-Is-Really-Transforming-Cybersecurity-in-2025-thumbnail-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-winning-hand-in-cybersecurity-ueba-ndr-siem-and-ai/</loc>
		<lastmod>2025-04-24T18:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-winning-hand-in-cybersecurity-ueba-ndr-siem-and-ai-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/what-we-can-learn-from-the-pga-ransomware-attack/</loc>
		<lastmod>2025-05-06T15:53:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-We-Can-Learn-from-the-PGA-Ransomware-Attack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-what-we-can-learn-from-the-pga-ransomware-attack-ransomware-attack-chain-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-what-we-can-learn-from-the-pga-ransomware-attack-ransomware-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-what-we-can-learn-from-the-pga-ransomware-attack-ransomware-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-what-we-can-learn-from-the-pga-ransomware-attack-ransomware-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/rsac-2025-exabeam-showcases-the-power-of-agentic-ai-in-security-operations/</loc>
		<lastmod>2025-05-07T14:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-rsac-2025-exabeam-showcases-the-power-of-agentic-ai-in-security-operations-team-photo-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-rsac-2025-exabeam-showcases-the-power-of-agentic-ai-in-security-operations-presentation-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/scattered-spider-and-the-new-blueprint-for-cloud-native-endpoint-evasive-cyber-attacks/</loc>
		<lastmod>2025-05-13T15:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-scattered-spider-and-the-new-blueprint-for-cloud-native-endpoint-evasive-cyber-attacks-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/highlights-from-the-inaugural-hackathon-at-spotlight-19/</loc>
		<lastmod>2025-05-14T15:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Highlights-from-the-Inaugural-Hackathon-at-Spotlight-19-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-highlights-from-the-inaugural-hackathon-at-spotlight-19-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/ueba-vs-itdr-itdr-will-catch-the-login-ueba-will-catch-the-attack/</loc>
		<lastmod>2025-05-16T17:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ueba-vs-itdr-itdr-will-catch-the-login-ueba-will-catch-the-attack-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ueba-vs-itdr-itdr-will-catch-the-login-ueba-will-catch-the-attack-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ueba-vs-itdr-itdr-will-catch-the-login-ueba-will-catch-the-attack-comparison-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-network-monitoring-helps-banks-stop-fraud-and-payment-attacks-before-theyspread/</loc>
		<lastmod>2025-05-21T14:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Network-Monitoring-Helps-Banks-Stop-Fraud-and-Payment-Attacks-Before-They-Spread-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/save-the-date-exabeam-spotlight24-global-webcast-registration-opens-march-12/</loc>
		<lastmod>2025-05-21T16:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Save-The-Date-Exabeam-Spotlight24-Global-Webcast-Registration-Opens-March-12-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/TDIR-2023-tdir-global-report-featured-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/17-infosec-resources-you-may-have-missed-in-march/</loc>
		<lastmod>2025-05-21T17:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-17-InfoSec-Resources-You-May-Have-Missed-in-March-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Fantastic-Attack-Types-and-How-to-Find-Them-featured-03-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/an-analysis-of-the-2018-gartner-magic-quadrant-for-security-information-and-event-management-siem/</loc>
		<lastmod>2025-05-21T17:11:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-Analysis-of-the-2018-Gartner-Magic-Quadrant-for-Security-Information-and-Event-Management-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/my-take-on-the-market-trends-outlined-in-the-latest-analyst-report/</loc>
		<lastmod>2025-05-21T17:16:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-My-Take-on-the-Market-Trends-Outlined-in-the-Latest-Analyst-Report-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-september-12-2022/</loc>
		<lastmod>2025-05-21T17:17:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-September-12-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-september-19-2022/</loc>
		<lastmod>2025-05-21T17:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-September-19-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/change-your-risk-mindset-to-level-the-security-playing-field/</loc>
		<lastmod>2025-05-21T17:31:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Change-Your-Risk-Mindset-to-Level-the-Security-Playing-Field-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/10-latest-insider-threat-resources/</loc>
		<lastmod>2025-05-21T17:39:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-10-Latest-Insider-Threat-Resources-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-august-29-2022/</loc>
		<lastmod>2025-05-21T17:39:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-August-29-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/uncategorized/exabeam-news-wrap-up-august-1-2023/</loc>
		<lastmod>2025-05-21T17:43:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-August-1-2023-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/why-is-critical-infrastructure-so-vulnerable-to-insider-threats/</loc>
		<lastmod>2025-05-21T17:46:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-is-Critical-Infrastructure-So-Vulnerable-to-Insider-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-july-11-2022/</loc>
		<lastmod>2025-05-21T17:49:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-July-11-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/supply-chain-breaches-and-ot-iot-scenarios/</loc>
		<lastmod>2025-05-21T17:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Supply-Chain-Breaches-and-OT-IoT-Scenarios-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/5-lessons-learned-implementing-a-modern-insider-risk-management-program/</loc>
		<lastmod>2025-05-21T17:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Lessons-Learned-Implementing-a-Modern-Insider-Risk-Management-Program-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-exabeam-helped-brunel-university-meet-the-demand-for-advanced-cybersecurity/</loc>
		<lastmod>2025-05-21T17:59:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Exabeam-Helped-Brunel-University-Meet-the-Demand-for-Advanced-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/calling-all-soc-warriors-announcing-the-2021-exabeam-cybersecurity-excellence-awards/</loc>
		<lastmod>2025-05-21T18:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Calling-all-SOC-Warriors-Announcing-The-2021-Exabeam-Cybersecurity-Excellence-Awards-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/how-to-leverage-behavioral-analytics-to-reduce-insider-threat-your-questions-answered/</loc>
		<lastmod>2025-05-21T18:04:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Leverage-Behavioral-Analytics-to-Reduce-Insider-Threat-Your-Questions-Answered-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/new-scale-siem-expands-exabeam-threat-coverage-with-content-library-and-tdir-use-cases/</loc>
		<lastmod>2025-05-21T18:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-New-Scale-SIEM-Expands-Exabeam-Threat-Coverage-with-Content-Library-and-TDIR-Use-Cases-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/escaping-dantes-soc-inferno-gluttony-and-the-soc-skills-shortage/</loc>
		<lastmod>2025-05-21T18:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-Gluttony-and-the-SOC-Skills-Shortage-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-november-1-2022/</loc>
		<lastmod>2025-05-21T18:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-November-1-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-august-8-2022/</loc>
		<lastmod>2025-05-21T18:56:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-August-8-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-october-10-2022/</loc>
		<lastmod>2025-05-21T18:56:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-October-10-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/spotlight23-highlights-in-review/</loc>
		<lastmod>2025-05-21T18:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Spotlight23-Highlights-in-Review-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/webinar-recap-2017-cybersecurity-trends-predictions/</loc>
		<lastmod>2025-05-21T19:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Webinar-Recap-2017-Cybersecurity-Trends-and-Predictions-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/happy-birthday-gdpr-a-party-without-cake-is-just-a-meeting/</loc>
		<lastmod>2025-05-21T19:33:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-origins-of-web-security-and-the-birth-of-security-socket-layer-ssl-protocol/</loc>
		<lastmod>2025-05-21T19:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Origins-of-Web-Security-and-the-Birth-of-Security-Socket-Layer-SSL-Protocol-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/key-findings-of-the-exabeam-2019-state-of-the-soc-report/</loc>
		<lastmod>2025-05-21T19:36:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Key-Findings-of-the-Exabeam-2019-State-of-the-SOC-Report-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_1-1024x512.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_2-1024x832.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_3-1024x644.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_4-1024x478.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_5-1024x614.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/06/SOC_Report_Blog_6-1024x559.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/a-gdpr-update/</loc>
		<lastmod>2025-05-21T19:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-GDPR-Update-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-ueba-and-soar-can-improve-your-security-teams-productivity-without-additional-staff/</loc>
		<lastmod>2025-05-21T19:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-UEBA-and-SOAR-Can-Improve-Your-Security-Teams-Productivity-Without-Additional-Staff-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-july-25-2022/</loc>
		<lastmod>2025-05-21T19:50:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-July-25-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/15-infosec-resources-you-might-have-missed-in-november/</loc>
		<lastmod>2025-05-21T19:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-15-InfoSec-Resources-You-Might-Have-Missed-in-November-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-How-to-build-an-Insider-Threat-program-with-Exabeam-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-september-5-2022/</loc>
		<lastmod>2025-05-21T19:53:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-September-5-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/9-infosec-resources-you-might-have-missed-in-july/</loc>
		<lastmod>2025-05-21T19:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-9-InfoSec-Resources-You-Might-Have-Missed-in-July-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-august-15-2022/</loc>
		<lastmod>2025-05-21T19:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-August-15-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-february-1-2023/</loc>
		<lastmod>2025-05-21T19:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-February-1-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-5-Ways-Exabeam-Helps-Eliminate-Compromised-Credential-Blindspots-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/whats-new-in-exabeam-product-development-november-2022/</loc>
		<lastmod>2025-05-21T20:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-2022-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Community-inpage-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-july-6-2023/</loc>
		<lastmod>2025-05-21T20:47:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-July-6-2023-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-foundations-building-an-insider-threat-program-from-scratch/</loc>
		<lastmod>2025-05-21T20:51:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Foundations-Building-an-Insider-Threat-Program-from-Scratch-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Building-an-Insider-Threat-Program-from-Scratch-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-august-22-2022/</loc>
		<lastmod>2025-05-21T20:52:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-August-22-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-january-5-2023/</loc>
		<lastmod>2025-05-21T21:12:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-January-5-2023-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-a-company-and-platform-that-puts-customers-first/</loc>
		<lastmod>2025-05-21T21:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-A-Company-and-Platform-that-Puts-Customers-First-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-A-Company-and-Platform-that-Puts-Customers-First-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-cisos-response-plan-after-a-breach/</loc>
		<lastmod>2025-05-21T21:21:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-CISOs-Response-Plan-After-a-Breach-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/8-steps-to-migrate-your-siem-assessment/</loc>
		<lastmod>2025-05-21T21:26:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-Steps-to-Migrate-Your-SIEM-Assessment-socialshare-01-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-steps-to-migrate-your-siem-assessment-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-steps-to-migrate-your-siem-assessment-Short-project-timeline-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-steps-to-migrate-your-siem-assessment-Typical-project-timeline-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-steps-to-migrate-your-siem-assessment-Long-project-timeline-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-may-1-2023/</loc>
		<lastmod>2025-05-21T21:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-May-1-2023-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-december-1-2022/</loc>
		<lastmod>2025-05-21T21:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Whats-New-in-Exabeam-Product-Development-November-2022-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/attack-beasts-and-how-to-find-them/</loc>
		<lastmod>2025-05-21T21:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Attack-Beasts-and-How-to-Find-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Fantastic-Attack-Types-and-How-to-Find-Them-featured-03-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-fusion-xdr-and-exabeam-fusion-siem-now-available-in-google-cloud-marketplace/</loc>
		<lastmod>2025-05-21T21:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Fusion-XDR-and-Exabeam-Fusion-SIEM-now-available-in-Google-Cloud-Marketplace-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-GCP-Integration-Architecture-inpage-01-1024x558.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/operation-aurora-2010s-major-breach-by-chinese-hackers/</loc>
		<lastmod>2025-05-21T21:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Operation-Aurora-2010s-Major-Breach-by-Chinese-Hackers-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-operation-aurora-2010s-major-breach-by-chinese-hackers-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-operation-aurora-2010s-major-breach-by-chinese-hackers-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-operation-aurora-2010s-major-breach-by-chinese-hackers-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-operation-aurora-2010s-major-breach-by-chinese-hackers-Brain-boot-virus-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/breaking-down-barriers-to-effective-cyber-defense-with-ueba/</loc>
		<lastmod>2025-05-21T22:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Breaking-Down-Barriers-To-Effective-Cyber-Defense-with-UEBA-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Breaking-Down-Barriers-To-Effective-Cyber-Defense-with-UEBA-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Breaking-Down-Barriers-To-Effective-Cyber-Defense-with-UEBA-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/announcing-the-2023-exabeam-cybersecurity-warrior-awards-nominate-your-champions/</loc>
		<lastmod>2025-05-21T22:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Announcing-the-2023-Exabeam-Cybersecurity-Warrior-Awards-Nominate-Your-Champions-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Event-Management-Basics-What-Weve-Seen-Companies-Are-Not-Doing-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-april-3-2023/</loc>
		<lastmod>2025-05-21T22:53:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-April-3-2023-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/the-responsibility-of-risk-regulations-certifications-what-do-privacy-and-data-security-mean/</loc>
		<lastmod>2025-05-21T22:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Responsibility-of-Risk-Regulations-Certifications-What-do-Privacy-and-Data-Security-Mean-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Responsibility-of-Risk-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/12-infosec-resources-you-might-have-missed-in-august/</loc>
		<lastmod>2025-05-21T22:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-12-InfoSec-Resources-You-Might-Have-Missed-in-August-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-The-CISOs-Response-Plan-After-a-Breach-featured-02-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/17-infosec-resources-you-might-have-missed-in-june/</loc>
		<lastmod>2025-05-21T23:01:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-17-InfoSec-Resources-You-Might-Have-Missed-in-June-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-The-CISOs-Response-Plan-After-a-Breach-featured-02-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/protect-personal-data-with-gdpr-compliance/</loc>
		<lastmod>2025-05-21T23:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Protect-Personal-Data-With-GDPR-Compliance-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-leading-with-a-military-mindset-its-we-not-me/</loc>
		<lastmod>2025-05-21T23:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Leading-with-a-Military-Mindset-Its-We-Not-Me-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/i-dont-like-to-moveit-moveit/</loc>
		<lastmod>2025-05-21T23:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-I-Dont-Like-to-MoveIt-MoveIt-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-career-in-cybersecurity-has-many-positives-but-its-not-without-challenges/</loc>
		<lastmod>2025-05-21T23:16:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Career-in-Cybersecurity-Has-Many-Positives-But-Its-Not-Without-Challenges-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Screen-Shot-2018-10-09-at-11.43.27-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Cybersecurity-job-satisfaction.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Cybersecurity-technologies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2018/10/Cybersecurity-certifications.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-march-1-2023/</loc>
		<lastmod>2025-05-21T23:17:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-March-1-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Insider-Threats-featured-01-1024x535.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/announcing-the-security-management-excellence-awards/</loc>
		<lastmod>2025-05-21T23:19:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Announcing-the-Security-Management-Excellence-Awards-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/3-questions-to-ask-siem-vendors-and-3-to-ask-yourself/</loc>
		<lastmod>2025-05-21T23:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-3-Questions-to-Ask-SIEM-Vendors-And-3-to-Ask-Yourself-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-The-5-Claims-Your-SIEM-Vendor-Should-Never-Make-And-They-Did-featured-02-1024x538.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/30-resources-to-help-cisos-protect-their-organizations-from-breaches/</loc>
		<lastmod>2025-05-21T23:22:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-30-Resources-to-Help-CISOs-Protect-Their-Organizations-From-Breaches-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Not-all-SIEMs-are-Created-Equal-featured-01-1024x535.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/spooky-season-brings-a-toe-curling-vulnerability/</loc>
		<lastmod>2025-05-21T23:25:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Spooky-Season-Brings-a-Toe-Curling-Vulnerability-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/8-steps-to-migrate-your-siem-preparation/</loc>
		<lastmod>2025-05-21T23:26:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-Steps-to-Migrate-Your-SIEM-Preparation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/04/8-Steps-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/cybersecurity-awareness-month-insider-threats-and-how-to-detect-them/</loc>
		<lastmod>2025-05-21T23:27:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Awareness-Month-Insider-Threats-and-How-to-Detect-Them-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/fourth-gen-siem-is-new-scale-siem-cloud-native-siem-at-hyperscale/</loc>
		<lastmod>2025-05-21T23:29:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Fourth-gen-SIEM-is-New-Scale-SIEM-Cloud-native-SIEM-at-Hyperscale-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ponemon-study-reports-95-of-exabeam-siem-users-rank-it-as-highly-effective-for-security/</loc>
		<lastmod>2025-05-21T23:29:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ponemon-Study-Reports-95-of-Exabeam-SIEM-Users-Rank-It-as-Highly-Effective-for-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reports-95-of-exabeam-siem-users-rank-it-as-highly-effective-for-security-Figure-16-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reports-95-of-exabeam-siem-users-rank-it-as-highly-effective-for-security-Figure-17-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reports-95-of-exabeam-siem-users-rank-it-as-highly-effective-for-security-Figure-18-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reports-95-of-exabeam-siem-users-rank-it-as-highly-effective-for-security-Figure-23-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/7-infosec-resources-you-may-have-missed-in-february/</loc>
		<lastmod>2025-05-21T23:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-7-InfoSec-Resources-You-May-Have-Missed-in-February-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/lessons-learned-from-the-treasury-department-attack/</loc>
		<lastmod>2025-05-29T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-lessons-learned-from-the-treasury-department-attack-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/why-your-soc-isnt-ready-for-ai-and-what-to-do-about-it/</loc>
		<lastmod>2025-06-02T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-your-soc-isnt-ready-for-ai-and-what-to-do-about-it-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/choose-your-own-adventure-finding-the-right-path-for-your-self-hosted-siem-deployment/</loc>
		<lastmod>2025-06-03T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-choose-your-own-adventure-finding-the-right-path-for-your-self-hosted-siem-deployment-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/understanding-cloud-dlp-key-features-and-best-practices/</loc>
		<lastmod>2025-06-03T19:56:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-Cloud-DLP-Key-Features-and-Best-Practices-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/artificial-intelligence-a-danger-to-patient-privacy/</loc>
		<lastmod>2025-06-04T14:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Artificial-Intelligence-A-Danger-to-Patient-Privacy-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cisos-are-focused-on-outcomes-can-agentic-ai-deliver/</loc>
		<lastmod>2025-06-16T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cisos-are-focused-on-outcomes-can-agentic-ai-deliver-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/8-steps-to-migrate-your-siem-execution/</loc>
		<lastmod>2025-06-27T20:53:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-Steps-to-Migrate-Your-SIEM-Execution-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/2019/04/8-Steps-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/protecting-federal-agencies-from-insider-threats/</loc>
		<lastmod>2025-06-27T21:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Protecting-Federal-Agencies-from-Insider-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-logrhythm-siem-7-21-expanded-alarm-filtering-real-time-log-access-and-developer-tools/</loc>
		<lastmod>2025-07-01T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-logrhythm-siem-7-21-expanded-alarm-filtering-real-time-log-access-and-developer-tools-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-july-2025-smarter-faster-more-flexible-security-operations/</loc>
		<lastmod>2025-07-01T13:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-july-2025-smarter-faster-more-flexible-security-operations-6-agents-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-july-2025-smarter-faster-more-flexible-security-operations-Outcomes-Navigator-Exabeam-Nova-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-july-2025-smarter-faster-more-flexible-security-operation-Case-Triage-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-july-2025-smarter-faster-more-flexible-security-operation-Watchlist-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/why-this-time-might-be-differentcan-agentic-ai-deliver-on-its-promise-to-cisos/</loc>
		<lastmod>2025-07-01T13:24:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-this-time-might-be-differentcan-agentic-ai-deliver-on-its-promise-to-cisos-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/accelerate-threat-investigations-with-machine-learned-detection-and-ai-powered-assistance/</loc>
		<lastmod>2025-07-01T13:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-accelerate-threat-investigations-with-machine-learned-detection-and-ai-powered-assistance-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/closing-visibility-gaps-that-keep-cisos-up-at-night/</loc>
		<lastmod>2025-07-02T15:57:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-vs-rapid7-four-ways-to-compare-and-evaluate/</loc>
		<lastmod>2025-07-09T18:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-vs-Rapid7-Four-Ways-to-Compare-and-Evaluate-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-vs-microsoft-sentinel-five-ways-to-compare-and-evaluate/</loc>
		<lastmod>2025-07-14T18:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Ways-Exabeam-Delivers-Better-Security-Outcomes-Than-Microsoft-Sentinel-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/data-exfiltration-threats-and-prevention-techniques-you-should-know/</loc>
		<lastmod>2025-07-15T17:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Exfiltration-Threats-and-Prevention-Techniques-You-Should-Know-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-game-changing-benefits-of-cloud-native-siem/</loc>
		<lastmod>2025-07-15T18:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Game-Changing-Benefits-of-Cloud-Native-SIEM-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-threats-everything-you-need-to-know/</loc>
		<lastmod>2025-07-16T20:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Threats-Everything-you-Need-to-Know-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/zero-trust-architecture-best-practices-for-safer-networks/</loc>
		<lastmod>2025-07-17T20:10:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Zero-Trust-Architecture-Best-Practices-for-Safer-Networks-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/unpacking-recent-ransomware-campaigns-analysis-detection-strategies/</loc>
		<lastmod>2025-08-07T19:05:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-Basta-Note-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-Basta-Insults-Complaints-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-Basta-socks-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-InterLock-Tor-Site-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-Inter-Lock-Note-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-Black-Basta-deleting-shadow-copies-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-vss-event-log-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-vss-log-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-unpacking-recent-ransomware-campaigns-analysis-detection-strategies-alarm-email-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/security-operations-center-ultimate-soc-quick-start-guide/</loc>
		<lastmod>2025-08-22T21:14:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-Is-a-Security-Operations-Center-Complete-Guide-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Operations-Center-Ultimate-SOC-Quick-Start-Guide-inpage-01a-931x1024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/36-infosec-resources-you-might-have-missed-in-october/</loc>
		<lastmod>2025-08-22T22:31:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-36-InfoSec-Resources-You-Might-Have-Missed-in-October-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/29-infosec-resources-you-may-have-missed-in-april/</loc>
		<lastmod>2025-08-22T22:51:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-29-InfoSec-Resources-You-May-Have-Missed-in-April-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/enabling-ojk-regulatory-compliance-and-cyber-resilience-for-indonesias-banking-and-financial-sector-with-exabeam/</loc>
		<lastmod>2025-08-26T20:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-enabling-ojk-regulatory-compliance-and-cyber-resilience-for-indonesias-banking-and-financial-sector-with-exabeam-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-vs-splunk-six-ways-to-compare-and-evaluate/</loc>
		<lastmod>2025-08-26T21:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-6-Ways-Exabeam-Delivers-Better-Security-Outcomes-Than-Splunk-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Exabeam-vs-Splunk-Six-Ways-to-Compare-and-Evaluate-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-rise-of-ai-agents-a-new-insider-threat-you-cant-ignore/</loc>
		<lastmod>2025-09-04T18:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-rise-of-ai-agents-a-new-insider-threat-you-cant-ignore-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/college-grads-your-dream-job-could-be-in-cybersecurity/</loc>
		<lastmod>2025-09-05T20:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-College-Grads-Your-Dream-Job-Could-be-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/securing-the-future-of-work-agent-behavior-analytics-with-google-cloud/</loc>
		<lastmod>2025-09-09T19:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-the-future-of-work-agent-behavior-analytics-with-google-cloud-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/can-you-detect-intent-without-identity-securing-ai-agents-in-the-enterprise/</loc>
		<lastmod>2025-09-11T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-you-detect-intent-without-identity-securing-ai-agents-in-the-enterprise-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/auto-parser-generator-now-available-for-customers-updated/</loc>
		<lastmod>2025-09-11T21:22:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Auto-Parser-Generator-Now-Available-for-Customers-Updated-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Auto-Parser-Generator-Now-Available-for-Customers-inpage-01png-1024x572.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Auto-Parser-Generator-Now-Available-for-Customers-inpage-02png-1024x683.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Auto-Parser-Generator-Now-Available-for-Customers-inpage-03png-1024x596.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/what-is-dlp-data-loss-prevention-for-critical-business-information/</loc>
		<lastmod>2025-09-12T18:52:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-DLP-Data-Loss-Prevention-for-Critical-Business-Information-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/the-amazing-journey-continues/</loc>
		<lastmod>2025-09-12T19:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Amazing-Journey-Continues-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/top-3-skills-cybersecurity-project-managers-rely-on/</loc>
		<lastmod>2025-09-12T19:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-3-Skills-Cybersecurity-Project-Managers-Rely-On-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/national-cybersecurity-awareness-month-incident-response/</loc>
		<lastmod>2025-09-12T19:23:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-National-Cybersecurity-Awareness-Month-Incident-Response-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/turnkey-playbooks-now-available-for-exabeam-customers/</loc>
		<lastmod>2025-09-12T19:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Turnkey-Playbooks-Now-Available-for-Exabeam-Customers-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Turnkey-Playbooks-Now-Available-for-Exabeam-Customers-index-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/4-information-security-articles-from-the-week-of-march-28/</loc>
		<lastmod>2025-09-12T19:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-4-Information-Security-Articles-From-the-Week-of-March-28-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-cisos-roadmap-enhancing-detection-automation-and-empowerment-in-cybersecurity/</loc>
		<lastmod>2025-09-12T19:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-CISOs-Roadmap-Enhancing-Detection-Automation-and-Empowerment-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cyberseer-discovers-exposed-corporate-credentials-by-integrating-digital-shadows-intelligence-into-exabeam-managed-service-offering/</loc>
		<lastmod>2025-09-12T19:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyberseer-Discovers-Exposed-Corporate-Credentials-by-Integrating-Digital-Shadows-Intelligence-into-Exabeam-Managed-Service-Offering-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyberseer-Discovers-Exposed-Corporate-Credentials-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyberseer-Discovers-Exposed-Corporate-Credentials-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/developing-a-proactive-strategy-to-mitigate-insider-threats/</loc>
		<lastmod>2025-09-12T19:39:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Developing-a-Proactive-Strategy-to-Mitigate-Insider-Threats-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/evaluating-success-in-adversary-aligned-security-operations/</loc>
		<lastmod>2025-09-12T19:39:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Blog-Evaluating-Success-Adversary-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-july-4-2022/</loc>
		<lastmod>2025-09-12T19:40:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-July-4-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-june-13-2022/</loc>
		<lastmod>2025-09-12T19:40:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-June-13-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/exabeam-news-wrap-up-week-of-june-20-2022/</loc>
		<lastmod>2025-09-12T19:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-News-Wrap-up-Week-of-June-20-2022-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-signs-netflow-logic-as-a-preferred-partner/</loc>
		<lastmod>2025-09-12T19:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Signs-NetFlow-Logic-as-a-Preferred-Partner-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/four-key-components-of-a-strong-insider-threat-management-strategy/</loc>
		<lastmod>2025-09-12T19:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Four-Key-Components-of-a-Strong-Insider-Threat-Management-Strategy-freatured-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/revolution-or-evolution-the-old-origins-of-todays-new-ai/</loc>
		<lastmod>2025-09-12T19:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Revolution-or-Evolution-The-Old-Origins-of-Todays-New-AI-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Revolution-or-Evolution-The-Old-Origins-of-Todays-New-AI-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/security-operations-in-the-ai-era-opportunities-and-challenges/</loc>
		<lastmod>2025-09-12T19:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Operations-in-the-AI-Era-Opportunities-and-Challenges-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/stranger-than-science-fiction-the-future-of-ai-augmented-attacks/</loc>
		<lastmod>2025-09-12T19:49:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Revolution-or-Evolution-The-Old-Origins-of-Todays-New-AI-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Stranger-Than-Science-Fiction-The-Future-of-AI-Augmented-Attacks-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-foundation-of-defender-alignment-awareness-context-and-collaboration/</loc>
		<lastmod>2025-09-12T19:51:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Foundation-of-Defender-Alignment-Awareness-Context-and-Collaboration-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-path-to-defender-alignment-key-strategies-and-implementation/</loc>
		<lastmod>2025-09-12T19:51:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Path-to-Defender-Alignment-Key-Strategies-and-Implementation-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/unlocking-leadership-the-100th-episode-of-the-new-ciso-podcast/</loc>
		<lastmod>2025-09-12T19:54:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unlocking-Leadership-The-100th-Episode-of-The-New-CISO-Podcast-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/what-is-adversary-alignment/</loc>
		<lastmod>2025-09-12T19:54:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-Adversary-Alignment-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/generative-ai-and-top-honors-highlights-from-google-cloud-next-23/</loc>
		<lastmod>2025-09-12T21:19:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Generative-AI-and-Top-Honors-Highlights-from-Google-Cloud-Next-%E2%80%9823-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/simplify-security-operations-workflows-and-management/</loc>
		<lastmod>2025-09-12T21:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Simplify-Security-Operations-Workflows-and-Management-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Simplify-Security-Operations-Workflows-and-Management-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Simplify-Security-Operations-Workflows-and-Management-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-vs-qradar-four-ways-to-compare-and-evaluate/</loc>
		<lastmod>2025-09-12T21:26:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-4-Ways-Exabeam-Delivers-Better-Security-Outcomes-Than-IBM-QRadar-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-vs-sumo-logic-four-ways-to-compare-and-evaluate/</loc>
		<lastmod>2025-09-12T21:27:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-vs-Sumo-Logic-Four-Ways-to-Compare-and-Evaluate-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-results-are-inand-the-return-on-investment-is-clear/</loc>
		<lastmod>2025-09-12T21:27:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Results-Are-In-and-The-Return-on-Investment-Is-Clear-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Mining-inpage-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Chemical-inpage-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Retail-Manufacturing-inpage-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Holding-Company-inpage-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Electronics-inpage-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-TEI-Industry-Financial.-inpage-01.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-benefits-of-ueba-technology-with-industry-experts-at-the-helm/</loc>
		<lastmod>2025-09-12T21:32:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Benefits-of-UEBA-Technology-with-Industry-Experts-at-the-Helm-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/understanding-ueba-the-key-to-strengthening-your-cybersecurity-strategy/</loc>
		<lastmod>2025-09-12T21:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-The-Key-to-Strengthening-Your-Cybersecurity-Strategy-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/what-the-most-significant-government-collaboration-on-threat-detection-and-logging-got-right-and-wrong-and-what-you-should-know-about-it/</loc>
		<lastmod>2025-09-12T21:41:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-the-Most-Significant-Government-Collaboration-on-Threat-Detection-and-Logging-Got-Right-and-Wrong-and-What-You-Should-Know-About-It-socialshare-01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-investigate-a-dlp-alert-video-series/</loc>
		<lastmod>2025-09-12T21:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Investigate-a-DLP-Alert-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/traditional-security-cant-stop-lotl-attacks-exabeam-ueba-destroys-them/</loc>
		<lastmod>2025-09-12T21:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Traditional-Tecurity-Cant-Stop-LOTL-Attacks-Exabeam-UEBA-Destroys-Them-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-traditional-security-cant-stop-lotl-attacks-exabeam-ueba-destroys-them-index-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Traditional-Security-Cant-Stop-LOTL-Attacks-Outcomes-Navigator-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/what-is-an-ics-attack-and-how-to-defend-against-it/</loc>
		<lastmod>2025-09-12T21:44:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-ICS-Security-How-to-Defend-Against-Attacks-inpage-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/how-exabeam-helps-organizations-adapt-to-australias-privacy-reforms/</loc>
		<lastmod>2025-09-17T18:18:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Exabeam-Helps-Organizations-Adapt-to-Australias-Privacy-Reforms-SOCAILSHARE-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ueba-vs-xdr-rethinking-siem-augmentation-in-the-ai-era/</loc>
		<lastmod>2025-09-19T08:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ueba-vs-xdr-rethinking-siem-augmentation-in-the-ai-era-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ueba-vs-xdr-rethinking-siem-augmentation-in-the-ai-era-UEBAvsXDR-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/catching-the-quiet-threats-when-normal-isnt-safe/</loc>
		<lastmod>2025-09-25T14:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-a-glimpse-into-the-ultimate-guide-to-ueba-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-with-new-scale-in-october-2025-measurable-automated-everywhere-security-operations/</loc>
		<lastmod>2025-10-01T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-with-new-scale-in-october-2025-measurable-automated-everywhere-security-operations-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHATSNEW-Industry-Benchmarking-Outcomes-Navigator-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHATSNEW-Customizable-Risk-Ratings-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-logrhythm-siem-october-2025/</loc>
		<lastmod>2025-10-01T13:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-logrhythm-siem-october-2025-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/the-cost-of-compromise-begins-inside-the-soc/</loc>
		<lastmod>2025-10-07T18:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-cost-of-compromise-begins-inside-the-soc-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/how-financial-institutions-can-leverage-ueba-fdic-vacation-policy-use-case/</loc>
		<lastmod>2025-10-13T20:17:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Financial-Institutions-Can-Leverage-UEBA-FDIC-Vacation-Policy-Use-Case-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-financial-institutions-can-leverage-ueba-fdic-vacation-policy-use-case-FDIC-screenshot-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/exabeam-named-a-leader-for-the-sixth-time-in-the-2025-gartner-magic-quadrant-for-security-information-and-event-management-siem/</loc>
		<lastmod>2025-10-15T15:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-named-a-leader-for-the-sixth-time-in-the-2025-gartner-magic-quadrant-for-security-information-and-event-management-siem-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/my-first-week-as-ceo/</loc>
		<lastmod>2025-10-16T19:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-my-first-week-as-ceo-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/your-siem-rules-cant-keep-up-its-time-for-a-behavior-based-defense/</loc>
		<lastmod>2025-10-16T21:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-your-siem-rules-cant-keep-up-its-time-for-a-behavior-based-defense-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/why-rule-count-is-a-misleading-kpi-for-siem/</loc>
		<lastmod>2025-10-22T17:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-rule-count-is-a-misleading-kpi-for-siem-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/seeing-the-invisible-visualizing-and-protecting-ai-agent-activity-with-exabeam-google/</loc>
		<lastmod>2025-10-23T17:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-seeing-the-invisible-visualizing-and-protecting-ai-agent-activity-with-exabeam-google-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-seeing-the-invisible-visualizing-and-protecting-ai-agent-activity-with-exabeam-google-Exabeam-Solution-Brief-and-Google-Diagram-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/how-behavioural-analytics-strengthens-compliance-with-australias-protective-security-policy-framework-pspf/</loc>
		<lastmod>2025-10-24T19:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-behavioural-analytics-strengthens-compliance-with-australias-protective-security-policy-framework-pspf-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/data-loss-prevention-policy-template/</loc>
		<lastmod>2025-11-06T19:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Loss-Prevention-Policy-Template-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/security-breaches-what-you-need-to-know/</loc>
		<lastmod>2025-11-06T19:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Breaches-What-You-Need-to-Know-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/data-loss-prevention-tools/</loc>
		<lastmod>2025-11-06T19:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Data-Loss-Prevention-Tools-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/defending-against-ransomware-prevention-protection-removal/</loc>
		<lastmod>2025-11-06T19:43:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Defending-Against-Ransomware-Prevention-Protection-Removal-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-defending-against-ransomware-prevention-protection-removal-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-defending-against-ransomware-prevention-protection-removal-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-8-social-engineering-techniques-and-how-to-prevent-them/</loc>
		<lastmod>2025-11-06T19:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-8-Social-Engineering-Techniques-and-How-to-Prevent-Them-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/security-incidents-what-you-should-look-out-for/</loc>
		<lastmod>2025-11-06T19:44:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Incidents-Types-Tools-Examples-and-Prevention-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-8-threat-modeling-methodologies-and-techniques/</loc>
		<lastmod>2025-11-06T19:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Threat-Modeling-5-Steps-7-Techniques-and-Tips-for-Success-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cyber-crime-types-examples-and-what-your-business-can-do/</loc>
		<lastmod>2025-11-06T19:47:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyber-Crime-Types-Examples-and-What-Your-Business-Can-Do-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/soc-analyst-job-description-skills-and-5-key-responsibilities/</loc>
		<lastmod>2025-11-06T19:48:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SOC-Analyst-Job-Description-Skills-and-5-Key-Responsibilities-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/soc-processes-and-best-practices-in-a-devsecops-world/</loc>
		<lastmod>2025-11-06T19:49:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SOC-Processes-and-Best-Practices-in-a-DevSecOps-World-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-build-a-security-operations-center-for-small-companies/</loc>
		<lastmod>2025-11-06T19:50:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Build-a-Security-Operations-Center-for-Small-Companies-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-to-investigate-a-phishing-incident-video-series/</loc>
		<lastmod>2025-11-06T19:51:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Investigate-a-Phishing-Incident-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/a-machine-learning-study-on-phishing-url-detection/</loc>
		<lastmod>2025-11-06T19:51:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Machine-Learning-Study-on-Phishing-URL-Detection-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Machine-Learning-Study-on-Phishing-URL-Detection-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Machine-Learning-Study-on-Phishing-URL-Detection-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Machine-Learning-Study-on-Phishing-URL-Detection-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/threat-detection-and-response-how-to-stay-ahead-of-advanced-threats/</loc>
		<lastmod>2025-11-06T19:57:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Threat-Detection-and-Response-How-to-Stay-Ahead-of-Advanced-Threats-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-threat-detection-and-response-how-to-stay-ahead-of-advanced-threats-threat-hunter-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/incident-response-6-steps-technologies-and-tips/</loc>
		<lastmod>2025-11-06T23:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-6-Steps-Technologies-and-Tips-socialshare-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks/</loc>
		<lastmod>2025-11-06T23:10:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-IPS-Security-How-Active-Security-Saves-Time-and-Stops-Attacks-in-their-Tracks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-ips_security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-cisco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-ibm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-McAfee.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-radware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ips-security-how-active-security-saves-time-and-stops-attacks-in-their-tracks-trendmicro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/incident-response-plan-101-the-6-phases-templates-and-examples/</loc>
		<lastmod>2025-11-06T23:12:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Plan-101-The-6-Phases-Templates-and-Examples-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Incident-Response-Plan-101-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/10-best-practices-for-creating-an-effective-computer-security-incident-response-team-csirt/</loc>
		<lastmod>2025-11-06T23:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-10-Best-Practices-for-Creating-an-Effective-Computer-Security-Incident-Response-Team-CSIRT-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/it-security-what-you-should-know/</loc>
		<lastmod>2025-11-06T23:43:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-IT-Security-What-You-Should-Know-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-IT-Security-What-You-Should-Know-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/penetration-testing-process-and-tools/</loc>
		<lastmod>2025-11-06T23:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Penetration-Testing-Process-and-Tools-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-penetration-testing-process-and-tools-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-penetration-testing-process-and-tools-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-penetration-testing-process-and-tools-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-penetration-testing-process-and-tools-inpage-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/machine-learning-for-cybersecurity-next-gen-protection-against-cyber-threats/</loc>
		<lastmod>2025-11-06T23:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Machine-Learning-for-Cybersecurity-Next-Gen-Protection-Against-Cyber-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ethical-hacking-why-its-important-what-makes-a-good-hacker/</loc>
		<lastmod>2025-11-06T23:50:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ethical-Hacking-Why-Its-Important-and-What-Makes-a-Good-Hacker-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/what-is-security-analytics/</loc>
		<lastmod>2025-11-07T00:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-Security-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/behavioral-profiling-the-foundation-of-modern-security-analytics/</loc>
		<lastmod>2025-11-07T00:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Behavioral-Profiling-The-Foundation-of-Modern-Security-Analytics-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/what-is-phishing-5-signs-of-a-phishing-email/</loc>
		<lastmod>2025-11-07T00:22:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-is-Phishing-5-Signs-of-a-Phishing-Email-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/political-campaigns-and-phishing-five-things-campaign-staff-can-do-to-stay-safe/</loc>
		<lastmod>2025-11-07T00:24:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Political-Campaigns-and-Phishing-Five-Things-Campaign-Staff-Can-Do-to-Stay-Safe-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/securing-your-remote-workforce-part-1-detecting-phishing-scams-disguised-as-updates/</loc>
		<lastmod>2025-11-07T00:25:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Securing-Your-Remote-Workforce-Part-1-Detecting-Phishing-Scams-Disguised-as-Updates-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-1-detecting-phishing-scams-disguised-as-updates-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-1-detecting-phishing-scams-disguised-as-updates-phishing-alert-inpage-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-integrating-case-management-with-ueba-streamlines-analyst-workflows/</loc>
		<lastmod>2025-11-07T16:57:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Integrating-Case-Management-with-UEBA-Streamlines-Analyst-Workflows-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Integrating-Case-Management-with-UEBA-Streamlines-Analyst-Workflows-Case-Manager1-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Integrating-Case-Management-with-UEBA-Streamlines-Analyst-Workflows-Case-Manager2-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Integrating-Case-Management-with-UEBA-Streamlines-Analyst-Workflows-Case-Manager3-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Integrating-Case-Management-with-UEBA-Streamlines-Analyst-Workflows-Case-Manager4-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/understanding-the-role-of-artificial-intelligence-machine-learning-and-deep-learning-in-cybersecurity/</loc>
		<lastmod>2025-11-07T18:05:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-the-Role-of-Artificial-Intelligence-Machine-Learning-and-Deep-Learning-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-the-Role-of-Artificial-Intelligence-Machine-Learning-and-Deep-Learning-in-Cybersecurity-ai-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-the-Role-of-Artificial-Intelligence-Machine-Learning-and-Deep-Learning-in-Cybersecurity-Xbm_Diagram-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-to-use-exabeams-natural-language-correlation-rule-builder/</loc>
		<lastmod>2025-11-07T18:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_1-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_2-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_3-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_4-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_5-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_6-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_7-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_8-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeams-Natural-Language-Correlation-Rule-Builder-cr_9-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/staffing-budget-among-top-challenges-socs-face-in-2019-infographic/</loc>
		<lastmod>2025-11-07T19:05:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Staffing-Budget-Among-Top-Challenges-SOCs-Face-in-2019-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Staffing-Budget-Among-Top-Challenges-SOCs-Face-in-2019-Exabeam-SOC-R1.4-hiring-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Staffing-Budget-Among-Top-Challenges-SOCs-Face-in-2019-Exabeam-SOC-R1.4-technology-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Staffing-Budget-Among-Top-Challenges-SOCs-Face-in-2019-Exabeam-SOC-R1.4-operations-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Staffing-Budget-Among-Top-Challenges-SOCs-Face-in-2019-Exabeam-SOC-R1.4-investment-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/what-are-you-worth-the-exabeam-security-professionals-salary-job-satisfaction-and-technology-outlook-report/</loc>
		<lastmod>2025-11-07T19:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-are-you-worth-The-Exabeam-Security-Professionals-Salary-Job-Satisfaction-and-Technology-Outlook-Report-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-are-you-worth-The-Exabeam-Security-Professionals-Salary-Job-Satisfaction-and-Technology-Outlook-Report-Salary-1-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-are-you-worth-The-Exabeam-Security-Professionals-Salary-Job-Satisfaction-and-Technology-Outlook-Report-Salary-2-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-are-you-worth-The-Exabeam-Security-Professionals-Salary-Job-Satisfaction-and-Technology-Outlook-Report-Salary-3-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-are-you-worth-The-Exabeam-Security-Professionals-Salary-Job-Satisfaction-and-Technology-Outlook-Report-Salary-4-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-advanced-analytics-tips-targeted-search-and-tuning-rules/</loc>
		<lastmod>2025-11-07T19:18:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Advanced-Analytics-Tips-Targeted-Search-and-Tuning-Rules-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Advanced-Analytics-Tips-Targeted-Search-and-Tuning-Rules-Advanced-Analytics-Tips-1-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Advanced-Analytics-Tips-Targeted-Search-and-Tuning-Rules-Advanced-Analytics-Tips-2-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Advanced-Analytics-Tips-Targeted-Search-and-Tuning-Rules-Advanced-Analytics-Tips-3-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Advanced-Analytics-Tips-Targeted-Search-and-Tuning-Rules-Advanced-Analytics-Tips-3-INLINE-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-cloud-platform-a-new-architecture-for-a-next-era-in-siem/</loc>
		<lastmod>2025-11-07T19:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Cloud-Platform-A-New-Architecture-for-a-Next-Era-in-SIEM-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Cloud-Platform-A-New-Architecture-for-a-Next-Era-in-SIEM-Exabeam-Security-Management-Platform-INLINE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Cloud-Platform-A-New-Architecture-for-a-Next-Era-in-SIEM-Exabeam-Security-Management-Platform-INLINE-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/shadow-mining-and-cryptojacking-two-commonly-undetected-security-threats-survey/</loc>
		<lastmod>2025-11-07T19:34:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shadow-Mining-and-Cryptojacking-Two-Commonly-Undetected-Security-Threats-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shadow-Mining-and-Cryptojacking-Two-Commonly-Undetected-Security-ThreatsShadow-Mining-Suvery_1-INLINE-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shadow-Mining-and-Cryptojacking-Two-Commonly-Undetected-Security-ThreatsShadow-Mining-Suvery_2-INLINE-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shadow-Mining-and-Cryptojacking-Two-Commonly-Undetected-Security-ThreatsShadow-Mining-Suvery_3-INLINE-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Shadow-Mining-and-Cryptojacking-Two-Commonly-Undetected-Security-ThreatsShadow-Mining-Suvery_5-INLINE-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/using-advanced-analytics-to-detect-and-stop-threats/</loc>
		<lastmod>2025-11-07T19:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Using-Advanced-Analytics-to-Detect-and-Stop-Threats-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Using-Advanced-Analytics-to-Detect-and-Stop-Threats-Pyramid-of-Pain-INLINE-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/bring-your-own-siem-upgrade-detection-and-response-with-new-scale-analytics/</loc>
		<lastmod>2025-11-07T20:33:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-bring-your-own-siem-upgrade-detection-and-response-with-new-scale-analytics-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-bring-your-own-siem-upgrade-detection-and-response-with-new-scale-analytics-threat-timeline-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/why-your-threat-hunting-program-might-be-failing/</loc>
		<lastmod>2025-11-07T20:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-your-threat-hunting-program-might-be-failing-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-your-threat-hunting-program-might-be-failing-Outcomes-Navigator-Ransomware-use-case-details-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-your-threat-hunting-program-might-be-failing-Agentic-AI-Outcomes-Navigator-Use-Case-Coverage-Entire-Summary-Displayed-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/understand-your-detection-gaps-and-how-to-close-them/</loc>
		<lastmod>2025-11-07T22:16:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-understand-your-detection-gaps-and-how-to-close-them-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Showing-the-Value-of-Exabeam-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Showing-the-Value-of-Exabeam-inpage-02a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/10-questions-security-operations-managers-should-ask-about-cloud-siem-vendors/</loc>
		<lastmod>2025-11-07T22:17:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-10-questions-security-operations-managers-should-ask-about-cloud-siem-vendors-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/why-traditional-ai-isnt-enough-and-what-cisos-need-now/</loc>
		<lastmod>2025-11-07T22:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-why-traditional-ai-isnt-enoughand-what-cisos-need-now-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/from-reactive-to-strategic-why-ai-agents-will-transform-tdir/</loc>
		<lastmod>2025-11-07T22:46:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-from-reactive-to-strategic-why-ai-agents-will-transform-tdir-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-from-reactive-to-strategic-why-ai-agents-will-transform-tdir-advisor-agent-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-ciso-as-strategist-how-ai-agents-help-prove-the-value-of-the-soc/</loc>
		<lastmod>2025-11-07T22:47:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-ciso-as-strategist-how-ai-agents-help-prove-the-value-of-the-soc-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/making-the-switch-a-step-by-step-guide-to-migrating-from-on-premises-to-cloud-native-siem/</loc>
		<lastmod>2025-11-12T20:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Making-the-Switch-A-Step-by-Step-Guide-to-Migrating-from-On-premises-to-Cloud-native-SIEM-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-missing-memory-in-your-security-stack-how-attackers-exploit-stateless-systems/</loc>
		<lastmod>2025-11-12T20:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-the-missing-memory-in-your-security-stack-how-attackers-exploit-stateless-systems-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/finding-the-perfect-fit-hosting-models-for-cloud-native-siem-solutions/</loc>
		<lastmod>2025-11-13T19:09:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Finding-the-Perfect-Fit-Hosting-Models-for-Cloud-native-SIEM-Solutions-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/embracing-the-future-of-security-with-cloud-native-siem/</loc>
		<lastmod>2025-11-13T19:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Embracing-the-Future-of-Security-With-Cloud-native-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/six-advanced-cloud-native-siem-use-cases/</loc>
		<lastmod>2025-11-13T19:22:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Six-Advanced-Cloud-native-SIEM-Use-Cases-socialshare-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/legacy-vs-cloud-native-siem-weighing-the-pros-and-cons/</loc>
		<lastmod>2025-11-13T19:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Legacy-vs-Cloud-native-SIEM-Weighing-the-Pros-and-Cons-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/anomaly-search-and-advanced-analytics-threat-hunting-for-everyone/</loc>
		<lastmod>2025-11-20T18:21:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anomaly-Search-and-Advanced-Analytics-Threat-Hunting-for-Everyone-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anomaly-Search-and-Advanced-Analytics-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anomaly-Search-and-Advanced-Analytics-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anomaly-Search-and-Advanced-Analytics-inpage-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/quantum-threats-to-machine-learning-the-next-security-reckoning/</loc>
		<lastmod>2025-12-30T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-logrhythm-siem-january-2026/</loc>
		<lastmod>2026-01-06T14:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-logrhythm-siem-january-2026-AIE-Events-on-Data-Indexer-Dashboards-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-logrhythm-siem-january-2026-Threat-Map-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-logrhythm-siem-january-2026-JSON-Policy-Builder-Web-Tool-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-new-scale-january-2026-ai-agent-security-is-here/</loc>
		<lastmod>2026-01-06T14:05:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-new-scale-january-2026-ai-agent-security-is-here-ai-agents-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-new-scale-january-2026-ai-agent-security-is-here-end-AI-agent-security-framework-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/model-context-protocol-server-the-universal-remote-for-ai-agents/</loc>
		<lastmod>2026-01-06T18:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/decoding-the-2025-mitre-attck-evals-a-call-for-clarity-and-a-guide-for-analysts/</loc>
		<lastmod>2026-01-13T20:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-decoding-the-2025-mitre-attck-evals-a-call-for-clarity-and-a-guide-for-analysts-Rorschach-test-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-decoding-the-2025-mitre-attck-evals-a-call-for-clarity-and-a-guide-for-analysts-MITRE-ATTACK-participants-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-decoding-the-2025-mitre-attck-evals-a-call-for-clarity-and-a-guide-for-analysts-Exabeam-Nova-Outcomes-Navigator-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/the-complete-guide-to-csirt-organization-how-to-build-an-incident-response-team/</loc>
		<lastmod>2026-01-14T00:14:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Complete-Guide-to-CSIRT-Organization-How-to-Build-an-Incident-Response-Team-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Complete-Guide-to-CSIRT-Organization-inpage-01-1024x203-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Complete-Guide-to-CSIRT-Organization-inpage-02-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Complete-Guide-to-CSIRT-Organization-inpage-03-1024x343-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Complete-Guide-to-CSIRT-Organization-inpage-04-1024x638.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-agent-behavior-analytics-first-of-its-kind-behavioral-detections-for-ai-agents/</loc>
		<lastmod>2026-02-10T20:01:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-agent-behavior-analytics-first-of-its-kind-behavioral-detections-for-ai-agents-outcomes-navigator-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ai-agents-are-the-new-detection-problem-nobody-designed-for/</loc>
		<lastmod>2026-02-13T19:22:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ai-access-without-add-ons-or-limits/</loc>
		<lastmod>2026-03-06T18:04:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ai-access-without-add-ons-or-limits-github-copilot-pro-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ai-access-without-add-ons-or-limits-exabeam-nova-investigation-agent-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/can-your-siem-do-this-most-cant-heres-why/</loc>
		<lastmod>2026-03-09T22:42:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-Dynamic-Risk-Scoring-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-OAS-Standard-API-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-Next-Steps-Exabeam-Nova-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-NLP-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-can-your-siem-do-this-most-cant-heres-why-Outcomes-Navigator-Nova-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-dont-be-afraid-to-break-things/</loc>
		<lastmod>2026-03-09T23:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Dont-Be-Afraid-to-Break-Things-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-67-Dont-Be-Afraid-to-Break-Things-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/planning-before-the-breach/</loc>
		<lastmod>2026-03-09T23:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Planning-Before-the-Breach-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/introducing-exabeam-siem-a-hyperscale-cloud-native-siem/</loc>
		<lastmod>2026-03-09T23:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Exabeam-SIEM-A-Hyperscale-Cloud-native-SIEM-inpage-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-3-Critical-Success-Factors-for-Choosing-Your-New-SIEM-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/the-4-steps-to-a-phishing-investigation/</loc>
		<lastmod>2026-03-10T00:03:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-4-Steps-to-a-Phishing-Investigation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-4-Steps-to-a-Phishing-Investigation-inpage-01-1024x658.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Phishing-Guide-to-Mitigating-Attacks-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-awareness-month-time-to-recalibrate-and-prioritize-security/</loc>
		<lastmod>2026-03-10T00:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Awareness-Month-Time-to-Recalibrate-and-Prioritize-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Phishing-Guide-to-Mitigating-Attacks-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/crypto-mining-a-potential-insider-threat-hidden-in-your-network/</loc>
		<lastmod>2026-03-10T00:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Crypto-Mining-A-Potential-Insider-Threat-Hidden-In-Your-Network-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-crypto-mining-a-potential-insider-threat-hidden-in-your-network-cryptocurrency-blockchain-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era/</loc>
		<lastmod>2026-03-10T00:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Disruptive-Transformation-What-Caterpillars-Can-Teach-Us-about-Cybersecurity-in-the-Pandemic-Era-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era-four-phases-of-disruption-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era-catterpillar-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era-cocoon-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era-pupa-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disruptive-transformation-what-caterpillars-can-teach-us-about-cybersecurity-in-the-pandemic-era-butterfly-lifecycle-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/generative-ai-is-reshaping-cybersecurity-is-your-organization-prepared/</loc>
		<lastmod>2026-03-10T00:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Generative-AI-is-Reshaping-Cybersecurity.-Is-Your-Organization-Prepared-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BRIEF-What-Comes-Next-for-Your-AI-Cybersecurity-Strategy-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/privilege-escalation-detection-the-key-to-preventing-advanced-attacks/</loc>
		<lastmod>2026-03-10T16:46:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Privilege-Escalation-Detection-The-Key-to-Preventing-Advanced-Attacks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-privilege-escalation-detection-the-key-to-preventing-advanced-attacks-lateral-movement-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/drive-by-downloads-what-they-are-and-how-to-avoid-them/</loc>
		<lastmod>2026-03-10T16:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Drive-By-Downloads-What-They-Are-and-How-to-Avoid-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-drive-by-downloads-what-they-are-and-how-to-avoid-them-drive-by-download-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-lineas-europes-largest-private-rail-freight-operator-found-the-right-cybersecurity-tool/</loc>
		<lastmod>2026-03-10T16:53:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Lineas-Europes-Largest-Private-Rail-Freight-Operator-Found-the-Right-Cybersecurity-Tool-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/defending-against-ransomware-how-exabeam-strengthens-cybersecurity/</loc>
		<lastmod>2026-03-10T16:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Defending-Against-Ransomware-How-Exabeam-Strengthens-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-Using-a-Layered-Approach-to-Improve-Ransomware-Detection-and-Response-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/ransomware-bigger-better-and-still-going-strong/</loc>
		<lastmod>2026-03-10T17:03:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Bigger-Better-and-Still-Going-Strong-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Bigger-Better-and-Still-Going-Strong-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-Using-a-Layered-Approach-to-Improve-Ransomware-Detection-and-Response-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-what-and-how-of-evaluating-ueba-under-the-hood/</loc>
		<lastmod>2026-03-10T17:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-What-and-How-of-Evaluating-UEBA-Under-the-Hood-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-What-and-How-of-Evaluating-UEBA-Under-the-Hood-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/understanding-ueba-from-scored-events-to-stories/</loc>
		<lastmod>2026-03-10T17:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-From-Scored-Events-to-Stories-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-From-Scored-Events-to-Stories-inpage-01a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-From-Scored-Events-to-Stories-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/understanding-ueba-from-raw-events-to-scored-events/</loc>
		<lastmod>2026-03-10T17:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-From-Raw-Events-to-Scored-Events-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-UEBA-From-Raw-Events-to-Scored-Events-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/building-a-ueba-risk-engine/</loc>
		<lastmod>2026-03-10T17:16:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Building-a-UEBA-Risk-Engine-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Building-a-UEBA-Risk-Engine-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Building-a-UEBA-Risk-Engine-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/a-crash-course-on-security-analytics-and-how-to-spot-fake-ueba-from-a-mile-away/</loc>
		<lastmod>2026-03-10T17:20:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Crash-Course-on-Security-Analytics-And-How-to-Spot-Fake-UEBA-From-a-Mile-Away-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Crash-Course-on-Security-Analytics-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Crash-Course-on-Security-Analytics-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Crash-Course-on-Security-Analytics-inpage-02a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/how-does-exabeam-improve-your-security-environment/</loc>
		<lastmod>2026-03-10T17:23:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Does-Exabeam-Improve-Your-Security-Environment-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Does-Exabeam-Improve-Your-Security-Environment-inpage-01a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-invest-in-your-team/</loc>
		<lastmod>2026-03-10T17:25:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Invest-in-Your-Team-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-66-Investing-in-Your-Security-Team-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/anomalous-user-activity-detection-in-enterprise-multi-source-logs/</loc>
		<lastmod>2026-03-10T17:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Anomalous-User-Activity-Detection-in-Enterprise-Multi-Source-Logs-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-figure1-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-table-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-formula1-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-figure2-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-table2-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-anomalous-user-activity-detection-in-enterprise-multi-source-logs-table3-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ransomware-prevent-detect-and-respond/</loc>
		<lastmod>2026-03-10T17:55:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Prevent-Detect-and-Respond-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Prevent-Detect-and-Respond-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/6-incident-response-steps-what-to-do-when-under-attack/</loc>
		<lastmod>2026-03-10T18:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-6-Incident-Response-Steps-What-to-Do-When-Under-Attack-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-6-Incident-Response-Steps-What-to-When-Under-Attack-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-2020-cybersecurity-survey-reveals-job-satisfaction-despite-stress-and-opportunities-for-change/</loc>
		<lastmod>2026-03-10T18:17:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-2020-Cybersecurity-Survey-Reveals-Job-Satisfaction-Despite-Stress-and-Opportunities-for-Change-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-cybersecurity-survey-reveals-job-satisfaction-despite-stress-and-opportunities-for-change-salary-satisfaction-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-cybersecurity-survey-reveals-job-satisfaction-despite-stress-and-opportunities-for-change-continuing-education-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-cybersecurity-survey-reveals-job-satisfaction-despite-stress-and-opportunities-for-change-ai-ml-threat-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/introducing-threat-detection-investigation-and-response-tdir-for-public-cloud/</loc>
		<lastmod>2026-03-10T18:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Threat-Detection-Investigation-and-Response-TDIR-for-Public-Cloud-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-Threat-Detection-Investigation-and-Response-TDIR-for-Public-Cloud-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-Insider-Risk-Management-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-cybersecurity-trends-and-practices/</loc>
		<lastmod>2026-03-10T18:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Cybersecurity-Trends-and-Practices-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-65-Cybersecurity-Trends-and-Practices-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/practice-what-you-preach-an-introspective-on-building-custom-and-comprehensive-visibility-and-security-enforcement-for-generative-ai/</loc>
		<lastmod>2026-03-10T18:32:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-socialshare-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Practice-What-You-Preach-inpage-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-CISOs-Guide-to-the-AI-Opportunity-in-Security-Operations-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-promises-and-perils-of-ai-in-cybersecurity/</loc>
		<lastmod>2026-03-10T18:35:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Promises-and-Perils-of-AI-in-Cybersecurity-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-CISOs-Guide-to-the-AI-Opportunity-in-Security-Operations-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-trailblazer-suid-adeyanjus-journey-from-analyst-to-ciso/</loc>
		<lastmod>2026-03-10T18:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Trailblazer-Suid-Adeyanjus-Journey-from-Analyst-to-CISO-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Podcast-Security-Engineer-to-CEO-Taking-a-Chance-on-Yourself-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ai-has-arrived-how-does-it-impact-it-and-security/</loc>
		<lastmod>2026-03-10T18:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-AI-has-Arrived-How-Does-it-Impact-IT-and-Security-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-What-is-the-Future-of-AI-in-IT-and-Security-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic/</loc>
		<lastmod>2026-03-10T18:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Survey-Highlights-Negative-Impact-of-the-COVID-19-Pandemic-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q5-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q6-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q7-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q8-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q9-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q10-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-survey-highlights-negative-impact-of-the-covid-19-pandemic-EXA-CovidResearch-Q12-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-eternal-learner-tackling-insider-threats-and-ai-enhanced-phishing/</loc>
		<lastmod>2026-03-10T19:05:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Eternal-Learner-Tackling-Insider-Threats-and-AI-enhanced-Phishing-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-ABCs-of-Threat-Actors-How-to-Stop-Attackers-From-Becoming-Insiders-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/securing-your-remote-workforce-part-2-detecting-unusual-vpn-access-and-best-practices-to-secure-vpn-services/</loc>
		<lastmod>2026-03-10T19:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Securing-Your-Remote-Workforce-Part-2-Detecting-Unusual-VPN-Access-and-Best-Practices-to-Secure-VPN-Services-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-2-detecting-unusual-vpn-access-and-best-practices-to-secure-vpn-services-VPN-figure-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-2-detecting-unusual-vpn-access-and-best-practices-to-secure-vpn-services-VPN-figure-2-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-2-detecting-unusual-vpn-access-and-best-practices-to-secure-vpn-services-VPN-figure-3-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/siem-rules-or-models-for-threat-detection/</loc>
		<lastmod>2026-03-10T19:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-SIEM-Rules-or-Models-for-Threat-Detection-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-siem-rules-or-models-for-threat-detection-SIEM-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/next-gen-ueba-for-reduced-complexity-and-better-accuracy/</loc>
		<lastmod>2026-03-10T19:19:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Next-Gen-UEBA-for-Reduced-Complexity-and-Better-Accuracy-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Next-Gen-UEBA-for-Reduced-Complexity-and-Better-Accuracy-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/unlocking-the-power-of-siem-simplify-security-investigations-and-enhance-detection-with-exabeam/</loc>
		<lastmod>2026-03-10T19:23:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unlocking-the-Power-of-SIEM-Simplify-Security-Investigations-and-Enhance-Detection-with-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Not-all-SIEMs-are-Created-Equal-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-security-investigation-now-includes-seven-days-of-search/</loc>
		<lastmod>2026-03-10T19:29:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Security-Investigation-Now-Includes-Seven-Days-of-Search-socialshare-01.pngpng-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-Not-all-SIEMs-are-Created-Equal-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/sharpening-first-time-access-alerts-for-insider-threat-detection/</loc>
		<lastmod>2026-03-10T19:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Sharpening-First-Time-Access-Alerts-for-Insider-Threat-Detection-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Sharpening-First-Time-Access-Alerts-for-Insider-Threat-Detection-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/using-deep-learning-to-reduce-the-security-risks-of-unmanaged-devices/</loc>
		<lastmod>2026-03-10T19:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Using-Deep-Learning-to-Reduce-the-Security-Risks-of-Unmanaged-Devices-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-using-deep-learning-to-reduce-the-security-risks-of-unmanaged-devices-Deep-learning1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-using-deep-learning-to-reduce-the-security-risks-of-unmanaged-devices-Deep-learning2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-new-ciso-podcast-building-the-right-relationships/</loc>
		<lastmod>2026-03-10T19:35:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-New-CISO-Podcast-Building-The-Right-Relationships-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-68-Building-The-Right-Relationships-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/securing-your-remote-workforce-part-5-helping-your-end-users-stay-protected/</loc>
		<lastmod>2026-03-10T20:28:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Securing-Your-Remote-Workforce-Part-5-Helping-Your-End-Users-Stay-Protected-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-5-helping-your-end-users-stay-protected-User-Risk-Trend-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-5-helping-your-end-users-stay-protected-Risk-Reasons-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-5-helping-your-end-users-stay-protected-User-Risk-Trend-2-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/security-automation-is-real-science-fiction-is-not/</loc>
		<lastmod>2026-03-10T20:35:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Automation-is-Real-Science-Fiction-is-Not-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Automation-is-Real-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Security-Automation-is-Real-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-SOC-Managers-Guide-to-New-Efficiencies-Automating-the-Full-Threat-Detection-and-Response-Workflow-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/exabeam-alert-triage-with-dynamic-alert-prioritization-now-available-in-exabeam-fusion-and-exabeam-security-investigation/</loc>
		<lastmod>2026-03-10T20:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Alert-Triage-with-Dynamic-Alert-Prioritization-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Dynamic-Alert-Prioritization-Now-Available-in-Exabeam-Alert-Triage-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-SOC-Managers-Guide-to-New-Efficiencies-Automating-the-Full-Threat-Detection-and-Response-Workflow-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/detecting-lateral-movement-and-credential-switching-human-vs-machine/</loc>
		<lastmod>2026-03-10T20:52:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Detecting-Lateral-Movement-and-Credential-Switching-Human-vs-Machine-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Lateral-movement-credential-switching-1-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Lateral-movement-credential-switching-2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Splunk-query-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Lateral-movement-credential-switching-3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Lateral-movement-credential-switching-4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-detecting-lateral-movement-and-credential-switching-human-vs-machine-Lateral-movement-credential-switching-5-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/from-unassuming-beginnings-to-ciso-excellence-a-journey-with-andrew-wilder/</loc>
		<lastmod>2026-03-10T21:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-From-Unassuming-Beginnings-to-CISO-Excellence-A-Journey-with-Andrew-Wilder-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-70-20-10-Rule-Steps-You-Can-Take-for-Professional-Growth-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-asset-clustering-provides-improved-alert-quality-a-machine-learning-application/</loc>
		<lastmod>2026-03-10T21:08:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Asset-Clustering-Provides-Improved-Alert-Quality-A-Machine-Learning-Application-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-asset-clustering-provides-improved-alert-quality-a-machine-learning-application-asset-clustering-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/machine-learning-sdk-for-security-analytics/</loc>
		<lastmod>2026-03-10T21:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Machine-Learning-SDK-for-Security-Analytics-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-machine-learning-sdk-for-security-analytics-Exabeam-ML-SDK-architecture-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-survey-prevention-prioritized-over-detection-while-breaches-rise/</loc>
		<lastmod>2026-03-10T21:15:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Survey-Prevention-Prioritized-Over-Detection-While-Breaches-Rise-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/4-requirements-for-building-a-successful-insider-threat-team/</loc>
		<lastmod>2026-03-10T21:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-4-Requirements-for-Building-a-Successful-Insider-Threat-Team-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/how-to-quickly-deploy-an-effective-incident-response-policy/</loc>
		<lastmod>2026-03-10T21:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Quickly-Deploy-an-Effective-Incident-Response-Policy-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-quickly-deploy-an-effective-incident-response-policy-Incident-Response-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/exposing-malicious-insider-threats-the-advantages-of-using-a-behavior-based-approach/</loc>
		<lastmod>2026-03-10T21:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-Outcome-based-Approach-to-Use-Cases-Solving-for-Lateral-Movement-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exposing-Malicious-Insider-Threats-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exposing-Malicious-Insider-Threats-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exposing-Malicious-Insider-Threats-inpage-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exposing-Malicious-Insider-Threats-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-adds-automated-incident-diagnosis-to-speed-investigations/</loc>
		<lastmod>2026-03-10T21:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-inpage-01-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-inpage-02-1024x256.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-inpage-03-1024x460.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-inpage-03a-1024x974.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Adds-Automated-Incident-Diagnosis-to-Speed-Investigations-inpage-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/what-you-dont-know-can-hurt-you-how-to-use-ai-responsibly/</loc>
		<lastmod>2026-03-10T21:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-What-You-Dont-Know-Can-Hurt-You-How-to-Use-AI-Responsibly-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-CISOs-Guide-to-the-AI-Opportunity-in-Security-Operations-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/6-key-things-to-do-when-building-a-modern-soc/</loc>
		<lastmod>2026-03-10T21:42:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-6-Key-Things-to-Do-When-Building-a-Modern-SOC-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-6-key-things-to-do-when-building-a-modern-soc-Exabeam-Spotlight-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/securing-your-remote-workforce-part-4-how-to-detect-fraudulent-logins-and-policy-violations-using-ueba/</loc>
		<lastmod>2026-03-11T16:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Securing-Your-Remote-Workforce-Part-4-How-to-Detect-Fraudulent-Logins-and-Policy-Violations-Using-UEBA-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-4-how-to-detect-fraudulent-logins-and-policy-violations-using-ueba-Fraudulent-logins-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-securing-your-remote-workforce-part-4-how-to-detect-fraudulent-logins-and-policy-violations-using-ueba-Fraudulent-logins-2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/introducing-the-new-exabeam-security-operations-platform/</loc>
		<lastmod>2026-03-11T17:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Introducing-the-New-Exabeam-Security-Operations-Platform-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-new-approach-for-security-operations-New-Scale-SIEM-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical/</loc>
		<lastmod>2026-03-11T17:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Stop-Destroying-Evidence-Why-Understanding-the-Entire-Attack-Chain-Before-Responding-is-Critical-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-5-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-6-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-7-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-stop-destroying-evidence-why-understanding-the-entire-attack-chain-before-responding-is-critical-SDE-8-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-ransomwares-new-breed-of-data-kidnappers-are-taking-down-global-enterprises-and-even-governments/</loc>
		<lastmod>2026-03-11T17:24:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Ransomwares-New-Breed-of-Data-Kidnappers-Are-Taking-Down-Global-Enterprises-and-Even-Governments-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Prevent-Detect-and-Respond-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-ransomwares-new-breed-of-data-kidnappers-are-taking-down-global-enterprises-and-even-governments-Kill-Chain-phase-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-ransomwares-new-breed-of-data-kidnappers-are-taking-down-global-enterprises-and-even-governments-risk-reasons-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-ransomwares-new-breed-of-data-kidnappers-are-taking-down-global-enterprises-and-even-governments-malicious-domain-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/hitting-refresh-on-federal-cybersecurity-in-2021/</loc>
		<lastmod>2026-03-11T17:25:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Hitting-Refresh-on-Federal-Cybersecurity-in-2021-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/mitigating-risk-how-the-financial-services-sector-is-handling-todays-cybersecurity-challenges/</loc>
		<lastmod>2026-03-11T17:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Mitigating-Risk-How-the-Financial-Services-Sector-Is-Handling-Todays-Cybersecurity-Challenges-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BRIEF-Financial-Services-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/using-modern-threat-hunting-for-a-more-effective-investigation-of-cyber-threats/</loc>
		<lastmod>2026-03-11T17:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Using-Modern-Threat-Hunting-for-a-More-Effective-Investigation-of-Cyber-Threats-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-using-modern-threat-hunting-for-a-more-effective-investigation-of-cyber-threats-Threat-Hunting1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-using-modern-threat-hunting-for-a-more-effective-investigation-of-cyber-threats-ThreatHunting2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-using-modern-threat-hunting-for-a-more-effective-investigation-of-cyber-threats-ThreatHunting3-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/exabeam-commences-irap-assessment-process-for-new-scale-siem/</loc>
		<lastmod>2026-03-11T17:46:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Commences-IRAP-Assessment-Process-for-New-Scale-SIEM-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Cloud-native-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/open-xdr-versus-native-xdr/</loc>
		<lastmod>2026-03-11T17:50:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Open-XDR-versus-Native-XDR-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-open-xdr-versus-native-xdr-XDR-1-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/escaping-dantes-soc-inferno-greed-and-the-gimme-mindset/</loc>
		<lastmod>2026-03-11T17:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-Greed-and-the-Gimme-Mindset-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/how-ueba-could-have-detected-the-solarwinds-breach/</loc>
		<lastmod>2026-03-11T19:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-UEBA-Could-Have-Detected-the-SolarWinds-Breach-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-ueba-could-have-detected-the-solarwinds-breach-Exabeam-UEBA-inpage-01.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-to-use-exabeam-for-threat-hunting/</loc>
		<lastmod>2026-03-11T19:12:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-to-Use-Exabeam-for-Threat-Hunting-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-to-use-exabeam-for-threat-hunting-Pyramid-of-Pain-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-10-data-lake-query-tricks/</loc>
		<lastmod>2026-03-11T19:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Top-10-Data-Lake-Query-Tricks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-tip-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-tip-2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-tip-5-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-6-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-7-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-top-10-data-lake-query-tricks-Data-Lake-8-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/ransomwares-weakness-how-to-turn-ransomwares-achilles-heel-into-the-defenders-golden-hour/</loc>
		<lastmod>2026-03-11T19:44:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomwares-Weakness-How-to-Turn-Ransomwares-Achilles-Heel-Into-the-Defenders-Golden-Hour-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ransomware-Prevent-Detect-and-Respond-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/8-best-practices-for-mitigating-insider-threats/</loc>
		<lastmod>2026-03-11T19:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-8-Best-Practices-for-Mitigating-Insider-Threats-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/HOME-the-ultimate-guide-to-insider-threats-inpage-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/insider-threats-what-banks-dont-know-can-definitely-hurt-them/</loc>
		<lastmod>2026-03-11T19:49:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threats-What-Banks-Dont-Know-Can-Definitely-Hurt-Them-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threats-What-Banks-Dont-Know-Can-Definitely-Hurt-Them-inpage-01a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Insider-Threats-What-Banks-Dont-Know-Can-Definitely-Hurt-Them-inpage-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/HOME-the-ultimate-guide-to-insider-threats-inpage-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/10-essential-episodes-of-the-new-ciso-podcast/</loc>
		<lastmod>2026-03-11T20:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-10-Essential-Episodes-of-The-New-CISO-Podcast-socialshare-02.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-70-Trusting-Your-Tech-to-Tackle-Human-Problems-with-Dr-Adrian-Mayers-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Are-You-Ready-to-be-a-CISO-Why-Mentors-Matter-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-91-Taking-Extreme-Ownership-How-3-Common-Excuses-Hurt-Security-Leaders-with-guest-Michael-Meis-feature-01-1024x535.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-31-Lessons-Learned-from-the-irst-CISO-pt1-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-7-Understanding-the-Adversary-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-59-Empowering-People-to-Bring-Their-Whole-Self-to-Work-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-How-Emotional-Intellegence-Fortifies-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-47-Why-Does-Cybersecurity-Mentorship-Matter-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Episode-39-The-Moments-After-a-Major-Breach-with-Dave-Damato-Aon-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-33-Managing-Risk-While-Building-Trust-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/account-resolution-via-market-basket-analysis/</loc>
		<lastmod>2026-03-11T20:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Account-Resolution-via-Market-Basket-Analysis-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-account-resolution-via-market-basket-analysis-Blindmen-with-Elephant-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-account-resolution-via-market-basket-analysis-Basket-Graph-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/user-behavior-anomaly-detection-meets-distributed-computing/</loc>
		<lastmod>2026-03-11T20:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Anomaly-Detection-Meets-Distributed-Computing-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Anomaly-Detection-Meets-Distributed-Computing-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-User-Behavior-Anomaly-Detection-Meets-Distributed-Computing-inpage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/improving-cybersecurity-incident-response-with-orchestration-and-automation/</loc>
		<lastmod>2026-03-11T20:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Improving-Cybersecurity-Incident-Response-with-Orchestration-and-Automation-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-improving-cybersecurity-incident-response-with-orchestration-and-automation-lateral-movement-inpage-01-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-improving-cybersecurity-incident-response-with-orchestration-and-automation-Incident-Responder-playbook-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-improving-cybersecurity-incident-response-with-orchestration-and-automation-Incident-Responder-Results-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/executive-briefings-101-from-the-frontlines/</loc>
		<lastmod>2026-03-11T20:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Executive-Briefings-101-From-the-Frontlines-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-executive-briefings-101-from-the-frontlines-Log-data-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-executive-briefings-101-from-the-frontlines-Exabeam-Analytics-SmartTimelines-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/mitre-publishes-code-signing-policy-modification-t1553-006-in-the-attck-framework/</loc>
		<lastmod>2026-03-11T20:22:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-MITRE-Publishes-Code-Signing-Policy-Modification-T1553-006-in-the-ATTCK-Framework-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-publishes-code-signing-policy-modification-t1553-006-in-the-attck-framework-mitre1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-mitre-publishes-code-signing-policy-modification-t1553-006-in-the-attck-framework-mitre2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/a-four-layered-approach-to-malware/</loc>
		<lastmod>2026-03-11T20:25:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Four-Layered-Approach-to-Malware-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Four-Layered-Approach-to-Malware-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/cyber-attribution-essential-component-of-incident-response-or-optional-extra/</loc>
		<lastmod>2026-03-11T20:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cyber-Attribution-Essential-Component-of-Incident-Response-or-Optional-Extra.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cyber-attribution-essential-component-of-incident-response-or-optional-extra-attribtion1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cyber-attribution-essential-component-of-incident-response-or-optional-extra-Attribution2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cyber-attribution-essential-component-of-incident-response-or-optional-extra-Attribution3-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/exabeam-in-action-stopping-lapsus-in-their-tracks/</loc>
		<lastmod>2026-03-11T20:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-in-Action-Stopping-Lapsus-in-Their-Tracks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-in-Action-Stopping-Lapsus-in-Their-Tracks-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/extracting-actionable-information-from-windows-events/</loc>
		<lastmod>2026-03-11T20:40:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Extracting-Actionable-Information-from-Windows-Events-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-extracting-actionable-information-from-windows-events-Windows-Event-Log-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-extracting-actionable-information-from-windows-events-Exabeam-Session-Timeline-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/an-incident-investigators-cheat-code/</loc>
		<lastmod>2026-03-11T20:50:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-An-Incident-Investigators-Cheat-Code-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-incident-investigators-cheat-code-Expel-session-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-an-incident-investigators-cheat-code-Expel-session-2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/exabeam-2020-state-of-the-soc-report-the-soc-practitioners-perspective/</loc>
		<lastmod>2026-03-11T20:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-2020-State-of-the-SOC-Report-The-SOC-Practitioners-Perspective-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-state-of-the-soc-report-the-soc-practitioners-perspective-SOC-staffing-levels-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-state-of-the-soc-report-the-soc-practitioners-perspective-2020-State-of-the-SOC-retention-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-state-of-the-soc-report-the-soc-practitioners-perspective-2020-State-of-the-SOC-Figure-4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-2020-state-of-the-soc-report-the-soc-practitioners-perspective-2020-State-of-the-SOC-Pain-Points-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/escaping-dantes-soc-inferno-fraud-and-the-truth-about-normal/</loc>
		<lastmod>2026-03-11T21:01:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Escaping-Dantes-SOC-Inferno-Fraud-and-the-Truth-About-Normal-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-escaping-dantes-soc-inferno-fraud-and-the-truth-about-normal-quote-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/spotlight19-recap-three-trends-in-security-management/</loc>
		<lastmod>2026-03-11T21:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Spotlight19-Recap-Three-Trends-in-Security-Management-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-spotlight19-recap-three-trends-in-security-management-insterest-over-time-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-spotlight19-recap-three-trends-in-security-management-Spotlight-award-inpage-01.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-differences-between-siem-and-open-xdr/</loc>
		<lastmod>2026-03-11T21:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Differences-Between-SIEM-and-Open-XDR-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-Top-10-Reasons-to-Augment-Your-Legacy-SIEM-with-XDR-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/five-steps-to-effectively-identify-insider-threats/</loc>
		<lastmod>2026-03-11T21:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Five-Steps-to-Effectively-Identify-Insider-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/top-five-observations-from-rsa-conference-2023/</loc>
		<lastmod>2026-03-11T21:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOGTop-Five-Observations-From-RSA-Conference-2023-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-A-CISOs-Guide-to-Adversary-Alignment-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/fireeye-and-solarwinds-cyber-attack-information-for-exabeam-customers-and-partners/</loc>
		<lastmod>2026-03-11T21:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-FireEye-and-SolarWinds-Cyber-Attack-Information-for-Exabeam-Customers-and-Partners-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-fireeye-and-solarwinds-cyber-attack-information-for-exabeam-customers-and-partners-fe-sw-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-fireeye-and-solarwinds-cyber-attack-information-for-exabeam-customers-and-partners-fe-sw-2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-fireeye-and-solarwinds-cyber-attack-information-for-exabeam-customers-and-partners-fe-sw-3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-fireeye-and-solarwinds-cyber-attack-information-for-exabeam-customers-and-partners-fe-sw-4-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/compliance/why-airlines-are-prone-to-cyberattacks/</loc>
		<lastmod>2026-03-11T21:22:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Why-Airlines-are-Prone-to-Cyberattacks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Airline-Cyberattacks-What-We-Can-Learn-and-What-to-Do-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/understanding-the-different-types-of-adversaries/</loc>
		<lastmod>2026-03-11T21:26:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Understanding-the0Different-Types-of-Adversaries-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/unmasking-insider-threats-isnt-just-a-u-s-intelligence-agency-problem/</loc>
		<lastmod>2026-03-11T21:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unmasking-Insider-Threats-Isnt-Just-a-US.-Intelligence-Agency-Problem-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unmasking-Insider-Threats-Isnt-Just-a-US-Intelligence-Agency-Problem-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unmasking-Insider-Threats-Isnt-Just-a-US-Intelligence-Agency-Problem-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Unmasking-Insider-Threats-Isnt-Just-a-US-Intelligence-Agency-Problem-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BRIEF-Compromised-Credentials-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/navigating-the-siem-landscape-how-to-recognize-and-counter-vendor-gimmicks/</loc>
		<lastmod>2026-03-11T21:29:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Navigating-the-SIEM-Landscape-How-to-Recognize-and-Counter-Vendor-Gimmicks-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-The-Total-Economic-Impact-of-Exabeam-Fusion-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/the-next-wave-of-innovation-in-siem-security-analytics-and-tdir/</loc>
		<lastmod>2026-03-11T21:31:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Next-Wave-of-Innovation-in-SIEM-Security-Analytics-and-TDIR-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/REPORT-The-Total-Economic-Impact-of-Exabeam-Fusion-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/four-days-of-gartner-security-and-risk-management-summit-in-four-minutes/</loc>
		<lastmod>2026-03-11T21:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Four-Days-of-Gartner-Security-and-Risk-Management-Summit-in-Four-Minutes-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Cloud-native-SIEM-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/log4j-by-another-name-its-coming-how-can-you-keep-pace/</loc>
		<lastmod>2026-03-11T21:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Log4j-by-Another-Name-Its-Coming-How-Can-You-Keep-Pace-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Log4j-by-Another-Name-inpage-05-1024x46.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Log4j-by-Another-Name-inpage-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Log4j-by-Another-Name-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting/</loc>
		<lastmod>2026-03-11T21:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Modern-SIEMs-Leverage-TTPs-and-Automation-for-Advanced-Threat-Hunting-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Figure-3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-4-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-5-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-6-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-how-modern-siems-leverage-ttps-and-automation-for-advanced-threat-hunting-TTP-Threat-Hunting-7-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/human-managed-selects-exabeam-to-drive-faster-decision-making/</loc>
		<lastmod>2026-03-11T21:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Human-Managed-Selects-Exabeam-to-Drive-Faster-Decision-making-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/5-key-cybersecurity-trends-what-i-learned-at-exabeam-spotlight-2018/</loc>
		<lastmod>2026-03-11T21:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-Key-Cybersecurity-Trends-What-I-Learned-at-Exabeam-Spotlight-2018-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-key-cybersecurity-trends-what-i-learned-at-exabeam-spotlight-2018-ExabeamSpotlight1-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-5-key-cybersecurity-trends-what-i-learned-at-exabeam-spotlight-2018-ExabeamSpotlight2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/you-cant-defend-what-you-cant-see-seize-the-breach/</loc>
		<lastmod>2026-03-11T22:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-You-Cant-Defend-What-You-Cant-See-Seize-the-Breach-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-Planning-Before-the-Breach-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-named-a-leader-in-the-2020-gartner-magic-quadrant-for-siem-for-2nd-consecutive-year/</loc>
		<lastmod>2026-03-11T22:08:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Named-a-Leader-in-the-2020-Gartner-Magic-Quadrant-for-SIEM-for-2nd-Consecutive-Year-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-exabeam-named-a-leader-in-the-2020-gartner-magic-quadrant-for-siem-for-2nd-consecutive-year-magic-quadrant-for-security-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/the-battle-against-insider-threats-and-why-you-need-behavior-based-cybersecurity-strategies/</loc>
		<lastmod>2026-03-11T22:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Battle-Against-Insider-Threats-and-Why-You-Need-Behavior-based-Cybersecurity-Strategies-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Battle-Against-Insider-Threats-and-Why-You-Need-Behavior-based-Cybersecurity-Strategies-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/are-you-thinking-about-shifting-your-siem-to-the-cloud/</loc>
		<lastmod>2026-03-11T22:18:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Are-You-Thinking-About-Shifting-Your-SIEM-to-the-Cloud-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-6-Benefits-of-SIEM-in-the-Cloud-socialshare-01-1024x536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/cybersecurity-strategies-for-the-growing-risks-of-the-internet-of-things-iot/</loc>
		<lastmod>2026-03-11T22:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Cybersecurity-Strategies-for-the-Growing-Risks-of-the-Internet-of-Things-IoT-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-cybersecurity-strategies-for-the-growing-risks-of-the-internet-of-things-iot-IoT-Cybersecurity-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/how-exabeam-can-help-drive-value-with-apis/</loc>
		<lastmod>2026-03-11T22:27:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-How-Exabeam-Can-Help-Drive-Value-With-APIs-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ponemon-study-reveals-analysts-tasks-take-50-less-time-when-using-exabeam/</loc>
		<lastmod>2026-03-11T22:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ponemon-Study-Reveals-Analysts-Tasks-Take-50-Less-Time-When-Using-Exabeam-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reveals-analysts-tasks-take-50-less-time-when-using-exabeam-ponemon-report-Figure1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reveals-analysts-tasks-take-50-less-time-when-using-exabeam-ponemon-report-figure2-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reveals-analysts-tasks-take-50-less-time-when-using-exabeam-ponemon-report-figure3-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-reveals-analysts-tasks-take-50-less-time-when-using-exabeam-ponemon-report-figure4-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem/</loc>
		<lastmod>2026-03-11T22:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Ponemon-Study-Finds-90-of-Users-Get-Lower-Costs-and-More-Value-with-Exabeam-SIEM-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem-Figure-9-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem-FIgure-21-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem-Figure-8-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem-Figure-11-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-ponemon-study-finds-90-of-users-get-lower-costs-and-more-value-with-exabeam-siem-Figure-12-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/eight-cybersecurity-predictions-for-2020/</loc>
		<lastmod>2026-03-11T22:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Eight-Cybersecurity-Predictions-for-2020-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/security-operations-center/from-anomalies-to-action-ciso-insights-on-insider-threats-and-red-team-thinking/</loc>
		<lastmod>2026-03-11T23:17:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-From-Anomalies-to-Action-CISO-Insights-on-Insider-Threats-and-Red-Team-Thinking-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WEBINAR-CISO-QA-Solving-Insider-Threats-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/empowering-defenders-skills-development-and-proactive-approaches-in-defender-alignment/</loc>
		<lastmod>2026-03-12T19:20:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Empowering-Defenders-Skills-Development-and-Proactive-Approaches-in-Defender-Alignment-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/WHITEPAPER-A-CISOs-Guide-to-Defender-Alignment-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/9-infosec-resources-you-might-have-missed-in-september/</loc>
		<lastmod>2026-03-12T19:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-9-InfoSec-Resources-You-Might-Have-Missed-in-September-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/GUIDE-Five-Tips-for-Modernizing-Security-Operations-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/19-infosec-resources-you-may-have-missed-in-january/</loc>
		<lastmod>2026-03-12T20:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-19-InfoSec-Resources-You-May-Have-Missed-in-January-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/announcing-availability-of-the-exabeam-cloud-connector-for-zoom/</loc>
		<lastmod>2026-03-12T20:53:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Announcing-Availability-of-the-Exabeam-Cloud-Connector-for-Zoom-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-announcing-availability-of-the-exabeam-cloud-connector-for-zoom-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-announcing-availability-of-the-exabeam-cloud-connector-for-zoom-inpage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-announcing-availability-of-the-exabeam-cloud-connector-for-zoom-inpage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-announcing-availability-of-the-exabeam-cloud-connector-for-zoom-inpage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-announcing-availability-of-the-exabeam-cloud-connector-for-zoom-inpage-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/this-meeting-is-being-recorded/</loc>
		<lastmod>2026-03-12T20:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-This-meeting-is-being-recorded-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-this-meeting-is-being-recorded-Zoom-threat-1-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-this-meeting-is-being-recorded-Zoom-threat-2-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/incident-response/7-detection-tips-for-the-log4j2-vulnerability/</loc>
		<lastmod>2026-03-12T21:01:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-7-Detection-Tips-for-the-Log4j2-Vulnerability-socialshare-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/infosec-trends/the-relationship-between-business-risk-and-security-and-the-role-of-the-modern-ciso/</loc>
		<lastmod>2026-03-12T21:08:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-The-Relationship-Between-Business-Risk-and-Security-and-the-Role-of-the-Modern-CISO-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Four-Questions-Every-CISO-Should-Ask-Their-Board-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Determining-Risk-Tolerance-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-Is-Our-Understanding-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/PODCAST-The-New-CISO-Podcast-Episode-33-Managing-Risk-While-Building-Trust-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/siem-trends/exabeam-leverages-the-power-of-saas-to-proactively-improve-security-content-and-user-experience/</loc>
		<lastmod>2026-03-12T21:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Leverages-the-Power-of-SaaS-to-Proactively-Improve-Security-Content-and-User-Experience-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Exabeam-Leverages-the-Power-of-SaaS-to-Proactively-Improve-Security-Content-and-User-Experiencecontent-monitoring-inline-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/ueba/uncovering-the-mechanisms-of-ueba-machine-learning-and-its-applications-in-cybersecurity/</loc>
		<lastmod>2026-03-12T21:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Uncovering-the-Mechanisms-of-UEBA-Machine-Learning-and-Its-Applications-in-Cybersecurity-socialshare-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/EBOOK-The-Ultimate-Guide-to-Behavioral-Analytics-socialshare-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/disco-craze-hits-exabeam-hackathon-days/</loc>
		<lastmod>2026-03-13T17:37:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Disco-Craze-Hits-Exabeam-Hackathon-Days-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disco-craze-hits-exabeam-hackathon-days-Hackathon-t-shirt-1-1024x587-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disco-craze-hits-exabeam-hackathon-days-Eventurers-1024x578-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disco-craze-hits-exabeam-hackathon-days-Alex-Hut-1024x750-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-disco-craze-hits-exabeam-hackathon-days-Exabeam-SecurityNightFever-783x1024-inpage-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/growing-confidence-and-corporate-skills-my-exabeam-internship-experience/</loc>
		<lastmod>2026-03-13T17:47:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-Growing-Confidence-and-Corporate-Skills-My-Exabeam-Internship-Experience-socialshare-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-inpage-01-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-A-Transformative-Journey-promo-01-1024x535-inpage-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/meet-exabeam-sherpa-the-ai-backbone-of-our-next-generation-partner-experience/</loc>
		<lastmod>2026-03-20T20:21:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-meet-exabeam-sherpa-the-ai-backbone-of-our-next-generation-partner-experience-socialshare-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/exabeam-sherpa-color-dark-logo-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-the-april-2026-logrhythm-siem-release/</loc>
		<lastmod>2026-04-01T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.exabeam.com/blog/company-news/whats-new-in-new-scale-april-2026-securing-the-agentic-enterprise-with-behavioral-analytics/</loc>
		<lastmod>2026-04-01T13:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/DEFAULT-Exabeam-socialshare-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-new-scale-april-2026-securing-the-agentic-enterprise-with-behavioral-analytics-detection-capabilities-inpage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-new-scale-april-2026-securing-the-agentic-enterprise-with-behavioral-analytics-aba-patterns-inpage-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.exabeam.com/wp-content/uploads/BLOG-whats-new-in-new-scale-april-2026-securing-the-agentic-enterprise-with-behavioral-analytics-aba-category-maps-inpage-01.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->