<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatconnect.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatconnect.com/customer-stories/</loc>
		<lastmod>2026-02-17T18:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/security-business-leaders-create-actionable-risk-identification-and-reporting/</loc>
		<lastmod>2023-11-21T18:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/customer-manufacturing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/establishing-a-strong-partnership-to-ensure-continued-success/</loc>
		<lastmod>2023-11-21T19:33:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/customer-financial.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/maturing-cybersecurity-infrastructure-with-intelligence-powered-operations/</loc>
		<lastmod>2024-03-01T16:26:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/customer-technology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/global-aerospace-and-defense-company-consolidating-threat-intelligence-automating-processes-with-playbooks/</loc>
		<lastmod>2025-02-28T13:39:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/shutterstock_2213583993-scaled-e1694613540220.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/wyndham-improves-threat-detection-and-response-while-scaling-security-operations/</loc>
		<lastmod>2025-08-26T15:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/wyndham-hotel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/the-retail-security-overhaul-powered-by-threatconnect/</loc>
		<lastmod>2025-11-25T14:25:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/korie-cull-IzIME1jwjCY-unsplash-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/how-a-leading-automaker-achieved-intelligence-driven-security/</loc>
		<lastmod>2025-11-25T14:26:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/istockphoto-1279762098-612x612-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/from-data-to-defense-ikarus-and-threatconnects-blueprint-for-european-cyber-resilience/</loc>
		<lastmod>2025-11-25T14:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/istockphoto-1206983388-612x612-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/how-a-global-sportswear-brand-traded-cumbersome-systems-for-streamlined-threat-intelligence-operations/</loc>
		<lastmod>2025-11-25T14:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/istockphoto-1366052585-612x612-1-e1742996480193.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/how-a-top-canadian-bank-revolutionized-cybersecurity-with-ai-driven-threatconnect/</loc>
		<lastmod>2025-11-25T14:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/istockphoto-1277143096-612x612-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/global-credit-union-reduces-alert-fatigue-to-detect-and-respond-to-threats-faster/</loc>
		<lastmod>2025-11-25T14:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/istockphoto-640267784-612x612-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/large-enterprise-needed-centralized-threat-intelligence-management/</loc>
		<lastmod>2025-11-25T14:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/shutterstock_2136788105-scaled-e1694696867770.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/national-medical-insurance-provider-quantifies-risk/</loc>
		<lastmod>2025-11-25T14:54:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/shutterstock_1135300070-scaled-e1694696763845.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/large-u-s-health-system-phishing-automation-and-bulk-importing-and-enrichment-of-indicators/</loc>
		<lastmod>2025-11-25T14:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/shutterstock_602208557-scaled-e1694696434286.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/enriching-the-signal-a-software-leaders-shift-from-volume-based-to-contextual-threat-data/</loc>
		<lastmod>2025-11-25T17:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Gemini_Generated_Image_g3i7tdg3i7tdg3i7-e1764091067917.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/building-a-resilient-cyber-defense-for-modern-healthcare/</loc>
		<lastmod>2026-01-20T16:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/01/Healthcare-scaled-e1768926831831.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/can-one-platform-change-everything-how-a-consumer-goods-leader-scaled-its-defense/</loc>
		<lastmod>2026-02-03T19:03:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/shutterstock_2612262573-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/threatconnect-consolidates-disparate-intelligence-feeds-for-financial-giant/</loc>
		<lastmod>2026-02-11T17:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/shutterstock_1142692640-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/utilities-enterprise-achieves-75-false-positive-reduction-with-ai-driven-intelligence/</loc>
		<lastmod>2026-02-12T20:49:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/shutterstock_2486389725-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/customer-stories/a-big-four-enterprises-journey-to-unified-threat-intelligence/</loc>
		<lastmod>2026-02-17T18:02:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/shutterstock_2710635453-scaled.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->