<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatconnect.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatconnect.com/blog/</loc>
		<lastmod>2026-03-09T16:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/bitly-url-decoder/</loc>
		<lastmod>2019-01-25T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-24-image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-24-image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-24-image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-24-image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-crowdstrike-snort-rules-ingest/</loc>
		<lastmod>2019-06-14T13:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2019-06-10-at-2.07.35-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-reporting-through-email-attachment/</loc>
		<lastmod>2019-08-23T16:10:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PB-Fri-Regex-Example-236x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PB-Fri-Full.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-query-hashes-via-email-submission/</loc>
		<lastmod>2019-11-01T22:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cooley-pbf-pic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-attck-tag-framework/</loc>
		<lastmod>2020-03-13T12:49:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-16-20-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-16-20-pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-covid-19-dashboard-metrics-and-search/</loc>
		<lastmod>2020-03-19T18:46:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Final-Screenshot-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/corona-19-dashboard-research.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Final-Screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Get-Case-Stats.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Parse-Case-Stats.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Custom-Metric-Example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Full-Metrics-playbook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Initial-HTTP-Call.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/HTTP-Call-with-Cursor-Set.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Full-Playbook-Screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-potential-zoom-related-threats-dashboard/</loc>
		<lastmod>2020-04-10T21:28:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2020-04-10-at-10.53.25-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-domaintools-iris-investigate-monitor/</loc>
		<lastmod>2020-05-01T16:52:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cez-Iris-PBF.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rq6-applies-automation-to-fair/</loc>
		<lastmod>2021-10-18T14:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Automated-Fair-Steps@2x.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/lets-talk-about-cios-and-cyber-risk/</loc>
		<lastmod>2022-12-05T22:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CIOs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-malwarebazaar-open-source-malware-analysis/</loc>
		<lastmod>2022-12-05T22:29:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/malwarbazaar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-cuckoo-sandbox-automate-your-malware-analysis/</loc>
		<lastmod>2022-12-05T22:29:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-09-30-at-3.53.23-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-smart-is-your-soar-platform/</loc>
		<lastmod>2022-12-05T22:31:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-SOAR-Image-Concept-1-Option-1-%E2%80%93-TW%402x.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threatconnect-soar-how-it-works.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/greynoise-and-threatconnect-protect-against-noisy-ips/</loc>
		<lastmod>2022-12-05T22:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Blog-Secure-lock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/GreyNoise-screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-helping-to-deliver-on-the-promise-of-xdr/</loc>
		<lastmod>2022-12-05T22:31:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-05-19-at-9.49.32-AM-1030x770.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-threat-intel-update-april-8th-2021/</loc>
		<lastmod>2022-12-05T22:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_643778590-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-threat-intel-update-3-25-21/</loc>
		<lastmod>2022-12-05T22:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_739203226-1-300x169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-threat-intelligence-update/</loc>
		<lastmod>2022-12-05T22:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_652587526-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-sumo-logic-empower-orchestration-with-cloud-siem/</loc>
		<lastmod>2022-12-05T22:31:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Sumo-Logic-Blog-1030x610.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-hunting-use-case-sunburst-malware/</loc>
		<lastmod>2022-12-05T22:31:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1885971511-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/img_636e33f56e593.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/tip-soar-creating-increased-capability-for-less-mature-teams/</loc>
		<lastmod>2022-12-05T22:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threat-intelligence-led-SOAR-1030x788.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/former-cia-cybersecurity-chief-blames-failure-of-imagination-and-lack-of-regulation-for-solar-winds-failure/</loc>
		<lastmod>2022-12-05T22:31:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_490379323.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/welcome-to-the-age-of-cyber-risk-quantification/</loc>
		<lastmod>2022-12-05T22:31:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1600865428-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-your-soar-needs-threat-intel-management-not-feed-management/</loc>
		<lastmod>2022-12-05T22:31:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/visible-confusion-233x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/stopsign-300x213.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/happy-landing-300x163.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threat-intel-feed-management-chart2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-activity-on-previously-identified-apt33-domains/</loc>
		<lastmod>2022-12-05T22:31:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Association-Graph_2020-09-11-7_05_23am.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/research-roundup-weekly-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-microsoft-strontium-sinkhole-domain-sibling/</loc>
		<lastmod>2022-12-05T22:31:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Association-Graph_2020-09-17-1_40_19pm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/research-roundup-weekly-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-okta-save-time-with-iam-investigations/</loc>
		<lastmod>2022-12-05T22:31:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-12-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-mitre-attck-supporting-sub-techniques/</loc>
		<lastmod>2022-12-05T22:31:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/new-mitre@2x-1030x907.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-the-brain-of-security/</loc>
		<lastmod>2022-12-05T22:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-recent-probable-charming-kitten-infrastructure/</loc>
		<lastmod>2022-12-05T22:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Research-Roundup-APT35-Historical-Domains-Aug-6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/research-roundup-weekly-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-servicenow-more-integrations-for-better-context/</loc>
		<lastmod>2022-12-05T22:31:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SN-11-25-19-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SN-11-25-19-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SN-11-25-19-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-leveraging-threatconnect-to-enrich-greynoise-iocs/</loc>
		<lastmod>2022-12-05T22:31:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cody-PBF-GreyNoise-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cody-PBF-GreyNoise-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-query-jira-for-ticket-information/</loc>
		<lastmod>2022-12-05T22:31:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Overall_Playbook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/jira_base_url.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/JIRA_credentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/error_checking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/attribue_doesnt_exist.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/call_to_jira.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/jmespath_JIRA_Response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/jmespath_get_issue_and_priority.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/commands_users_ticket_detail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/create_document_or_update_if_exists.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/download_associate_attachments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Attribute.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/UAT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2019-11-20-at-2.48.25-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/end_results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/whats_in_jira.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/best-practices-for-writing-playbooks-part-2/</loc>
		<lastmod>2022-12-05T22:31:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RC-blog-post-2-pic5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-component-ioc-all-data-pull/</loc>
		<lastmod>2022-12-05T22:31:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Trigger-Input.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IOC-Main-Pull.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Parse-API-Results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Pull-API-Branch-Based-on-IOC-Type.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Victim-Associations-API.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/VictimAssets-Associations-API.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/All-API-Calls-Into-New-JSON-Blob.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Join-Failure-Success.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Trigger-Output.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Full-Setup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/new-threatconnect-app-for-splunk-3-1/</loc>
		<lastmod>2022-12-05T22:31:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/3-22-pic-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/3-22-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/3-22-pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/intelligence-powered-security-operations-evolve-beyond-traditional-secops/</loc>
		<lastmod>2022-12-22T21:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Screen-Shot-2022-12-21-at-1.25.57-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/IPSO-Graphic_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/put-threat-intelligence-at-the-core-of-your-security-operations-2/</loc>
		<lastmod>2023-05-31T18:55:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/22-TC-Gartner-Report-Cover-FINAL3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-converting-your-iocs-to-csvs/</loc>
		<lastmod>2023-06-08T20:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/security-operations-maturity-model/</loc>
		<lastmod>2023-07-04T13:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/community-powered-insight-gives-defenders-the-advantage/</loc>
		<lastmod>2023-08-24T16:16:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-08-05-at-1.18.56-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/move-faster-with-threatconnect-6-6/</loc>
		<lastmod>2023-08-24T16:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_2013901751-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-06-23-at-1.30.30-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-11-at-11.52.52-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-11-at-11.53.09-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-12-at-12.57.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/supercharge-your-security-operations-with-threatconnect-6-5/</loc>
		<lastmod>2023-08-24T16:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/22-TC-Email-Header-6.5-Product-Release-%E2%80%93-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/6.5-Screenshot-Import-Indicators-from-the-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/6.5-Screenshot-Superuser-Dashboard.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/6.5-screenshot-Top-Analyst-Cases.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-freshservice-better-ticket-management/</loc>
		<lastmod>2023-08-24T16:25:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/pasted-image-0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-top-5-webinars-in-2021/</loc>
		<lastmod>2023-08-24T16:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1588070785-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-graph-seeing-is-believing/</loc>
		<lastmod>2023-08-24T16:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC_MoleRats_02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/MS-Exchange-Vulns_2022-10-03-12_55_31pm-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-top-security-risks-of-remote-working/</loc>
		<lastmod>2023-08-24T16:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/The-Top-Security-Risks-of-Remote-Working.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/uk-national-cyber-strategy-2022/</loc>
		<lastmod>2023-08-24T16:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_434358181-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/improve-soc-event-prioritization-with-intelligence-driven-soar/</loc>
		<lastmod>2023-08-24T16:47:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Untitled-design.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/is-xdr-the-silver-bullet-we-have-been-waiting-for-spoiler-no/</loc>
		<lastmod>2023-08-24T16:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/XDR-web.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-rq-6-3-making-fair-even-easier-5/</loc>
		<lastmod>2023-08-24T17:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/6.3-Dashboard-Image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Primary-Loss-Mag.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SemiFair-TEF.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SSC-Example-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SSC-Example-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Application-Settings.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rq-enables-the-cyber-risk-conversations-youve-been-waiting-for-6/</loc>
		<lastmod>2023-08-24T17:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Application-Risk-Summary-RQ-5.1-1030x447.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/top-threats-across-all-applictions-RQ-5.1-1030x453.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CVE-risk-quantification-1030x465.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-indicator-importer-spaces-app/</loc>
		<lastmod>2023-08-24T17:53:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Hurd-jan-23-PBF-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/indicator-importer-demo.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Hurd-jan-23-PBF-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Hurd-jan-23-PBF-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Hurd-jan-23-PBF-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-any-run-better-malware-analysis/</loc>
		<lastmod>2023-08-24T17:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-01-28-at-4.12.48-PM-1030x540.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-announces-new-integrations-with-four-free-tools/</loc>
		<lastmod>2023-08-24T19:32:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-04-URL-and-website-scanner-urlscan-io.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-04-Free-URL-Un-Shortener-Unshorten-URLS-like-goo-gl-bit-ly-and-many-more.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-04-Take-Web-Screenshot-with-Screenshot-API-Screenshot-Machine.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-04-CIRCL-CIRCL-Computer-Incident-Response-Center-Luxembourg-CSIRT-CERT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/importance-of-automation-in-event-prioritization/</loc>
		<lastmod>2023-08-24T19:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Workflow-template.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Open-Cases.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Dashboard-Card.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/maximize-impact-with-threatconnect-6-7/</loc>
		<lastmod>2023-08-25T16:33:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/Maximize-Impact-with-ThreatConnect-6.7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-10-03-at-10.31.30-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-10-03-at-11.07.33-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-09-28-at-10.53.27-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/software-and-seinfeld-with-threatconnects-cal/</loc>
		<lastmod>2023-08-25T16:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/d08f55d0-657a-4d51-b8bb-b82220dd3c84_text.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-21-at-4.06.55-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/anigif_original-6804-1440523196-5.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-21-at-4.09.23-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-21-at-4.12.41-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/H802hF1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/84ea078c-562c-464a-b896-db56b548cfbb_text.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/4rWs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1225038b-6b6b-42be-9214-9df6994219bc_text.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Fd32.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-21-at-4.24.05-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/soup-seinfeld.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-21-at-4.26.08-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/7AT4.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-6-4-empowering-threat-intel-teams/</loc>
		<lastmod>2023-08-25T16:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-02-at-10.13.07-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-02-at-10.13.18-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/powering-cyber-fusion-operations-with-threatconnect/</loc>
		<lastmod>2023-08-29T17:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/cyber-fusion-operations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-threat-intel-update-april-1st-2021/</loc>
		<lastmod>2023-08-29T17:32:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_334604324-300x201.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/strengthen-business-and-security-alignment-with-threatconnect/</loc>
		<lastmod>2023-08-29T18:23:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dashboard-5-26-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/tables-5-26-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ROI-5-26-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soar-proactive-threat-hunting-part-2/</loc>
		<lastmod>2023-08-29T18:26:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_643778590.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Part2-SOAR-Proactive-Threat-Hunting-1030x657.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threat-Hunting_-What-to-we-know-about-X_-Workflow-e1610033445605.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/APTGroup-Lulz.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-secret-to-our-customer-success/</loc>
		<lastmod>2023-08-29T18:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/indicator-status-updater-playbook-component/</loc>
		<lastmod>2023-08-29T18:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PB-Friday-6-7-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/to-code-or-not-to-code/</loc>
		<lastmod>2023-08-30T14:41:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_535124956-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.43.22-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-10-at-2.40.09-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.43.48-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.43.55-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.44.05-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.44.12-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.44.19-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-10-at-3.53.00-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.44.34-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-build-a-threat-library/</loc>
		<lastmod>2023-08-30T14:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_2119513595-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-04-22-at-12.30.33-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-6-3-adds-new-group-objects-workflow-metrics-and-workflow-attributes-to-powerful-lineup-of-tip-and-soar-capabilities/</loc>
		<lastmod>2023-08-30T15:16:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-13-at-11-40-30-6-3-Blog-1030x517.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-13-at-11-42-34-6-3-Blog-1030x398.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-13-at-11-43-30-6-3-Blog-1030x569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-13-at-11-44-24-6-3-Blog-1030x612.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-risk-quantification-the-pressure-is-on/</loc>
		<lastmod>2023-08-31T02:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1550542967.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/solarwinds-hack-spurs-interest-in-risk-based-threat-hunting/</loc>
		<lastmod>2023-08-31T02:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threat-hunting-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/every-type-of-soc-needs-a-soar/</loc>
		<lastmod>2023-08-31T18:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_669170671-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-18-at-11.17.45-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_669170671-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-smarter-soar-the-holy-grail-for-secops-teams/</loc>
		<lastmod>2023-08-31T18:56:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/intelligence-driven-soar-white-paper-cover-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-threatconnect-6-1-the-tao-of-intel-driven-operations/</loc>
		<lastmod>2023-09-01T03:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TAO-Intel-Ops.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-CISO-Avatar-Sriya-without-text@3x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-CISO-Avatar-Sriya-without-text@3x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-02-24-Introducing-6-1-Blog-Dan-Meg-Collab-1030x535.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-02-24-Introducing-6-1-Blog-Dan-Meg-Collab1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-CISO-Avatar-Sriya-without-text@3x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-02-24-Introducing-6-1-Blog-Dan-Meg-Collab2-e1614181475141-1030x545.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-select-the-best-soar-platform-for-your-organization/</loc>
		<lastmod>2023-09-01T03:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_2003176019-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SOAR-convergence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/let-data-help-your-soc-team-soar/</loc>
		<lastmod>2023-09-08T20:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_771480586-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/risk-calculations-require-cyber-threat-intelligence/</loc>
		<lastmod>2023-09-08T20:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/day-in-the-life-of-a-ti-analyst-part-2-dashing-through-dashboards/</loc>
		<lastmod>2023-09-09T00:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/06/Day-in-the-Life-of-a-TI-Analyst-Part-2-Dashing-Through-Dashboards-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Kermit-Waiting.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/laughing-shirley-temple.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Default-Dashboard-in-Dark-Mode-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Expanded-Dashboard-Menu-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Screen-Shot-2023-03-22-at-9.13.49-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Screen-Shot-2023-03-22-at-9.17.17-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-New-Empty-Dashboard-4-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Add-New-Card-Dashboard-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Doug-Squirrel-meme.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-My-Recent-History-Dashboard-Card-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Dashboard-Add-Cards-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Configure-New-Card-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Dashboard-Card-Query-Configurations-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Add-new-Card-datatable-dashboard-dark-mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Dashboard-Card-Results-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Dashboard-Cards-Dark-Mode-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Update-Dashboard-Menu-Options-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-cherwell-better-record-management/</loc>
		<lastmod>2023-09-09T16:19:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CherwellSvc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cybersecurity-workforce-gap-challenges-new-cisa-director/</loc>
		<lastmod>2023-09-09T17:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Jenn-Easterly-CISA-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-palo-alto-wildfire-enhanced-malware-analysis/</loc>
		<lastmod>2023-09-09T18:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Palo-Alto-Wildfire-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-new-role-of-the-ciso-create-and-protect-business-value/</loc>
		<lastmod>2023-09-10T04:24:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1520828180-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1_shutterstock_183129662-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-dan-me-tor-full-list-with-details/</loc>
		<lastmod>2023-09-10T04:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Final-Product-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/GET-HTTP-Client.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Regex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CSV-Parser.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Create-IOC-pt1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Create-IOC-pt2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Complete-Playbook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/key-functionalities-of-a-modern-cyber-threat-intelligence-program/</loc>
		<lastmod>2023-09-10T18:19:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1211469496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SANS-Cyber-Threat-Summit-Preso.2021.01.13_OKR_Focused1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SANS-Cyber-Threat-Summit-Preso.2021.01.13_OKR_Focused2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-generate-intelligence-reports-part-2/</loc>
		<lastmod>2023-09-10T18:21:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BLUF1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BLUF2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BLUF3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BLUF4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L3-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L18-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L28-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L42-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L55-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L71-92.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L93-119.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L120-123.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L124-140.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L141-162.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/L163-172.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/other_notes_requirements.txt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/other_notes_template1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/other_notes_template2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/communicating-risk-threat-response-to-the-c-suite-board/</loc>
		<lastmod>2023-09-10T18:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_183129662.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/associated-indicator-metadata-creator/</loc>
		<lastmod>2023-09-10T19:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/add-attribute-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/add-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/add-attribute-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Add-Metadata-to-Associated-Indicators.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-arithmetic-functions-component/</loc>
		<lastmod>2023-09-10T19:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Output-Variable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Component-Config.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Operation-Selection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Component-Logic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/HTTP-Client.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/koodous-playbook-components/</loc>
		<lastmod>2023-09-10T19:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/pic1-7-12PBF-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Pic-2-7-12PBF-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-generate-intelligence-reports/</loc>
		<lastmod>2023-09-11T14:17:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BK-PBF-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BK-PBF-pic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BR-PBF-pic-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/zero-trust-steps-up-to-shut-down-threat-actors/</loc>
		<lastmod>2023-09-15T06:34:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Zero-trust-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Threat-Intelligence-Infographic-copy-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Low-Code-Automation-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/dawn-ti-ops-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/alleviate-common-soc-struggles-with-soar-power/</loc>
		<lastmod>2023-09-19T17:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1291533214.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/intelligence-powered-security-operations-can-propel-u-s-critical-public-infrastructure-to-meet-new-cybersecurity-performance-goals/</loc>
		<lastmod>2023-09-19T18:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Intelligence-Powered-Security-Operations-Can-Propel-U.S.-Critical-Public-Infrastructure-to-Meet-New-Cybersecurity-Performance-Goals.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/IPSO-Graphic_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/its-time-to-stopransomware-with-vulnerability-prioritization-and-remediation/</loc>
		<lastmod>2023-09-19T18:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Its-Time-to-StopRansomware-With-Vulnerability-Prioritization-and-Remediation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/lets-talk-about-cfos-and-cyber-risk/</loc>
		<lastmod>2023-09-19T18:02:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CFOs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/preparing-organizations-to-stop-ransomware-in-2023/</loc>
		<lastmod>2023-09-19T18:03:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Preparing-Organizations-To-Stop-Ransomware-in-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/proxynotshell-zero-day-vulnerabilities-exposed-2/</loc>
		<lastmod>2023-09-19T18:04:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ProxyShell-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2022-10-03-125607.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2022-10-03-125622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/MS-Exchange-Vulns_2022-10-03-12_55_31pm-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-roi-of-security-and-the-soc/</loc>
		<lastmod>2023-09-19T18:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1009267603.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-05-26-The-ROI-of-Security-and-the-SOC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-1-an-even-better-user-experience/</loc>
		<lastmod>2023-09-19T18:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/ThreatConnect-7.1-An-Even-Better-User-Experience.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Shodan-DetailedView.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Screen-Shot-2023-04-11-at-3.58.17-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/TQL-Auto-Associate-Dark-Mode.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Run-Playbook-in-Graph-Dark-Mode.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-inc-achieves-soc-2-type-2-compliance/</loc>
		<lastmod>2023-09-19T18:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/ThreatConnect-Achieves-SOC-2-Type-2-Compliance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-supports-mitre-attck-groups-and-software/</loc>
		<lastmod>2023-09-19T18:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threatgroup-fin6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-03-09-at-11.42.26-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-07-23-at-9.37.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/top-malware-strains-used-by-threat-actors-in-2021-cisa-alert/</loc>
		<lastmod>2023-09-19T18:41:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Top-Malware-Strains-Used-by-Threat-Actors-in-2021-CISA-Alert.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-playbooks-2-0-and-intelligence-anywhere-creating-a-foundation-of-collaboration-with-threatconnect-6-2/</loc>
		<lastmod>2023-09-19T22:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/browser-extension.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/transforming-cyber-risk-quantification-and-analysis-a-customer-case-study-with-threatconnect-risk-quantifier/</loc>
		<lastmod>2023-09-19T22:59:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-28-at-10.49.38-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/qa-bob-kolasky-of-the-department-of-homeland-security-on-systemic-cyber-risk-and-critical-infrastructure/</loc>
		<lastmod>2023-09-19T23:15:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Headshot_Bob-Kolasky_350x280.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/query-palo-alto-wildfires-submit-wildfire-binary-to-vmray/</loc>
		<lastmod>2023-09-20T00:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-7-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-7-26-pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/top-3-user-group-takeaways-from-threatconnect-customers/</loc>
		<lastmod>2023-09-29T03:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Top-3-User-Group-Takeaways-from-ThreatConnect-Customers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_3550-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_9654-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_3551-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_9653-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_3548-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/IMG_9645-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/thats-a-wrap-from-black-hat-usa-2023/</loc>
		<lastmod>2023-10-03T17:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Thats-A-Wrap-From-Black-Hat-USA-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/20230810_100054-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/IMG_7825.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/IMG_0076-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/20230809_103542-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-tenets-of-threat-intelligence-operations-tenet-2-requires-an-evolved-threat-intelligence-lifecycle/</loc>
		<lastmod>2023-10-25T16:18:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/7-Tenants-of-TIOps-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Screen-Shot-2023-05-15-at-12.09.43-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Screen-Shot-2023-05-15-at-12.09.53-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Evolved-Threat-Intel-Lifecycle-Graphic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/7-Tenants-of-TIOps-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-converting-apps/</loc>
		<lastmod>2023-10-31T16:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-PBF-4-24-20-pic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/buddy-pbf-4-24-20-pic-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/tracking-sunburst-related-activity-with-threatconnect-dashboards/</loc>
		<lastmod>2023-10-31T16:14:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sunburst-dashboard.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sunburst-threat-connect.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/russian-threat-actor-dashboards/</loc>
		<lastmod>2023-10-31T16:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Russia-blog-image1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Russia-blog-image1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Russia-blog-image2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/preparing-for-black-hat-2023-how-to-stay-safe-at-one-of-the-largest-cybersecurity-conferences/</loc>
		<lastmod>2023-11-21T18:39:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Pre-BH-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cisa-issues-critical-alert-on-medusalocker-ransomware/</loc>
		<lastmod>2023-11-21T18:39:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_2023392170-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/critical-infrastructure-cybersecurity-standards/</loc>
		<lastmod>2023-11-21T19:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/pipeline-lng.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Copy-of-ThreatConnect-Social-Share-Templates3-1-300x169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-riskiq-for-better-enrichment-capabilities/</loc>
		<lastmod>2023-11-21T19:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Risk-IQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyberattacks-on-critical-infrastructures-forcing-long-overdue-conversations-about-risk/</loc>
		<lastmod>2023-11-21T19:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/JBS-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/3-reasons-the-insurance-industry-desperately-needs-automated-cyber-risk-quantification/</loc>
		<lastmod>2023-11-21T19:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cyber-insurance-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-execs-warn-cisos-could-disappear-if-they-dont-get-better-at-communicating-risk/</loc>
		<lastmod>2023-11-21T19:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/qa-felicia-thorpe-of-aht-insurance-on-cyber-insurance-and-cyber-risk-quantification/</loc>
		<lastmod>2023-11-21T19:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Felicia-Thorpe_AHT-insurance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-query-language-tql-for-people-who-dont-code/</loc>
		<lastmod>2023-11-21T19:16:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/ThreatConnect-Query-Language-TQL-for-People-Who-Dont-Code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/ThreatConnect-Browse-Screen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Work-Smarter-Turtle.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/ThreatConnect-Browse-Screen-Filters.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Browse-Screen-Basic-Filters.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Magic-Meme.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Browse-Screen-Advanced-Button.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Browse-Screen-Advanced-Query.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Browse-Screen-Save-a-Query.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/healthcare-email-threats-are-growing-combat-them-with-phishing-analysis-response/</loc>
		<lastmod>2023-11-21T19:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Healthcare-Email-Threats-are-Growing-Combat-Them-with-Phishing-Analysis-Response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-opswat-metadefender-cloud-malware-protection-meets-playbook-power/</loc>
		<lastmod>2023-11-21T19:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/OPSWAT-Metadefender-Cloud-Blog-1030x633.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-automatically-import-and-tag-your-rss-feed-data-with-covid-19-tags/</loc>
		<lastmod>2023-11-21T19:21:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-post-4-17-20-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-blog-post-4-17-20-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-blog-post-4-17-20-pic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-blog-post-4-17-20-pic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-blog-post-4-17-20-pic-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Gabe-PBF-blog-post-4-17-20-pic-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-improve-collaboration-with-security-teams-and-technology-using-threatconnect/</loc>
		<lastmod>2023-11-21T19:24:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/prioritize-and-mitigate-threats-more-efficiently-with-threatconnect-and-domaintools/</loc>
		<lastmod>2023-11-21T19:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/domaintools-iris-enrichment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/domaintools-iris-autotools.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/nist-crq-erm-review/</loc>
		<lastmod>2023-11-21T19:25:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-23-at-12-47-38-2021-09-22-NIST-and-RQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-23-at-12-51-22-2021-09-22-NIST-and-RQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-23-at-12-52-49-2021-09-22-NIST-and-RQ-300x297.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-23-at-12-55-02-2021-09-22-NIST-and-RQ-300x231.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-09-23-at-13-00-40-2021-09-22-NIST-and-RQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/when-it-comes-to-crq-what-is-an-open-model-and-is-it-the-right-question-to-ask/</loc>
		<lastmod>2023-11-21T19:25:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/jefferson-santos-9SoCnyQmkzI-unsplash-1-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-26-at-12.12.59-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-26-at-12.12.49-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-07-26-at-12.13.11-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-cybersecurity-challenges-chief-information-security-officers-must-tackle-in-2021/</loc>
		<lastmod>2023-11-21T19:26:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1446379457.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/its-2023-automating-your-threat-intelligence-operations-doesnt-have-to-be-hard/</loc>
		<lastmod>2023-11-21T19:32:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Low-Code-Automation-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/unnamed-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-tenets-of-threat-intel-operations-tenet-1-elevating-threat-intelligence/</loc>
		<lastmod>2023-11-21T19:32:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/The-7-Tenets-of-Threat-Intel-Operations-Tenet-1-Elevating-Threat-Intelligence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Where-TI-Ops-fits.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/4-actions-to-help-protect-your-organization-from-malicious-russian-cyber-activity/</loc>
		<lastmod>2023-11-21T19:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1188038749-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/whatcms-api-playbook/</loc>
		<lastmod>2023-11-21T20:10:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2018-01-21-at-7.25.11-PM-Robert-Simmons-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2018-01-21-at-7.25.11-PM-Robert-Simmons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/whatcms_playbook.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/web-page-monitoring/</loc>
		<lastmod>2023-11-21T20:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/web-monitoring-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/web-monitoring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/page-monitor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/uniting-the-threat-and-risk-intelligence-across-all-domains/</loc>
		<lastmod>2023-11-21T20:11:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/gfx-threat-response-06-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-possible-ryuk-infrastructure/</loc>
		<lastmod>2023-11-21T20:20:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2020-10-15-at-5.40.49-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2020-10-08-at-3.34.14-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-community-success-story-the-rubber-meets-the-road/</loc>
		<lastmod>2023-11-21T20:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-announces-investment-from-grotech-ventures/</loc>
		<lastmod>2023-11-21T20:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-microsoft-graph-integrate-seamlessly-with-the-microsoft-stack/</loc>
		<lastmod>2023-11-21T20:21:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/microsoft-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/microsoft-blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-check-point-better-endpoint-protection/</loc>
		<lastmod>2023-11-21T20:22:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Check-Point-Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/query-cymon-api/</loc>
		<lastmod>2023-11-21T20:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/2-1-image-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/2-1-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/2-1-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/qradar-tag-search/</loc>
		<lastmod>2023-11-21T20:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/first-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/Screen-Shot-2018-08-31-at-10.47.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbooks-for-non-programmers/</loc>
		<lastmod>2023-11-21T20:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1-18-imge-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/onemillion-api-component/</loc>
		<lastmod>2023-11-21T20:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/onemilapi-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/onemilapi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/OneMillion-API.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/may-the-force-of-partnerships-be-with-you/</loc>
		<lastmod>2023-11-21T20:35:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Jedi-Blog-Image_4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/UncleSamAlliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Jedi-Blog-Image_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Jedi-Blog-Image_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Jedi-Blog-Image_3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/ingest-technical-blogs-reports/</loc>
		<lastmod>2023-11-21T20:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/browse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-pivoting-exporting-data-diamond-model/</loc>
		<lastmod>2023-11-21T20:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/diamond_model_of_intrusion_analysis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Untitled_document_-_Google_Docs1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Pivot_UI-1024x593.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/capa-pivot-1024x283.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11graphview_forblog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Export_UI-1024x716.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect_Browse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/have-you-been-pwned/</loc>
		<lastmod>2023-11-21T20:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2020-11-10-at-12.28.43-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-16-995x1030.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-13-1030x699.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Untitled-presentation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/github-activity-monitor/</loc>
		<lastmod>2023-11-21T20:46:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/github1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/github1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/github_monitor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/domain-spinning-workbench/</loc>
		<lastmod>2023-11-21T20:50:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/graph-10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/configure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/configure-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/login-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/spinning-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/domain-squats-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/suspicious-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/entitites-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/domain-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/domain-counts-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threatconnect-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/graph-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-tenets-of-threat-intel-operations/</loc>
		<lastmod>2023-11-28T18:49:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/7-Tenants-of-TIOps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Where-TI-Ops-fits-Org-Viz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Evolved-Threat-Intel-Lifecycle-Graphic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/The-7-Tenets-of-Threat-Intel-Operations-Tenet-1-Elevating-Threat-Intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-threat-analysis-research-ransomware/</loc>
		<lastmod>2023-11-28T18:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-within-risk-management/</loc>
		<lastmod>2023-11-28T18:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sp800-39_riskProcess.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sp800-39_riskProcess_annotated.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sp800-37_riskFramework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/iso27005_riskmgt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/iso-27001-certification/</loc>
		<lastmod>2023-11-28T18:56:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_766880638.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/green-216x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-risk-management-the-intelligence-process/</loc>
		<lastmod>2023-11-28T19:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/intelcycle1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/whats-in-a-name-server/</loc>
		<lastmod>2023-11-28T19:01:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BG-Whats-in-a-Name-Server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen_Shot_Domains4Bitcoins.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen_Shot_Analyze_Demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/guccifer-2-0-the-man-the-myth-the-legend/</loc>
		<lastmod>2023-11-28T19:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/palo-alto-wildfire-malware-triage-playbook/</loc>
		<lastmod>2023-11-28T19:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/playbooks-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/hackerone_logo_white.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/triggering-cloud-actions-with-playbooks/</loc>
		<lastmod>2023-11-28T19:05:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-9-1030x413.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/screenshot-capture-playbook/</loc>
		<lastmod>2023-11-28T19:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image13-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image15-1-1030x391.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image13-4-1030x472.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image10-9-1030x625.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image8-5-1030x635.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image9-6-1030x696.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image11-7-1030x583.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image14-3-1030x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image7-5-1030x469.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image6-6-1030x495.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-10-1030x565.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-9-1030x739.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-12-1030x535.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-10-1030x593.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image12-4-1030x617.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-12-1030x663.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-knowledge-base/</loc>
		<lastmod>2023-11-28T19:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2017-05-23-at-2.52.21-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2017-05-23-at-2.52.21-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/track-to-the-future/</loc>
		<lastmod>2023-11-28T19:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/giphy.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image6-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-8-1030x536.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-8-1030x488.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-8-1030x520.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/RSAC-Swag-info-for-LP-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image12-3-1030x493.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image9-4-1030x490.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image10-7-1030x695.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image14-2-1030x643.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image7-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image11-6-1030x502.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-10-1030x493.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image8-4-1030x492.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/using-fancy-bear-ssl-certificate-information-to-identify-their-infrastructure/</loc>
		<lastmod>2023-11-28T19:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-21-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image14-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/1000081719-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-16-1030x457.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image7-8-1030x622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image12-6-1030x500.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Untitled-1700-x-1400-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Blog-image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/MSSP-RFI-Enablement.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/MSSP-Threat-Informed-Response.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image13-5-1030x574.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/MSSP-Threat-Intelligence-Informed-Detections.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/MSSP-Threat-Management-Enablement.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/MSSP-Vulnerability-Prioritization.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image16-1-1030x460.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Blog-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cole_Dan_933-22642264.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/1754592178005.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/force-active-directory-password-resets/</loc>
		<lastmod>2023-11-28T19:12:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-24-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-stix-taxii-is-important/</loc>
		<lastmod>2023-11-28T19:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2017-03-02-at-4.13.23-PM-e1488489771342-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2017-03-02-at-4.13.23-PM-e1488489771342.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-threatconnect-does-stix-taxii/</loc>
		<lastmod>2023-11-28T19:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/STIX-info.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/document-parsing-keyword-tagging/</loc>
		<lastmod>2023-11-28T19:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/first-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/first.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/second.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/Screen-Shot-2018-08-31-at-10.47.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-use-playbooks-to-populate-custom-attributes/</loc>
		<lastmod>2023-11-28T19:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/google-alerts-rss-reader/</loc>
		<lastmod>2023-11-28T19:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Google-Alert-RSS-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Google-Alert-RSS-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/google-alert-pb-setup.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/Screen-Shot-2018-08-31-at-10.47.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-group-and-indicator-comment-link-creators/</loc>
		<lastmod>2023-11-28T19:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Indicator-comment-link-creator.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/group-indicator-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Indicator-comment-link-creator-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/group-comment-link-install.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/robtex-asn-query-ip-query/</loc>
		<lastmod>2023-11-28T19:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Google-Alert-RSS-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ASN-query.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/robtex-asn-query-setup.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IP-Query.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/robtex-ip-query-setup.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/Screen-Shot-2018-08-31-at-10.47.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/task-management/</loc>
		<lastmod>2023-11-28T19:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-15-1030x249.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/domain-thrasher-graphic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/guccifer-2-0-all-roads-lead-to-russia/</loc>
		<lastmod>2023-11-28T19:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-playbook-actions/</loc>
		<lastmod>2023-11-28T19:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image00-24-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image00-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image01-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-retailers-get-started-with-threatconnect/</loc>
		<lastmod>2023-11-28T19:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image05-14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/quadrant-02-e1732218823316.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image01-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/isac-isao-threat-intelligence-sharing-platform/</loc>
		<lastmod>2023-11-28T19:27:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Pasted-image-at-2017_03_09-01_30-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Pasted-image-at-2017_03_09-01_34-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-power-of-crq-in-managing-software-supply-chain-risks/</loc>
		<lastmod>2023-12-19T20:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Copy-of-The-7-Critical-Elements-of-a-Robust-PIR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-threat-intel-is-critical-for-supply-chain-security/</loc>
		<lastmod>2023-12-19T20:39:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/06/Why-Threat-Intel-is-Critical-for-Supply-Chain-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cloud-delivered-cyber-threat-intelligence-platforms-bring-quick-time-to-value-2/</loc>
		<lastmod>2023-12-29T13:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cloud-Delivered-Cyber-Threat-Intelligence-Platforms-Bring-Quick-Time-to-Value-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-risk-quantification-is-the-icing-on-the-cake-for-security-frameworks-5/</loc>
		<lastmod>2023-12-29T13:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CRQ-cookbook.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/fbi-flash-on-ragnarlocker-ransomware-expands-known-indicators-of-compromise-2/</loc>
		<lastmod>2023-12-29T13:54:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RagnarLocker-Ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-risk-quantification-gives-your-security-team-a-leg-up-in-patch-management/</loc>
		<lastmod>2023-12-29T13:54:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/crq-patch-management.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-RTR-Whitepaper-cover-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-use-workflow-to-conduct-phishing-analysis-part-2-automating-phase-1/</loc>
		<lastmod>2023-12-29T13:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/phishing-analysis-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/phishing-hunting-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/phishing-email-hunting-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/workflow-phishing-playbook-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/phase-1-phishing-workflow.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/parse-email-content.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/run-automated-tasks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/outputs-parse-email.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/parse-email-content-complete.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/parse-email-body-playbook.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/outputs-virus-total-enrichment.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/email-body-virus-total.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/detonate-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/improving-accuracy-and-efficiency-in-security-operations-with-threatconnect/</loc>
		<lastmod>2023-12-29T13:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/its-time-to-make-crypto-assets-first-class-citizens-in-threat-intelligence/</loc>
		<lastmod>2023-12-29T13:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_754731742-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.34.26-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.34.39-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.34.47-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.34.57-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.35.10-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-01-14-at-2.35.19-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/make-more-confident-efficient-cve-patching-decisions-based-on-potential-impact/</loc>
		<lastmod>2023-12-29T14:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1_Threatconnect-CISO-Avatar-Sriya-without-text@3x-217x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-08-ThreatConnect-RQ-Integration-Blog-March-20211-1030x586.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-08-ThreatConnect-RQ-Integration-Blog-March-20212-1030x223.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-08-ThreatConnect-RQ-Integration-Blog-March-20213-1030x548.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/img_636e34856b736.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/qa-avevas-tim-grieveson-on-cyber-risk-management-and-critical-infrastructure/</loc>
		<lastmod>2023-12-29T14:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Tim-Grieveson-300x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/qa-joe-weiss-of-applied-control-solutions-on-control-systems-and-cybersecurity/</loc>
		<lastmod>2023-12-29T14:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/JoeWeiss-e1538250505395-300x300-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-tenets-of-threat-intelligence-operations-tenet-4-go-beyond-iocs/</loc>
		<lastmod>2023-12-29T14:11:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Tenet-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Pyramid-of-Pain-Graphic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/TI-Ops-Maturity-Journey.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Screen-Shot-2023-06-06-at-9.56.41-AM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Tenet-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-tenets-of-threat-intelligence-operations-tenet-5-automate-ti-ops-work/</loc>
		<lastmod>2023-12-29T15:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Tenet-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/7TenetsBlog-5-Enrichment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/7TenetsBlog-5-Playbook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Types-of-Intel-with-Produces-and-Consumer-Personas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-importance-of-assessing-communicating-the-financial-impact-of-cyber-risks/</loc>
		<lastmod>2023-12-29T15:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1913767132-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-04-13-at-12.29.54-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-power-of-combining-outside-in-and-inside-out-cyber-risk-quantification/</loc>
		<lastmod>2023-12-29T15:01:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Untitled-design-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-apivoid-fuel-orchestrations-with-instant-indicator-analysis/</loc>
		<lastmod>2023-12-29T15:04:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/APIVoid-Blog-1030x637.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-intel-471-comprehensive-intelligence-to-protect-your-mission/</loc>
		<lastmod>2023-12-29T15:04:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Intel-471.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Intel-471-blog-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-microsoft-azure-sentinel-the-new-age-of-incidents-and-alerts/</loc>
		<lastmod>2023-12-29T15:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-09-21-at-11.44.28-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-ti-ops-platform-7-4-faster-analysis-enhance-defenses/</loc>
		<lastmod>2024-01-10T19:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/TIOP7.4image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Assign_security_controls_coverage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/AI_Insights-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/faircon-2023-wrap-up-part-2-more-highlights-and-takeaways/</loc>
		<lastmod>2024-01-18T15:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/FAIRCon-2023-Wrap-up-Part-2-%E2%80%93-More-Highlights-and-Takeaways.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Screenshot-2024-01-02-at-8.21.12-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-netwitness-multiple-apps-allow-for-advanced-functionality/</loc>
		<lastmod>2024-01-23T13:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RSA-Netwitness-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-virustotal-enable-yara-hunting-and-better-malware-analysis/</loc>
		<lastmod>2024-01-23T13:59:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2020-11-06-at-10.32.46-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-supports-mitre-attck/</loc>
		<lastmod>2024-01-23T13:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/attck-blog-pic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/attck-blog-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/attck-blog-pic-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-intelligence-anywhere-puts-critical-information-within-fast-and-easy-reach/</loc>
		<lastmod>2024-01-23T14:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Intelligence-anywhere.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Screen-Shot-2022-10-25-at-10.39.06-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Screen-Shot-2022-12-27-at-11.48.10-AM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Screen-Shot-2022-10-25-at-10.36.42-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-effective-cybersecurity-narratives-are-built-using-quantitative-metrics/</loc>
		<lastmod>2024-01-23T14:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/advanced-cyberattacks-hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-threatconnects-intel-report-cards/</loc>
		<lastmod>2024-02-08T20:52:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/7-threat-intelligence-tools-your-team-needs-2/</loc>
		<lastmod>2024-02-15T22:45:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/getting-started-with-the-threatconnect-query-language-tql/</loc>
		<lastmod>2024-02-16T20:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/infrastructure-research-and-hunting-boiling-the-domain-ocean/</loc>
		<lastmod>2024-02-18T22:16:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work-2/</loc>
		<lastmod>2024-02-19T00:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-how-to-importing-indicators/</loc>
		<lastmod>2024-02-19T01:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-best-threat-intelligence-feeds/</loc>
		<lastmod>2024-02-19T01:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-stratego-strategic-vs-tactical-threat-intelligence/</loc>
		<lastmod>2024-02-19T05:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/piercing-the-cows-tongue-china-targeting-south-china-seas-nations-2/</loc>
		<lastmod>2024-02-19T05:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-ways-tips-can-enhance-your-siem/</loc>
		<lastmod>2024-02-19T19:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-choose-the-right-threat-intelligence-platform-for-you/</loc>
		<lastmod>2024-02-19T19:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-choose-the-right-soar-platform-a-checklist/</loc>
		<lastmod>2024-02-19T22:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-threatconnects-version-5-8/</loc>
		<lastmod>2024-02-19T23:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-ways-to-make-threat-analysis-actionable/</loc>
		<lastmod>2024-02-19T23:31:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/crimsonias-listening-for-an-3v1l-user-2/</loc>
		<lastmod>2024-02-19T23:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/casting-a-light-on-blackenergy-2/</loc>
		<lastmod>2024-02-20T05:10:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-processes-are-a-journey-not-a-destination/</loc>
		<lastmod>2024-02-20T05:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/finding-nemohosts/</loc>
		<lastmod>2024-02-20T05:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-jira-automating-processes-made-easier/</loc>
		<lastmod>2024-02-20T05:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-in-3rd-party-risk-assessment/</loc>
		<lastmod>2024-02-24T03:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/turning-cobalt-into-diamonds-building-an-actor-profile-for-hunting/</loc>
		<lastmod>2024-02-24T03:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-driven-risk-analysis-2/</loc>
		<lastmod>2024-02-24T06:01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-probable-sandworm-infrastructure-2/</loc>
		<lastmod>2024-02-24T06:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/opm-bream-analysis/</loc>
		<lastmod>2024-02-24T20:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/debugging-the-pakistan-cyber-army-from-pakbugs-to-bitterbugs/</loc>
		<lastmod>2024-02-24T20:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-build-a-basic-workflow-in-threatconnect/</loc>
		<lastmod>2024-02-24T20:16:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/take-a-deep-dive-into-threatconnects-workflow-capabilities/</loc>
		<lastmod>2024-02-24T20:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/duping-doping-domains-2/</loc>
		<lastmod>2024-02-24T20:27:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-takes-signature-management-to-the-next-level/</loc>
		<lastmod>2024-02-24T22:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-maltego/</loc>
		<lastmod>2024-02-24T22:12:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/may-the-fourth-be-with-you-a-star-wars-infosec-bibliography/</loc>
		<lastmod>2024-02-24T22:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-manage-and-integrate-signatures-in-threatconnect/</loc>
		<lastmod>2024-02-24T23:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/towards-data-driven-threat-intelligence/</loc>
		<lastmod>2024-02-25T00:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-apt39-adversaries/</loc>
		<lastmod>2024-02-25T00:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-possible-apt33-infrastructure-2/</loc>
		<lastmod>2024-02-25T03:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/step-1-collect-and-correlate-relevant-threat-data/</loc>
		<lastmod>2024-02-25T04:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-threatconnects-new-learning-portal/</loc>
		<lastmod>2024-02-25T04:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/what-is-a-cyber-threat-how-to-explain-cyber-threats-to-your-ceo/</loc>
		<lastmod>2024-02-25T18:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-mustang-panda-and-reddelta-plugx-using-same-c2-2/</loc>
		<lastmod>2024-02-25T18:17:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-one-a-threatconnect-story/</loc>
		<lastmod>2024-02-25T18:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/theres-something-about-mahdi/</loc>
		<lastmod>2024-02-25T19:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/lights-camera-actionable-intelligence/</loc>
		<lastmod>2024-02-27T19:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-vmray-better-malware-analysis/</loc>
		<lastmod>2024-02-27T20:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/identifying-context-for-unenriched-indicators-2/</loc>
		<lastmod>2024-02-28T04:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/fancy-bear-has-an-it-itch-that-they-cant-scratch/</loc>
		<lastmod>2024-02-28T04:08:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/china-hacks-the-peace-palace-all-your-eezs-are-belong-to-us/</loc>
		<lastmod>2024-02-28T05:07:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/what-can-cal-collective-analytics-layer-do-for-you/</loc>
		<lastmod>2024-02-28T18:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/integrations-arent-just-for-developers/</loc>
		<lastmod>2024-02-28T18:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-threatconnects-intel-report-cards-2/</loc>
		<lastmod>2024-02-28T18:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/whats-in-a-platform/</loc>
		<lastmod>2024-02-28T19:08:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/phantom-of-the-opaera-new-kasperagent-malware-campaign/</loc>
		<lastmod>2024-02-28T19:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/khaan-quest-chinese-cyber-espionage-targeting-mongolia/</loc>
		<lastmod>2024-02-28T21:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-mustang-panda-and-fancy-bear/</loc>
		<lastmod>2024-02-28T21:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-fbi-nsa-fancy-bear-report-followup/</loc>
		<lastmod>2024-02-28T21:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-cylance-better-endpoint-remediation/</loc>
		<lastmod>2024-02-29T21:01:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/when-dumpster-fires-make-you-wannacry/</loc>
		<lastmod>2024-02-29T21:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/64-bit-quarian-apt-malware-2/</loc>
		<lastmod>2024-02-29T21:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/orchestrate-actions-based-on-automating-phishing-email-analysis/</loc>
		<lastmod>2024-02-29T21:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-cost-of-bad-threat-intelligence/</loc>
		<lastmod>2024-02-29T21:55:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-sigma-signatures-increase-detection-capabilities/</loc>
		<lastmod>2024-03-02T22:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/do-you-make-swords-or-do-you-wield-them/</loc>
		<lastmod>2024-03-03T00:07:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/operation-poisoned-helmand/</loc>
		<lastmod>2024-03-03T01:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-introduces-version-5-6/</loc>
		<lastmod>2024-03-03T01:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-spoofing-sharepoint/</loc>
		<lastmod>2024-03-03T01:31:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-build-apps-in-threatconnect/</loc>
		<lastmod>2024-03-03T07:03:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/caught-in-our-net/</loc>
		<lastmod>2024-03-03T07:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-kimsuky-phishing-operations-putting-in-work-2/</loc>
		<lastmod>2024-03-03T07:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/roi-for-threat-intelligence-2/</loc>
		<lastmod>2024-03-03T07:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/dont-get-caught-up-in-the-hype-of-ai-for-security/</loc>
		<lastmod>2024-03-03T07:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/build-a-single-source-of-truth-2/</loc>
		<lastmod>2024-03-03T07:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-developer-partner-program-we-meme-business-2/</loc>
		<lastmod>2024-03-03T07:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-5-7-shows-advancements-in-playbooks-capabilities/</loc>
		<lastmod>2024-03-03T08:01:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/measuring-the-detection-and-response-gap/</loc>
		<lastmod>2024-03-03T23:25:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soar-an-incident-responders-best-friend/</loc>
		<lastmod>2024-03-03T23:56:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/state-board-election-rabbit-hole-2/</loc>
		<lastmod>2024-03-04T00:08:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/please-do-not-feed-the-phish/</loc>
		<lastmod>2024-03-04T03:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/orchestration-with-and-without-intelligence-whats-the-difference/</loc>
		<lastmod>2024-03-04T03:36:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-training-save-time-and-act-faster-with-playbooks/</loc>
		<lastmod>2024-03-04T03:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-and-the-downfall-of-the-galactic-empire/</loc>
		<lastmod>2024-03-04T03:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/7-tips-for-working-from-home/</loc>
		<lastmod>2024-03-04T03:55:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/intels-in-the-way-that-you-use-it-snoke-dont-you-know/</loc>
		<lastmod>2024-03-04T04:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/query-a-host-or-url-indicator-in-archive-orgs-wayback-machine/</loc>
		<lastmod>2024-03-04T04:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/improving-team-retention-with-soar/</loc>
		<lastmod>2024-03-04T20:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/whos-next-a-look-at-cal-2-6s-latest-additions/</loc>
		<lastmod>2024-03-04T20:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/getting-back-to-the-basics-of-actionable-threat-intelligence/</loc>
		<lastmod>2024-03-04T21:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-dollars-and-sense-behind-threat-intelligence-sharing/</loc>
		<lastmod>2024-03-04T22:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-streamline-threat-intel-sharing-before-lunch/</loc>
		<lastmod>2024-03-04T22:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-pagerduty-better-alert-management/</loc>
		<lastmod>2024-03-04T22:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/quickly-assess-maliciousness-of-suspicious-activity-with-analyze/</loc>
		<lastmod>2024-03-04T23:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/operation-arachnophobia-the-spy-der-who-loved-me/</loc>
		<lastmod>2024-03-04T23:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/now-available-cal-covid19-themed-newly-registered-domains-feed/</loc>
		<lastmod>2024-03-04T23:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/parlez-vous-fancy/</loc>
		<lastmod>2024-03-05T01:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/sending-aspiring-jedi-knights-to-dagobah-system/</loc>
		<lastmod>2024-03-05T17:25:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-kimsuky-autoupdate-malware/</loc>
		<lastmod>2024-03-05T17:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-kimsuky-autoupdate-malware-research-roundup-2/</loc>
		<lastmod>2024-03-05T17:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-tips-for-effective-threat-intelligence/</loc>
		<lastmod>2024-03-05T17:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/what-the-verizon-dbir-says-about-threat-intelligence-sharing/</loc>
		<lastmod>2024-03-05T18:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/premera-latest-healthcare-insurance-agency-to-be-breached/</loc>
		<lastmod>2024-03-05T19:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-power-and-responsibility-of-customer-data-and-analytics/</loc>
		<lastmod>2024-03-05T19:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/whats-the-rsa-conference-about/</loc>
		<lastmod>2024-03-05T19:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/black-hat-2020-sessions-not-to-be-missed/</loc>
		<lastmod>2024-03-05T19:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-cal-2-5/</loc>
		<lastmod>2024-03-05T20:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-suspected-naikon-dga-domains-2/</loc>
		<lastmod>2024-03-05T20:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/automation-anxiety-dont-worry/</loc>
		<lastmod>2024-03-05T20:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/i-got-99-problems-but-a-phish-aint-one/</loc>
		<lastmod>2024-03-05T20:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-the-rise-of-the-security-developer/</loc>
		<lastmod>2024-03-05T20:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-things-to-do-at-rsa-2019/</loc>
		<lastmod>2024-03-06T23:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/heartburn-over-heartbleed-assuming-the-worst/</loc>
		<lastmod>2024-03-06T23:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/crowdsourcing-threat-intelligence/</loc>
		<lastmod>2024-03-06T23:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/is-your-threat-intelligence-platform-just-a-tool/</loc>
		<lastmod>2024-03-06T23:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intelligence-sharing-empower-your-cyber-defense/</loc>
		<lastmod>2024-03-07T00:08:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-playbooks-2-0-and-browser-extension-creating-a-foundation-of-collaboration-with-threatconnect-6-2/</loc>
		<lastmod>2024-03-27T16:05:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rq-5-0-offers-new-automation-and-prioritization-to-better-respond-to-and-communicate-cyber-risk/</loc>
		<lastmod>2024-03-27T16:08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-companies-use-threatconnect-when-building-their-cybersecurity-program-a-use-case/</loc>
		<lastmod>2024-03-27T16:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-enables-healthy-networking-for-the-biomed-and-life-sciences-industry/</loc>
		<lastmod>2024-03-27T16:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/biden-executive-order-on-cybersecurity-aligns-with-risk-threat-response-approach-2/</loc>
		<lastmod>2024-03-27T16:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/good-news-threatconnects-cal-collective-analytics-layer-2-1-is-now-live/</loc>
		<lastmod>2024-03-27T16:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-suspicious-domain-redirects-to-google-account-security-page-2/</loc>
		<lastmod>2024-03-27T16:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-ryuk-and-domains-spoofing-eset-and-microsoft-2/</loc>
		<lastmod>2024-03-27T16:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-communities-a-swiss-army-knife-in-your-collaboration-arsenal/</loc>
		<lastmod>2024-03-27T16:21:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-alienlabs-otx-give-your-investigations-community-support/</loc>
		<lastmod>2024-03-27T16:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/research-roundup-mustang-panda-plugx-variant-samples-and-decryption-script-2/</loc>
		<lastmod>2024-03-27T16:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/best-practices-indicator-rating-and-confidence-2/</loc>
		<lastmod>2024-04-03T15:56:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/exploring-threatconnect-cal-ai-ml-powered-threat-intel/</loc>
		<lastmod>2024-04-17T12:07:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/Exploring-ThreatConnect-CAL%E2%84%A2-AI-ML-Powered-Threat-Intel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/AI_Insights-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-a-new-partnership-between-bayse-and-threatconnect/</loc>
		<lastmod>2024-04-17T12:09:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/TCBayse-Image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/bayse-usps_sms.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/bayse-campaign_grouping_visual.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/bayse-campaign_unknown.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/bayse-compromised_site.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-anthem-hack-all-roads-lead-to-china/</loc>
		<lastmod>2024-04-23T18:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/premera-update.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Well-VAE-Overlaps.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/li-reg-overlaps1-1024x551.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/topsec2014-hist-1024x571.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2015-02-25-at-5.20.37-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2015-02-23-at-9.22.35-AM-881x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/relationships.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2015-02-26-at-4.12.20-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/lin-yong-lion-1024x441.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-role-of-cyber-threat-intelligence-in-election-security/</loc>
		<lastmod>2024-04-23T18:09:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/role-of-CTI-in-election-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Election-IR.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/TI-Ops-AI-Insights-light-74.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/TI-Ops-ATTACK-Viz-Threat-Group-Light-74.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-celebrates-2023-as-a-banner-year-for-business-growth-product-innovation-and-industry-recognition/</loc>
		<lastmod>2024-04-29T02:21:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/ThreatConnect-Celebrates-Business-Growth-and-Product-Innovation-in-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/faircon-2023-wrap-up-our-biggest-highlights-and-takeaways/</loc>
		<lastmod>2024-04-29T02:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/FAIRCon-2023-Wrap-up-Our-Biggest-Highlights-and-Takeaways.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/looking-forward-to-seeing-you-at-sector-2023/</loc>
		<lastmod>2024-04-29T02:23:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Sector-2023-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/SecTor-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/SecTor-Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-0-the-industrys-first-threat-intelligence-operations-ti-ops-platform/</loc>
		<lastmod>2024-04-29T02:27:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/ThreatConnect-7.0-The-Industrys-First-Threat-Intelligence-Operations-TI-Ops-Platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Screen-Shot-2022-12-01-at-10.53.40-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/BIE-Detailed-View.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Indicator-Details-Page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/inside-the-lean-six-sigma-of-cybersecurity/</loc>
		<lastmod>2024-04-29T02:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/lean-six-sigma.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/understanding-the-secs-recent-cybersecurity-regulations/</loc>
		<lastmod>2024-05-08T18:21:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/SEC-Regulations-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/create-intelligence-requirements-in-5-easy-steps/</loc>
		<lastmod>2024-05-28T19:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/5-ways-of-IRs-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/intelligence-requirements-guide-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-tenets-of-threat-intel-operations-tenet-3/</loc>
		<lastmod>2024-05-28T19:25:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/7-Tenants-of-TIOps-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/SANS-2023-PIR-Graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Tenet-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/opm-breach-analysis-update/</loc>
		<lastmod>2024-05-28T19:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/intelligence-powered-cybersecurity-for-state-local-and-territorial-governments/</loc>
		<lastmod>2024-05-28T19:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Intelligence-Powered-Cybersecurity-for-State-Local-and-Territorial-Governments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/dawn-ti-ops-thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/7-Tenants-of-TIOps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/lets-talk-about-cisos-and-cyber-risk-quantification/</loc>
		<lastmod>2024-05-28T19:32:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/CISOs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-need-for-an-evolved-threat-intel-lifecycle/</loc>
		<lastmod>2024-06-06T15:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/Evolved-Threat-Intel-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/image10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/elevate-your-threat-intel-with-cal-feeds-and-ai-powered-insights/</loc>
		<lastmod>2024-06-25T20:31:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Copy-of-Blog-Post-Share-Templates-square-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/TI-Ops-Feed-Explorer-CAL-Light-74.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/TI-Ops-Feed-and-Report-Card-Light-74.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/a-new-integration-with-elastic/</loc>
		<lastmod>2024-06-27T15:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/TC-Elastic-e1760008970114.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/TC-and-Elastic-Integrations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/recognizing-the-limitations-of-fair/</loc>
		<lastmod>2024-06-27T20:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/RQ-screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-polaritys-chrome-extension/</loc>
		<lastmod>2024-10-15T22:07:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Polarity-Chrome-Extension.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-polarity-web-search/</loc>
		<lastmod>2024-10-16T02:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/Polarity-latest-feature-web-search.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-in-action-event-triage/</loc>
		<lastmod>2024-10-28T04:17:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Event-Triage-Polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-powerful-splunk-queries-to-enhance-your-team/</loc>
		<lastmod>2024-10-28T04:23:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/splunk2-featured-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/splunk-queries.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/maturing-cyber-processes-enhancing-sop-reliability/</loc>
		<lastmod>2024-10-28T04:24:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/SOP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/maturing-cyberprocesses-e1730088491923.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/delivering-polarity-via-iframe-in-your-favorite-workflow-tools/</loc>
		<lastmod>2024-10-28T04:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Polarity-iframe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/splunk-iframe-picture-1-e1730088793978.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Splunk-iframe-pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-focus-mode/</loc>
		<lastmod>2024-10-28T04:30:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/focus-mode-blog-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/focus-mode-pic-1-e1730089673800.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/focus-mode-video.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/focus-mode-pic-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-phishing-triage/</loc>
		<lastmod>2024-10-29T01:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/phishing-trriage-polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/phishing-trriage-polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-determining-asset-criticality-during-event-triage/</loc>
		<lastmod>2024-11-07T16:58:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Event-triage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/event-triage-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/event-triage-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-follow-the-swing/</loc>
		<lastmod>2024-11-07T17:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/11/Follow-the-swing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Image-1-follow-the-swing-e1730999107450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Image-2-follow-the-swing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Image-3-follow-the-swing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-developing-the-analyst-team/</loc>
		<lastmod>2024-11-07T17:55:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Developing-the-Analyst-Team-Polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Developing-the-Analyst-Team-Image-1-e1731001682167.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-share-with-your-friends-in-ir/</loc>
		<lastmod>2024-11-07T20:03:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/SOC-series-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/SOC-series-share-with-your-friends-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/10/share-with-your-friends-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-get-more-from-soar/</loc>
		<lastmod>2024-11-07T20:10:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Get-More-from-SOAR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Get-More-from-SOAR-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Get-More-from-SOAR-Image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-flawless-handoffs-during-shift-change/</loc>
		<lastmod>2024-11-07T20:33:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Flawless-handoffs-during-shift-change.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Flawless-handoffs-during-shift-change-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Flawless-handoffs-during-shift-change-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Flawless-handoffs-during-shift-change-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-hash-value-decoder-ring/</loc>
		<lastmod>2024-11-07T21:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Hash-Value-Decorder-Ring.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Hash-Value-Decorder-Ring-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-instant-awareness-for-user-identities-devices/</loc>
		<lastmod>2024-11-07T21:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Instant-Awareness-for-User-Identities-and-devices.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Instant-Awareness-for-User-Identities-and-devices-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Instant-Awareness-for-User-Identities-and-devices-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soc-series-domain-reputation-on-sight/</loc>
		<lastmod>2024-11-08T16:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Domain-Reputation-on-Sight-e1731082243265.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/SOC-series-domain-reputation-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/SOC-series-domain-reputation-Image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Terry-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/open-season-hunting-adversaries-with-polarity-and-hyas/</loc>
		<lastmod>2024-11-08T17:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/hyas-Polarity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/unlock-enhanced-threat-detection-with-threatconnect-and-crowdstrike/</loc>
		<lastmod>2024-11-13T19:31:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/unnamed-file-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/does-a-bear-leak-in-the-woods/</loc>
		<lastmod>2024-11-19T22:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rebooting-watergate-tapping-into-the-democratic-national-committee/</loc>
		<lastmod>2024-11-20T21:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/know-every-binary-that-has-ever-run-in-your-environment/</loc>
		<lastmod>2024-11-21T17:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2017/02/Binary-e1732211500359.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/empowering-teams-with-data-awareness/</loc>
		<lastmod>2024-11-21T18:27:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/data-awareness-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/data-awareness-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/data-awareness-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/data-awareness-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/data-awareness-image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/enabling-teams-with-data-recall/</loc>
		<lastmod>2024-11-21T18:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/06/data-recall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/survey-says-soc-still-plagued-by-inefficiency/</loc>
		<lastmod>2024-11-21T19:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/quadrant-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/quadrant-02-e1732218823316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/immediately-triage-threats-with-the-polarity-hyas-integration/</loc>
		<lastmod>2024-11-27T17:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/HYAS-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-use-case-cve-analysis/</loc>
		<lastmod>2024-11-27T18:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/07/cve-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-polarity-can-help-data-loss-prevention/</loc>
		<lastmod>2024-12-02T18:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/04/Polarity-DLP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-pulsedive-integration/</loc>
		<lastmod>2024-12-05T17:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/pulsedive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/save-time-by-recognizing-machine-time/</loc>
		<lastmod>2024-12-05T18:43:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/05/epoch-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/05/Screenshot-2024-12-05-at-1.36.47-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/05/Screenshot-2024-12-05-at-1.39.33-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Image-3-Epoch-Time.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-the-polarity-heads-up-display/</loc>
		<lastmod>2024-12-05T19:04:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/the-hud-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Hudgif-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/annotating-building-a-collective-memory/</loc>
		<lastmod>2024-12-05T19:43:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Building-a-collective-memory-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Building-a-collective-memory-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Building-a-collective-memory-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/leveraging-ldap-with-polarity/</loc>
		<lastmod>2024-12-06T16:55:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/LDAPnew-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/LDAPIntegration.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/new-integration-framework-updates-increase-interactivity/</loc>
		<lastmod>2024-12-06T17:30:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/increasing-interactions-with-new-integration-enhancement-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/increasing-interactions-with-new-integration-enhancement-image-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/increasing-interactions-with-new-integration-enhancement-image-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/increasing-interactions-with-new-integration-enhancement-image-3-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-polaritys-3-2-client-release/</loc>
		<lastmod>2024-12-06T18:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/latest-release_Artboard-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/latest-polarity-release/</loc>
		<lastmod>2024-12-06T18:44:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/latest-release.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-4.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-5.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Latest-release-image-6.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-urlscan-integration/</loc>
		<lastmod>2024-12-06T19:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/urlscan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/urlscan-gif.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/productivity-part-i/</loc>
		<lastmod>2024-12-10T21:07:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/productivity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/productivity-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/productivity-image-2-e1733864777534.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-hardest-part-of-remote-work-and-how-to-tackle-it-part-ii/</loc>
		<lastmod>2024-12-10T21:50:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Remote-work-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-hardest-part-of-remote-work-and-how-to-tackle-it-part-i/</loc>
		<lastmod>2024-12-10T21:51:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/02/Remote-Work.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-best-tools-to-keep-your-remote-security-team-on-the-same-page/</loc>
		<lastmod>2024-12-11T16:30:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/remote-security-blog-image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/weve-built-an-actual-hud-not-a-dashboard/</loc>
		<lastmod>2024-12-12T17:19:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Polarity-HUD.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Polarity-theHUD-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Polarity-theHUD-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Polarity-theHUD-image-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Polarity-theHUD-image-4.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/seamlessly-analyze-windows-events-with-polarity/</loc>
		<lastmod>2024-12-16T17:35:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Windows-Events.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-avoid-security-analyst-burnout/</loc>
		<lastmod>2024-12-16T21:40:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/23-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-is-tool-fatigue-adding-complexity-to-your-workflow/</loc>
		<lastmod>2024-12-16T21:46:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/fatigue-blog-Polarity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/what-comes-after-data-to-everything/</loc>
		<lastmod>2024-12-16T22:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/what-comes-after-data-to-everything.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Dan-Ramaswami.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/do-you-see-the-story-your-data-is-telling/</loc>
		<lastmod>2024-12-16T22:24:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/humans-Morey-01-2-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/CP-Morey.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-confluence-integration/</loc>
		<lastmod>2024-12-16T22:37:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/confluence_Artboard-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/watch-our-se-take-the-polarity-challenge/</loc>
		<lastmod>2024-12-18T03:25:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/what-is-polarity-3point2-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/always-know-if-that-url-is-malicious/</loc>
		<lastmod>2024-12-18T03:30:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/URL-is-malicious-blog-e1734492605313.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/remembering-network-ports-and-services/</loc>
		<lastmod>2024-12-18T03:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Remembering-Network-Ports-and-Services-e1734492891254.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-vulndb-integration/</loc>
		<lastmod>2024-12-18T04:10:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/vulndb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soar-higher-with-polarity/</loc>
		<lastmod>2024-12-18T04:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/SOAR-cover-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/navigate-iso-270012022-compliance-with-threatconnect/</loc>
		<lastmod>2024-12-20T16:41:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/tactical-threat-hunting-what-is-it-and-how-do-you-start/</loc>
		<lastmod>2025-01-30T15:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1095422036-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/soar-reactive-threat-hunting-part-1/</loc>
		<lastmod>2025-01-30T15:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/2020-12-17_11-21-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/2020-12-17_11-21-56.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/five-quick-tips-to-enhance-your-threat-hunting-program/</loc>
		<lastmod>2025-01-30T15:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-software-vendors-can-leverage-cyber-threat-intelligence-for-threat-hunting/</loc>
		<lastmod>2025-01-30T15:44:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1248824089-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Operationalize-Threat-Intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/faketivist-vs-hacktivist-how-they-differ-2/</loc>
		<lastmod>2025-02-26T18:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/12/hacktivist-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-for-phishing-email-analysis/</loc>
		<lastmod>2025-03-05T22:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-open-source-intelligence-integrations/</loc>
		<lastmod>2025-03-06T03:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-critical-elements-of-a-robust-pir/</loc>
		<lastmod>2025-03-26T15:53:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/The-7-Critical-Elements-of-a-Robust-PIR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/applying-the-diamond-model-for-threat-intelligence-to-the-star-wars-battle-of-yavin/</loc>
		<lastmod>2025-03-26T15:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/06/Diamond-model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2015/08/Diamond-Model.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IPSO-Outcome3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dsdm_victim-300x125.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IPSO-Outcome5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IPSO-Outcome4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-using-annotations-in-polarity/</loc>
		<lastmod>2025-03-26T18:57:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/annotate-cover-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-reference-channels/</loc>
		<lastmod>2025-03-26T18:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/tips-Polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Polarity-ref-channel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-polarity-modes/</loc>
		<lastmod>2025-03-26T18:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/polarity-tips2_Artboard-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/image-1-tips.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/image-2-tips.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/image-3-tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-single-monitor-setup/</loc>
		<lastmod>2025-03-26T18:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/polarity-tips_Artboard-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/image-1-polarity-tips.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Image-2-polarity-tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-ip-social-distancing/</loc>
		<lastmod>2025-03-26T18:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/productivity2-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-reference-channels-python-standards/</loc>
		<lastmod>2025-03-26T18:59:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/python-standards.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-reference-channels-postgresql-error-codes/</loc>
		<lastmod>2025-03-26T18:59:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/06/reference-channels-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-reference-channels-ansible-modules/</loc>
		<lastmod>2025-03-26T18:59:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Polarity-ref-channels-Ansible-Modules.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Polarity-Ref-channels-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-reference-channels-microsoft-bug-check-code-references/</loc>
		<lastmod>2025-03-26T18:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/Polarity-Helpful-tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/access-the-mitre-attck-framework-with-polarity-reference-channels/</loc>
		<lastmod>2025-03-26T18:59:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/MITRE-Attck.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-prepare-for-a-threat-intel-ops-platform-project/</loc>
		<lastmod>2025-03-26T19:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Threat-Intel-platform-project-blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/meadows-lara.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cole-dan-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/caldwell-jody-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/bussa-toby-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/tips-tricks-to-get-the-most-out-of-rsac-2025/</loc>
		<lastmod>2025-04-22T13:46:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Screen-Shot-2025-04-21-at-3.37.13-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/evolution-of-the-threat-intelligence-products-and-services-market-our-take-on-the-latest-gartner-market-guide/</loc>
		<lastmod>2025-04-30T18:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Gartner-MG-2023-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Screen-Shot-2023-05-17-at-1.59.41-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/human-in-loop-playbook-systems/</loc>
		<lastmod>2025-04-30T18:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/tc-graphic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-3-15-pic-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-abuse-contacts-for-host/</loc>
		<lastmod>2025-04-30T18:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-11-1030x316.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-11-1030x443.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/IMG_5619-scaled-e1746812870226.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-10-1030x323.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-14-1030x134.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/managing-security-apis/</loc>
		<lastmod>2025-04-30T18:45:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image6-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-1-1030x488.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image2-27-1030x465.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-18-1030x459.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image5-19-1030x460.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image3-22-1030x459.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-dashboards-for-ukraine-conflict-threat-intelligence/</loc>
		<lastmod>2025-04-30T18:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.05.54-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.04.41-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.05.01-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.05.23-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.05.33-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-03-07-at-3.05.44-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/prioritize-and-respond-to-threats-with-the-smarter-soar-platform/</loc>
		<lastmod>2025-04-30T19:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/indicator-defanging/</loc>
		<lastmod>2025-04-30T19:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PBF-4-19-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/importing-component.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ioc-defanging-demo.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ioc-defanging-pb-creation-demo.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/visit-the-threatconnect-museum-of-cyber-defense-past-and-future/</loc>
		<lastmod>2025-05-09T19:38:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/TC-RSAC-Booth-e1746812928893.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/stone-tablet-attack-pexels-khezez-23432372-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/rsac-tshirt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/IMG_5619-scaled-e1746812870226.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/feedly-threatconnect-integration/</loc>
		<lastmod>2025-05-15T15:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Know-Before-You-Go.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Feedly-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/feedly2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/from-intelligence-to-business-impact-2025-sans-cti-survey/</loc>
		<lastmod>2025-06-05T16:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/SANS-CTI-2025.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/one-detection-to-rule-them-all-lessons-from-saurons-security-failure/</loc>
		<lastmod>2025-06-12T16:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/two_towers_4k_eye_of_sauron.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/1-1024x561.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/supercharge-your-workflow-introducing-polaritys-document-search-and-enhanced-api-security/</loc>
		<lastmod>2025-07-08T19:56:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/docanalysis.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/native-domain-abuse-alerting-informing-threat-ops-threatconnects-domainthrasher/</loc>
		<lastmod>2025-07-15T18:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/domain-thrasher-graphic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/domainthrasher-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/unnamed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-companies-that-transformed-threat-intelligence-operations-with-automation-ai-and-real-time-collaboration/</loc>
		<lastmod>2025-07-23T13:24:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/blog-icon-simple-v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/top-5-threatconnect-resources-for-malware-analysis/</loc>
		<lastmod>2025-07-23T13:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-9-is-live-smarter-slas-unified-search-and-more-control-for-security-teams/</loc>
		<lastmod>2025-07-30T16:06:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Untitled-1200-x-628-px-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/shiny-object-guccifer-2-0-and-the-dnc-breach/</loc>
		<lastmod>2025-08-05T02:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/06/Guccifer-2.0-Timeline-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/06/screenshotout.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/06/sofacy-ip-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/06/Guccifer2_french_tweet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/06/Guccifer2_french_follows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/dnc-association-does-not-compute/</loc>
		<lastmod>2025-08-06T16:46:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-state-and-local-agencies-can-rise-to-new-cybersecurity-mandates-with-threatconnect/</loc>
		<lastmod>2025-08-08T17:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Know-Before-You-Go-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/2023-an-innovative-year-for-the-threatconnect-ti-ops-platform/</loc>
		<lastmod>2025-08-20T19:32:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/2023-An-Innovative-Year-for-the-ThreatConnect-TI-Ops-Platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/An-Innovative-Year-for-the-ThreatConnect.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/3-strategies-for-dealing-with-the-widening-cybersecurity-skills-gap/</loc>
		<lastmod>2025-08-20T19:32:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_669170635-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/4-key-drivers-accelerating-cyber-risk-quantification/</loc>
		<lastmod>2025-08-20T19:33:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1031044363-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-reasons-cisos-need-security-operations-automation-and-orchestration-soar-2/</loc>
		<lastmod>2025-08-20T19:33:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-reasons-to-mark-a-false-positive-in-threatconnect/</loc>
		<lastmod>2025-08-20T19:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-steps-to-combat-phishing-with-intelligence-powered-security-operations/</loc>
		<lastmod>2025-08-20T19:35:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Phishing-Webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/5-ways-an-intelligence-driven-soar-platform-can-help-your-secops-team/</loc>
		<lastmod>2025-08-20T19:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/intel-driven-soar-graphic-1030x694.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/8-ways-soc-ir-teams-can-use-threatconnects-workflow/</loc>
		<lastmod>2025-08-20T19:36:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/a-long-way-in-11-years-im-passing-the-torch-at-threatconnect/</loc>
		<lastmod>2025-08-20T19:38:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/a-penny-for-your-thoughts-whats-new-in-cal-2-9/</loc>
		<lastmod>2025-08-20T19:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/lewis-kang-ethe-ngugi-f5pTwLHCsAg-unsplash-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/unnamed-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/unnamed-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Whats-new-in-CAL-2.9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1_unnamed-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/unnamed-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/unnamed-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/a-tale-of-two-koreas-keeping-watch-over-the-digital-dmz/</loc>
		<lastmod>2025-08-20T19:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/achieve-faster-more-precise-vulnerability-prioritization-with-threatconnect-and-vulncheck/</loc>
		<lastmod>2025-08-20T19:40:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Untitled-design-8-e1729005652993.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Vcheck-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/vcheck-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/adversary-intelligence-getting-behind-the-keyboard/</loc>
		<lastmod>2025-08-20T19:40:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/always-know-a-vulnerabilitys-weak-point-with-the-polarity-rapid7-attackerkb-integration/</loc>
		<lastmod>2025-08-20T19:41:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Rapid-7-01-e1730172987904.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screen-Shot-2020-12-09-at-12.00.54-AM-e1730173254517.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-the-polarity-community-contributor-of-the-quarter-april-2023/</loc>
		<lastmod>2025-08-20T19:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/ctt_community-badge-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-the-polarity-community-contributor-of-the-quarter-january-2021/</loc>
		<lastmod>2025-08-20T19:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/ctt_community-badge-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-the-polarity-community-contributor-of-the-quarter-june-2020/</loc>
		<lastmod>2025-08-20T19:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/CTT_community-badge-banner-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-the-polarity-community-contributor-of-the-quarter-september-2020/</loc>
		<lastmod>2025-08-20T19:44:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/ctt_community-badge-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/automatically-access-key-intelligence-reports-with-the-polarity-flashpoint-integration/</loc>
		<lastmod>2025-08-20T19:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Flashpoint-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/automating-threat-data-retrieval-how-the-tql-generator-is-changing-the-game/</loc>
		<lastmod>2025-08-20T19:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Untitled-LinkedIn-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/balancing-the-benefits-and-challenges-of-fair-a-practitioners-view/</loc>
		<lastmod>2025-08-20T19:47:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/FAIR-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/CSF-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Screen-Shot-2023-03-13-at-11.10.35-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/being-thorough-or-working-fast-which-matters-most-in-security/</loc>
		<lastmod>2025-08-20T19:47:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Being-Thorough-or-working-fast-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/best-practices-for-writing-playbooks-in-threatconnect-part-1/</loc>
		<lastmod>2025-08-20T19:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cody-blog-post-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cody-blog-post-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/beyond-information-sharing-dhs-begins-cyber-risk-quantification-push/</loc>
		<lastmod>2025-08-20T19:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/21-005_Systemic-Cyber-Risk-Reduction_GRAPHICS_BLOG_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/EP-3a-banner-300x175.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/big-changes-are-coming-to-the-cyber-insurance-industry/</loc>
		<lastmod>2025-08-20T19:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cyber-risk-insurance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/bitsights-acquisition-of-visiblerisk-a-view-from-the-crq-world/</loc>
		<lastmod>2025-08-20T19:50:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1389723656-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/black-hat-usa-2022-cybersecurity-conference-highlights/</loc>
		<lastmod>2025-08-20T19:51:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Black-Hat-USA-2022-Conference-Highlights.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cal-2-2-brings-improved-data-hygiene-and-more-robust-graph-modeling/</loc>
		<lastmod>2025-08-20T19:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-future-of-threat-intelligence-for-large-enterprises/</loc>
		<lastmod>2025-08-22T18:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/The-Future-of-Threat-Intelligence-for-Large-Enterprises.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/improving-the-factor-analysis-of-information-risk-standard-time-to-value/</loc>
		<lastmod>2025-08-26T15:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/FAIR-TTV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-every-team-needs-federated-search/</loc>
		<lastmod>2025-08-26T15:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federatedsearch-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-2-e1730173735974.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-3-e1730173800380.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-5-e1730174150390.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/federated-search-pic-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-polarity-threatconnect/</loc>
		<lastmod>2025-08-26T15:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/polarity-before-and-after-v4_2-after.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/building-out-protonmail-spoofed-infrastructure-with-creation-timestamp-pivoting/</loc>
		<lastmod>2025-08-26T15:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-zoom-coordinated-communications-as-part-of-incident-response/</loc>
		<lastmod>2025-08-26T15:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-benefits-of-intelligence-powered-cyber-defense-with-threatconnect-and-vmray/</loc>
		<lastmod>2025-08-26T15:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/TC-and-VMRay-Graphic-e1729787237560.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/VMray.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/search-for-anything-with-the-polarity-google-custom-search-integration-part-2/</loc>
		<lastmod>2025-08-26T15:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/CSE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/CSE-part-2-pic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/CSE-Part-2-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/CSE-Part-2-pic-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/security-teams-can-spend-less-time-querying-more-time-analyzing-with-polaritys-updated-splunk-integration/</loc>
		<lastmod>2025-08-26T15:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/10/splunk-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/10/Splunk-Integration-with-Polarity.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-rq-integration-with-servicenow-to-enhance-governance-risk-and-compliance-is-now-available/</loc>
		<lastmod>2025-08-26T15:37:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/RQ-for-SNOW-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/unlocking-the-potential-of-cyber-threat-intelligence-a-guide-to-the-threat-intelligence-maturity-model/</loc>
		<lastmod>2025-08-26T15:39:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Screenshot-2024-12-04-at-6.04.48-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/threat-image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/threat-image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/threat-image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/threat-image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/threat-image-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/securonix-launches-chatgpt-integration-harnessing-the-power-of-gen-ai-to-reduce-incident-response-time/</loc>
		<lastmod>2025-08-26T15:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Securonix-Polarity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/expose-data-breaches-with-actionable-intelligence-using-the-polarity-cyber-risk-analytics-integration/</loc>
		<lastmod>2025-08-26T15:39:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/CyberRisk-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-ibm-polarity-integration-is-the-1-2-3-combo-cyber-security-professionals-have-been-looking-for/</loc>
		<lastmod>2025-08-26T15:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/IBM-Polarity-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-instantaneous-awareness-of-threat-intelligence-with-the-polarity-recorded-future-integration/</loc>
		<lastmod>2025-08-26T15:45:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/recordedfuture-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polaritys-year-in-review-what-we-learned-how-we-changed-what-we-want-to-accomplish-in-2020/</loc>
		<lastmod>2025-08-26T15:45:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/2019-year-review-Polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Paul-Battista-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Joeseph-Rivela-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Ed-Dorsey-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-companies-use-threatconnect-to-make-their-cybersecurity-programs-more-efficient-a-use-case/</loc>
		<lastmod>2025-08-26T15:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-immediate-data-awareness-on-mandiant-threat-intelligence-with-the-new-polarity-integration/</loc>
		<lastmod>2025-08-26T15:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Fireeye-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Fire-eye-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/polarity-user-tips-the-ultimate-guide-to-leveraging-color-theory-for-instant-data-recognition/</loc>
		<lastmod>2025-08-26T15:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/Polarity-tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/transforming-third-party-risk-strategy-with-financial-risk-quantification-securityscorecard/</loc>
		<lastmod>2025-08-26T15:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-even-better-data-awareness-recall-with-the-updated-polarity-threatquotient-integration/</loc>
		<lastmod>2025-08-26T15:49:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Threatquotient.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/higher-fidelity-investigations-with-actionable-search-tql-generator-and-more-in-ti-ops-7-8/</loc>
		<lastmod>2025-08-26T15:49:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/Webinar-LinkedIn-Post-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-polarity-google-translate-integration-introduces-a-simple-solution-to-a-global-problem/</loc>
		<lastmod>2025-08-26T15:50:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Google-translate-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-cisco-identity-services-engine-ise-streamline-security-policy-updates-2/</loc>
		<lastmod>2025-08-26T15:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-twilio-supporting-human-in-the-loop-orchestration-and-sms-notifications/</loc>
		<lastmod>2025-08-26T15:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/creating-order-from-chaos-enabling-even-better-decision-making-with-threatconnect-6-0/</loc>
		<lastmod>2025-08-26T15:53:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/enhancing-cybersecurity-with-cal-automated-threat-library-industry-classification/</loc>
		<lastmod>2025-08-26T15:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Heading-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/CAL-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/CAL-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/kinetic-and-potential-energy-framework-applying-thermodynamics-to-threat-intelligence/</loc>
		<lastmod>2025-08-26T15:56:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-2024-year-in-review/</loc>
		<lastmod>2025-08-26T15:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Blog-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Blog-Image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/instant-contextual-awareness-of-new-and-emerging-threats-with-polarity-and-advintel/</loc>
		<lastmod>2025-08-26T15:58:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Advintel-and-Polarity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Image-1-AdvIntel-and-Polarity-e1731000759887.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-the-threatconnect-buyers-guide-for-cyber-risk-quantification-solutions/</loc>
		<lastmod>2025-08-26T15:58:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Screen-Shot-2024-03-12-at-10.52.56-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Copy-of-BPTW-Award.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-polarity-intel-471-integration-arms-users-with-instant-cybercrime-intelligence/</loc>
		<lastmod>2025-08-26T15:58:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/intel47-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-cisco-secure-access-by-duo-save-time-during-idam-investigations/</loc>
		<lastmod>2025-08-26T15:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rapidly-triage-network-detection-response-with-the-polarity-gigamon-integration/</loc>
		<lastmod>2025-08-26T16:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/07/gigamon-social-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/realizing-the-benefits-of-security-orchestration-automation-and-response-soar-2/</loc>
		<lastmod>2025-08-26T16:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-twitter-hacked-and-apt29-targets-covid-19-vaccine/</loc>
		<lastmod>2025-08-26T16:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/detect-phishing-attempts-instantaneously-with-the-polarity-emailrep-integration/</loc>
		<lastmod>2025-08-26T16:02:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/EmailRep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-the-right-data-at-the-right-time-with-the-polarity-cortex-xsoar-integration/</loc>
		<lastmod>2025-08-26T16:02:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/03/CortexSOAR-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/search-for-anything-with-the-polarity-google-custom-search-integration-part-1/</loc>
		<lastmod>2025-08-26T16:02:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/CSE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Polarity-google-CSE-part-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-director-of-information-security-compliance-shares-the-three-keys-to-managing-three-teams-at-once/</loc>
		<lastmod>2025-09-18T15:27:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/SEP-people-of-tc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-axe-throwing-ex-cia-head-of-product-ai-research-ai-should-unlock-creativity-not-replace-it/</loc>
		<lastmod>2025-09-18T15:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/IMG_9300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-non-traditional-threat-expert-sometimes-youve-got-to-look-at-the-bigger-picture/</loc>
		<lastmod>2025-09-18T15:47:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Screen-Shot-2025-06-26-at-5.17.22-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-resident-disney-princess-be-like-alice-dont-fear-the-rabbit-holes/</loc>
		<lastmod>2025-09-18T15:52:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/v2-Marika-people-of-tc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-bayesian-expert-its-time-to-look-beyond-cool-data-models/</loc>
		<lastmod>2025-09-18T15:54:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/people-of-tc-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-context-from-misp-warning-lists-as-you-work-using-the-polarity-integration/</loc>
		<lastmod>2025-09-23T13:30:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/misp-warning-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/harness-the-power-of-your-digital-shadows-data-without-breaking-your-workflow/</loc>
		<lastmod>2025-09-23T13:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/02/digital-shadows-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/02/digital-shadows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/react-immediately-to-insider-threats-with-the-polarity-securonix-integration/</loc>
		<lastmod>2025-09-23T13:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/04/Securonix-upload-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-immediate-awareness-of-malware-with-the-polarity-cybereason-integration/</loc>
		<lastmod>2025-09-23T13:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/02/Polarity-CyberReason.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/elevate-your-threat-detection-and-response-with-threatconnect-and-dataminr/</loc>
		<lastmod>2025-09-23T13:37:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/ThreatConnect-Dataminr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Test-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-provides-a-report-on-healthcare-and-medical-industry-threats/</loc>
		<lastmod>2025-09-23T13:38:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/getting-left-of-boom-how-threatconnect-enables-proactive-cybersecurity/</loc>
		<lastmod>2025-09-23T13:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-use-threat-intelligence-orchestration-to-defeat-stranger-threats/</loc>
		<lastmod>2025-09-23T13:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-use-workflow-to-do-phishing-analysis-part-1-defining-the-process/</loc>
		<lastmod>2025-09-23T13:42:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Workflow-Refresher-Cat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Why-Phishing-Analysis-Cat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-What-am-I-doing-with-my-lives-Cat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Workflow-Phishing-Email-Analysis.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase-1-Identify-Phishing-Technique.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Phase6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Installing-the-Phishing-Email-Analysis.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-TC-Exchange-Templates1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-TC-Exchange-Templates2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Find-the-Phishing-Email-Analysis-template.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Workflow-Toggle-Off.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Blog-Workflow-Active-Toggle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/introducing-the-threatconnect-threat-intelligence-operations-buyers-guide/</loc>
		<lastmod>2025-09-23T13:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/buyers-guide-threat-intelligence-operations-e1695953255244.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/measure-and-communicate-cyberrisk/</loc>
		<lastmod>2025-09-23T13:44:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1786634207.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-google-drive-easily-automate-file-storage-in-the-cloud/</loc>
		<lastmod>2025-09-23T13:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cloud-6515064_1920.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/GoogleDriveApp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-new-whitepaper-is-a-must-read-for-cisos-and-soc-directors/</loc>
		<lastmod>2025-09-23T13:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-RTR-Whitepaper-cover-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/where-there-is-smoke-there-is-fire-south-asian-cyber-espionage-heats-up/</loc>
		<lastmod>2025-09-23T13:44:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/evolve-your-cyber-risk-management-with-threatconnect-risk-quantifier-7-9/</loc>
		<lastmod>2025-09-23T13:52:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Heading.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-companies-use-threatconnect-to-create-a-system-of-record-a-use-case/</loc>
		<lastmod>2025-09-23T13:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/new-carbon-black-playbook-apps/</loc>
		<lastmod>2025-09-23T13:52:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/carbon-black-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/carbon-black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/risk-threat-response-stronger-together/</loc>
		<lastmod>2025-09-23T13:52:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_739203226-300x169.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Risk-Threat-Response-Webinar-Deck-11.27.20.pptx1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Risk-Threat-Response-Webinar-Deck-11.27.20.pptx.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-2-harnessing-attck-visualizer-for-evolved-threat-intel/</loc>
		<lastmod>2025-09-23T13:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/7.2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-06-06-at-9.55.25-AM-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-06-06-at-12.15.38-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-06-06-at-10.01.23-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-microsoft-ews-optimize-email-security-with-automation/</loc>
		<lastmod>2025-09-23T13:54:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-09-30-at-12.59.43-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-tanium-improved-incident-response-with-intel-packages-2/</loc>
		<lastmod>2025-09-23T13:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/get-started-with-threatconnect-utilities-ong/</loc>
		<lastmod>2025-09-23T13:56:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-threatconnect-and-polarity-empower-teams-to-combat-phishing-threats/</loc>
		<lastmod>2025-09-23T13:56:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/ThreatConnect-Events-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/QRCodes-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/operationalizing-threat-intel-importance-of-dashboards/</loc>
		<lastmod>2025-09-23T13:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-9-9-19-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-2-9-9-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-3-9-9-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-4-9-9-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-5-9-9-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/dan-blog-6-9-9-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/smarter-soar-for-the-modern-soc/</loc>
		<lastmod>2025-09-23T13:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SOC-operator.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/intelligence-driven-soar-white-paper-cover-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-amazon-guardduty-protection-for-your-aws-environment/</loc>
		<lastmod>2025-09-23T13:59:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Blog-Web-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Amazon-GuardDuty-Screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-amazon-s3-and-ec2-better-manage-cloud-infrastructure/</loc>
		<lastmod>2025-09-23T13:59:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Blog-Cloud-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Amazon-S3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Amazon-EC2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-censys-enrich-threat-data-to-enhance-decision-making/</loc>
		<lastmod>2025-09-23T13:59:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Censys-screenshot-1030x477.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-mcafee-dxl-better-integrations-with-the-mcafee-stack/</loc>
		<lastmod>2025-09-23T14:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-shodan-enrich-threat-data-to-enhance-decision-making-2/</loc>
		<lastmod>2025-09-23T14:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-introduces-its-multi-environment-orchestration-capability/</loc>
		<lastmod>2025-09-23T14:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-research-roundup-wizard-spider-unc1878-ryuk-campaign/</loc>
		<lastmod>2025-09-23T14:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/leveraging-channels-reference-channels-versus-collaborative-channels/</loc>
		<lastmod>2025-09-23T14:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/instantly-distinguish-actionable-information.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/instantly-distinguish-actionable-information-image-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/instantly-distinguish-actionable-information-image-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/playbook-fridays-deploy-yara-signature-cbresponse/</loc>
		<lastmod>2025-09-23T14:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2019-04-05-at-11.35.04-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/4-5-19-PBF-pic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-dashboards-best-practices/</loc>
		<lastmod>2025-09-23T14:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Homepage-Gif1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/Screenshot-2025-06-03-at-12.06.05%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image10-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/SANS-Blog-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image9-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image4-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/lessons-in-communicating-cyber-risk-to-the-board-and-business-leaders/</loc>
		<lastmod>2025-09-23T14:56:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1302112870-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-cyber-risk-quantification-journey-its-not-as-hard-as-some-think/</loc>
		<lastmod>2025-09-23T14:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_311313911.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RQ-survey-Spire-webinar-300x277.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-tenets-of-threat-intel-operations-tenet-7-measure-for-success/</loc>
		<lastmod>2025-09-23T15:02:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Tenet-7-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/security_metrics_cover-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Evolved-Threat-Intel-Lifecycle-Graphic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Tenet-7-PDCA-Graphic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/2x2MetricsViz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Tenet-7-Dashboard-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/7-Tenants-of-TIOps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-malwarebytes-nebula-make-your-cloud-based-edr-soar/</loc>
		<lastmod>2025-09-23T15:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Malwarebytes-Nebula-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/detect-and-contain-cyberattacks-faster-with-intelligence-led-soar/</loc>
		<lastmod>2025-09-23T15:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-RTR-Whitepaper-cover-1-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/improve-soc-efficiency-with-intelligence-powered-security-operations/</loc>
		<lastmod>2025-09-23T15:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SOC-efficiency-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cyber-Threat-Investigate-v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/graphview_forblog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/log4j-a-threatconnect-vulnerability-prioritization-and-report-story/</loc>
		<lastmod>2025-09-23T15:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_797077918-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-20-at-4.51.43-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-20-at-4.54.48-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-20-at-4.58.53-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-20-at-5.02.32-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-12-20-at-5.34.34-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/prioritize-attack-analysis-and-response-with-actionable-intelligence/</loc>
		<lastmod>2025-09-23T15:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1740944516-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2022-06-01-at-3.28.35-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/risk-threat-response-the-rosetta-stone-for-communicating-cyber-risk-2/</loc>
		<lastmod>2025-09-23T15:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/rsa-archer-integration/</loc>
		<lastmod>2025-09-23T15:06:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RSA-blog-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RSA-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RSA-blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-3-key-elements-of-an-effective-cyber-threat-intelligence-program/</loc>
		<lastmod>2025-09-23T15:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1590824860-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-new-polarity-update-just-made-your-team-that-much-more-efficient/</loc>
		<lastmod>2025-09-23T15:07:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/new-features.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-digital-shadows-give-your-playbooks-a-searchlight/</loc>
		<lastmod>2025-09-23T15:08:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/image-28-1-1030x243.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-and-slack-streamline-investigative-team-collaboration/</loc>
		<lastmod>2025-09-23T15:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-01-28-at-3.45.43-PM-1030x410.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/inside-the-business-benefits-of-automated-cyber-risk-quantification/</loc>
		<lastmod>2025-09-23T15:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-RQ-Survey-RQ-Dashboard@2x.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/old-habits-die-hard/</loc>
		<lastmod>2025-09-23T15:08:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/pipeline-ransomware-attack-underscores-urgent-need-for-risk-based-automated-decision-support/</loc>
		<lastmod>2025-09-23T16:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_570368662.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1847360335-300x188.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/harnessing-generative-ai-safely-blog/</loc>
		<lastmod>2025-09-23T16:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/GenAI-Policy-Dilemma-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/famous-chollima-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2025-09-23T16:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/famous-chollima.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/famous-chollima.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/salt-typhoon-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2025-09-23T16:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/vanhelsingraas-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2025-09-23T16:13:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/VanHelsing-Blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/VanHelsing-Blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/medusa-intelligence-dashboard/</loc>
		<lastmod>2025-09-23T16:13:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/priority-newsletter-header-02-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Medusa-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/closing-the-gap-between-cybersecurity-and-compliance-dora-as-a-catalyst-for-risk-informed-decision-making/</loc>
		<lastmod>2025-09-23T16:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/Untitled-LinkedIn-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/debunking-anomalis-claims-why-threatconnect-is-the-superior-threat-intelligence-platform/</loc>
		<lastmod>2025-09-26T18:09:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/ThreatConnect.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Feature-LinkedIn-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/continuous-control-validation-with-threatconnect-risk-quantifier-9-0/</loc>
		<lastmod>2025-10-01T13:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/RQ9-hero-graphic-v4_transparent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-11-is-live-where-threat-intel-meets-convenience-store-efficiency/</loc>
		<lastmod>2025-10-20T13:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/10/ThreatConnect-TI-Ops-7.11-Where-Threat-Intel-Meets-Convenience.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/joining-forces-with-dataminr-to-accelerate-threat-and-risk-informed-defense/</loc>
		<lastmod>2025-10-21T12:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/10/TC-Blog-Hero.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/no-more-frankenstein-feeds-one-unified-view/</loc>
		<lastmod>2025-10-27T16:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/wiz-integration-helps-threatconnect-customers-act-faster-and-reduce-vulnerability-noise/</loc>
		<lastmod>2025-10-30T16:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/10/Untitled-design-8-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-financial-services-companies-drive-informed-cyber-defense-programs-with-threatconnect/</loc>
		<lastmod>2025-11-25T13:46:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Asset-15-99.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-10-is-live/</loc>
		<lastmod>2025-11-25T13:50:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Heading.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/top-5-use-cases-for-attck-visualizer/</loc>
		<lastmod>2025-11-25T13:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Attck-Visualizer-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/intelligence_requirement_detailspage-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/beyond-the-buzz-analyst-first-ai-for-mitre-attck/</loc>
		<lastmod>2025-11-25T14:06:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/align-your-security-operations-with-mitre-attck-v16-using-the-threatconnect-attck-visualizer/</loc>
		<lastmod>2025-11-25T14:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/unnamed-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-threat-actor-round-up/</loc>
		<lastmod>2025-11-25T14:09:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Blog-1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Blog-1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Blog-2-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-threatconnects-senior-solution-architect-puts-a-dollar-value-on-risk/</loc>
		<lastmod>2025-11-25T14:10:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Tim-4-people-of-tc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/forrester-wave-for-cyber-risk-quantification-and-our-threat-centric-approach-to-crq/</loc>
		<lastmod>2025-12-02T20:48:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/1690204852305.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/forrester-wave-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-named-leader-in-cyber-risk-quantification/</loc>
		<lastmod>2025-12-02T20:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/2023Q3_Cyber-Risk-Quantification_178449_L-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/putting-cyber-risk-quantification-into-action-moving-beyond-theory/</loc>
		<lastmod>2025-12-05T17:09:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/10/Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/part-2-putting-cyber-risk-quantification-into-action-moving-beyond-theory/</loc>
		<lastmod>2025-12-09T16:31:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/7LGlBEu2zLKufZCmafblvM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-threatconnect-senior-security-engineer-matt-brash-rescues-soc-teams-from-burnout/</loc>
		<lastmod>2025-12-24T14:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Matt-Brash-ATP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-threat-informed-response-slashes-mttr-and-boosts-mssp-margins/</loc>
		<lastmod>2026-01-15T15:22:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/10/Deliver-High-Margin-Differentiated-Offerings-That-Reduce-MTTR-and-Prove-Value-1200-x-628-px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/empower-seamless-collaboration-with-polaritys-rfi-integration/</loc>
		<lastmod>2026-01-15T15:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/ChatGPT-Image-Dec-18-2025-01_07_45-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/from-data-overload-to-decision-superiority-avoiding-soc-burnout-with-polarity/</loc>
		<lastmod>2026-01-15T15:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Screenshot-2025-11-12-at-11.52.47-AM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Screenshot-2025-11-12-at-11.52.47-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/noise-vs-signal-from-zero-day-chatter-to-actionable-intelligence/</loc>
		<lastmod>2026-01-15T15:31:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Screenshot-2025-09-23-at-2.02.43-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/blog-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Blog-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/weve-hit-the-tipping-point-in-cyber-defense-heres-the-fix/</loc>
		<lastmod>2026-01-15T15:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/1-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/1-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/ezgif-7539749e0c8093.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/8-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/blending-worlds-how-a-large-uk-bank-connects-geopolitical-cyber-and-physical-intelligence-with-threatconnect/</loc>
		<lastmod>2026-01-15T15:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Beige-Yellow-Minimalist-User-Experience-Venn-Diagram-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-informed-financially-grounded-modern-cyber-risk-quantification-with-mitre-attck-and-threat-intelligence/</loc>
		<lastmod>2026-01-15T15:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/unnamed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/unnamed-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-curious-case-of-the-vanishing-threat-intel-and-how-to-solve-it/</loc>
		<lastmod>2026-01-15T15:52:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/featured-image-Edited.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-pizza-parties-wont-fix-soc-burnout-and-how-threatconnect-helps-put-humans-back-at-the-center/</loc>
		<lastmod>2026-01-15T15:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/israeli-iranian-conflict-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2026-01-15T16:01:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnects-fedramp-authorization-a-landmark-achievement-in-security-and-collaboration/</loc>
		<lastmod>2026-01-15T16:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/fedRAMP-authorized-graphic-06-2025-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/apt28-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2026-01-15T16:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/APT28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/APT28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-measuring-risk-quantitatively-with-mitre-attck-is-critical-for-decision-making/</loc>
		<lastmod>2026-01-15T16:08:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/unnamed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/unlock-better-decisions-with-risk-quantification/</loc>
		<lastmod>2026-01-15T16:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/RQ-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threat-intel-at-your-fingertips-helping-analysts-move-faster-than-ever/</loc>
		<lastmod>2026-01-15T16:48:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/unnamed-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cal-mitre-v18-mitre-atlas-the-map-i-wish-i-had-in-the-soc/</loc>
		<lastmod>2026-01-15T16:50:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/blog-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/solving-complex-threats-with-microsoft-copilot-integration-for-threatconnect/</loc>
		<lastmod>2026-01-15T16:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Untitled-design-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Screenshot-2024-11-20-at-12.52.27%E2%80%AFPM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Screenshot-2024-11-20-at-12.59.16%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-cal-new-unique-intelligence-for-polarity/</loc>
		<lastmod>2026-01-15T16:59:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/ThreatConnect-Events.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/CAL-Blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/cal-critical.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/CAL-classifiers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-launches-polarity-intel-edition-to-streamline-intelligence-for-secops-teams/</loc>
		<lastmod>2026-01-15T17:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/PIE-product-image-v6-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/star-wars-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/Threat-Intel-Cycle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/PIE-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/PIE-image-2-e1768497089643.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/PIE-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/PIE-image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/starwars-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-ti-ops-platform-7-7-boost-your-security-teams-efficiency/</loc>
		<lastmod>2026-01-15T17:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/ThreatConnect-TI-Ops-Platform-7.6-Enhanced-Report-Creation-and-Threat-Context-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/7.7-blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/7.7-release-blog-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/top-5-best-practices-to-continuously-improve-your-intelligence-requirements/</loc>
		<lastmod>2026-01-15T17:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/Heading.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-ti-ops-platform-7-6-enhanced-report-creation-and-threat-context/</loc>
		<lastmod>2026-01-15T18:18:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/ThreatConnect-TI-Ops-Platform-7.6-Enhanced-Report-Creation-and-Threat-Context-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Copy-of-Report_templates_dropdown.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Tagsacrossowners_card.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/stay-ahead-of-threat-actors-with-threatconnect-and-silent-push/</loc>
		<lastmod>2026-01-15T18:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/TC-Silent-Push.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Silent-Push-Playbook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-risk-quantifier-7-7-and-introducing-rq-impacts/</loc>
		<lastmod>2026-01-15T18:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Announcing-Risk-Quantifier-7.7-and-Introducing-RQ-Impacts.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/RQ-Impacts-Dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/RQ-Peer-Analytics.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/RQ-77-Menu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cal-atl-collecting-and-analyzing-open-source-intel-faster-and-easier/</loc>
		<lastmod>2026-01-15T18:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/CAL%E2%84%A2-ATL-Collecting-and-Analyzing-Open-Source-Intel-Faster-and-Easier.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Screen-Shot_CAL_IntelSources.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Screen-Shot_CAL_easytoread.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/TI-Ops-AI-Insights-light-74-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-our-enhanced-integration-with-recorded-future/</loc>
		<lastmod>2026-01-15T18:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/TC-Recorded-Future.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Recorded-Future-TIE-Dashboard-Graphic-shadow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-ti-ops-platform-7-5-improved-flexibility-with-custom-details-screen-and-templates-for-groups/</loc>
		<lastmod>2026-01-15T18:32:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Tc-7.5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/custom_screen_select_cards.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/custom_template.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/announcing-a-new-integration-between-threatconnect-and-spur/</loc>
		<lastmod>2026-01-15T18:33:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/TC-Spur.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/Spur-Playbook-Integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/attck-visualizer-understand-adversaries-stay-ahead/</loc>
		<lastmod>2026-01-15T18:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/ATTCK-Visualizer-Understand-Adversaries-Stay-Ahead.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Screen-Shot-2024-01-24-at-7.44.39-AM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Screen-Shot-2024-01-24-at-7.42.41-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Screen-Shot-2024-01-24-at-7.42.56-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/from-frustration-to-clarity-the-importance-of-quantifying-risks-in-risk-management/</loc>
		<lastmod>2026-01-15T18:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/From-Frustration-to-Clarity-The-Importance-of-Quantifying-Risks-in-Risk-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/unveiling-inquest-insights-in-the-threatconnect-ti-ops-platform/</loc>
		<lastmod>2026-01-15T18:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/TCInQuest-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/IQ-Screenshot-CrimeWare-Detail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/8-questions-to-ask-a-threat-intelligence-platform-vendor/</loc>
		<lastmod>2026-01-15T18:40:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/8-Questions-To-Ask-A-Threat-Intelligence-Platform-Vendor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/what-is-strategic-risk-quantification/</loc>
		<lastmod>2026-01-15T18:41:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/What-Is-Strategic-Risk-Quantification.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-effectively-measure-the-value-of-threat-intelligence/</loc>
		<lastmod>2026-01-15T18:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/How-To-Effectively-Measure-the-Value-of-Threat-Intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/how-to-identify-the-right-platform-for-your-cyber-threat-intel-needs/</loc>
		<lastmod>2026-01-15T18:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/How-To-Identify-The-Right-Platform-For-Your-Cyber-Threat-Intel-Needs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Pyramid-of-Pain-Nov-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/TI-Ops-venn-diagram-no-logos-transparent-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Screen-Shot-2023-11-30-at-2.16.19-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-importance-of-the-diamond-model-for-cyber-threat-intelligence/</loc>
		<lastmod>2026-01-15T18:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/The-Importance-of-the-Diamond-Model-for-Cyber-Threat-Intelligence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Diamond-Model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Diamond-Model-Browse.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Diamond-Model-Associations.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Diamond-Model-Blog-ThreatGraph.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/empower-your-cti-a-3-step-guide-to-creating-intelligence-requirements-on-threatconnects-ti-ops-platform/</loc>
		<lastmod>2026-01-15T18:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Empower-Your-Cybersecurity-A-3-Step-Guide-to-Creating-Intelligence-Requirements-with-ThreatConnect.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Figure-1_Creating-Intelligence-Requirements_7.3.0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Figure-2_Creating-Intelligence-Requirements_7.3.0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Figure-3_Creating-Intelligence-Requirements_7.3.0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/intelligence-requirements-guide-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-importance-of-quantifying-cyber-risk-in-decision-making/</loc>
		<lastmod>2026-01-15T18:53:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Importance-of-CRQ-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-7-3-leverage-the-power-of-intelligence-requirements-and-attck-visualizer-to-evolve-your-teams-efficiency/</loc>
		<lastmod>2026-01-15T18:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/intelligence_requirement_detailspage-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Intelligencerequirements_keywords-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/ATTCKVisualizer_customview-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/intelligence-requirements-guide-thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/5-ways-of-IRs-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Attck-Visualizer-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/the-7-tenets-of-threat-intelligence-operations-tenet-6-integrates-and-automates-threat-intel/</loc>
		<lastmod>2026-01-15T18:57:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Types-of-Intel-with-Produces-and-Consumer-Personas.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Types-of-Intel-with-Produces-and-Consumer-Personas.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Tenet-7-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/cyber-risk-quantification-and-the-sec-rules-on-cybersecurity/</loc>
		<lastmod>2026-01-15T18:58:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/RQ-Blog-SEC-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/RQ-Graph-1-e1696280575208.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/threatconnect-customer-success-engineer-angel-salcedo-makes-success-a-team-sport/</loc>
		<lastmod>2026-01-22T21:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/POTC-Angel-Salcedo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/12/8F104430-FFBA-46E1-A388-1470BB2D5409_1_105_c.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/mustang-panda-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2026-01-28T18:01:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/black-hat-2025-exposure-management-ai-defense-but-no-donuts/</loc>
		<lastmod>2026-01-28T19:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/1000081575-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Blog-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Blog-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Blog-image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/why-threatconnects-vp-of-product-marketing-spends-his-off-hours-rescuing-wild-foxes/</loc>
		<lastmod>2026-02-02T17:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/01/PO-TC-DanCole-V1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/prioritizing-vulnerabilities-that-actually-matter/</loc>
		<lastmod>2026-03-03T16:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Deliver-High-Margin-Differentiated-Offerings-That-Reduce-MTTR-and-Prove-Value.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/iranian-conflict-intelligence-dashboard-immediately-available-for-threatconnect/</loc>
		<lastmod>2026-03-06T17:26:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/blog/from-noise-to-signal-crafting-ti-informed-detections-for-real-security-value/</loc>
		<lastmod>2026-03-09T16:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Untitled-design-8.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->