<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatconnect.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatconnect.com/resource/</loc>
		<lastmod>2026-03-31T13:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-qualys-vulnerability-management-solution/</loc>
		<lastmod>2019-01-27T23:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-and-Qualys-Vulnerability-Management-Solution@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-managed-security-service-providers/</loc>
		<lastmod>2019-02-01T23:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-MSSP-Cover@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-arcsight-joint-solution-brief/</loc>
		<lastmod>2019-02-03T23:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-and-Arcsight-Joint-Solution-Brief@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-accenture-deepsight-intelligence/</loc>
		<lastmod>2019-02-04T23:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Resource-Accenture-DeepSight-Data-Sheet-Cover@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-mcafee-enterprise-security-manager-integration/</loc>
		<lastmod>2019-02-05T23:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-McAfee-Enterprise-Security-Manager-Integration-Data-Sheet@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/from-reactive-to-proactive-how-to-avoid-alert-fatigue/</loc>
		<lastmod>2019-02-06T22:09:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/From-Reactive-to-Proactive-How-to-Avoid-Alert-Fatigue-@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/fidelis-cybersecurity-joint-solution-brief/</loc>
		<lastmod>2019-02-06T23:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Fidelis-Cybersecurity-Joint-Solution-Brief@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-enriches-data-case-study/</loc>
		<lastmod>2019-02-14T21:57:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Enriches-Data-Case-Study@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/isac-and-isao-edition-case-study/</loc>
		<lastmod>2019-02-16T21:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ISAC-and-ISAO-Edition-Case-Study@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/guccifer-2-0-the-dnc-hack-and-fancy-bears-oh-my/</loc>
		<lastmod>2019-02-17T23:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threat-intelligence-platforms-open-source-vs-commercial/</loc>
		<lastmod>2019-02-21T21:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Open-Source-Commercial-Whitepaper@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/setting-up-the-threatconnect-taxii-server-user/</loc>
		<lastmod>2019-02-21T22:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-ibm-qradar-integration/</loc>
		<lastmod>2019-03-15T14:59:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IBM-QRadar-Integration@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/mandiant-threat-intelligence/</loc>
		<lastmod>2019-03-29T14:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Mandiant-Threat-Intelligence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/disrupting-adversary-infrastructure/</loc>
		<lastmod>2019-10-17T16:26:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Whitepapers-Disrupting-Adversary-Infastructure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-case-management/</loc>
		<lastmod>2020-02-19T19:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screen-Shot-2021-08-04-at-3.59.02-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-soc-is-a-machine-and-lessons-learned-from-lockdown/</loc>
		<lastmod>2020-06-19T14:09:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sansfire-2020-live-online/</loc>
		<lastmod>2020-06-22T14:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-blackberry/</loc>
		<lastmod>2020-07-13T20:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-BlackBerry-Data-Sheet-Cover@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/change-the-way-security-works/</loc>
		<lastmod>2020-07-24T14:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-dashboards/</loc>
		<lastmod>2022-11-16T23:46:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect_Dashboards-Datasheet@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/multi-environment-orchestration/</loc>
		<lastmod>2022-11-16T23:47:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Multi-Environment-Orchestration-Datasheet@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-intelfinder/</loc>
		<lastmod>2022-11-18T03:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Data-Sheet-IntelFinder-and-ThreatConnect-Playbook@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-shodan-integration/</loc>
		<lastmod>2022-11-18T03:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Shodan-Data-Sheet@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/security-operations-maturity-model/</loc>
		<lastmod>2022-11-23T15:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Security-Operations-Maturity-Model@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/getting-started-with-threat-intelligence/</loc>
		<lastmod>2022-12-02T16:46:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-apps-make-the-most-of-your-existing-tools/</loc>
		<lastmod>2022-12-02T16:49:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/empowering-secops-spend-time-where-it-matters-most/</loc>
		<lastmod>2022-12-05T20:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-mature-is-your-threat-intelligence-program/</loc>
		<lastmod>2022-12-05T21:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/How-Mature-Is-Your-Threat-Intelligence-Program_@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/playbooks-roi-calculator-how-to-save-time-and-money/</loc>
		<lastmod>2022-12-07T02:47:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-dashboards-overview/</loc>
		<lastmod>2022-12-20T21:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-app-for-splunk-enterprise/</loc>
		<lastmod>2022-12-28T21:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screen-Shot-2022-12-28-at-4.48.02-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/fireside-chat-live-panel-webinar/</loc>
		<lastmod>2023-04-18T13:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Ver-3-400x392-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-diamond-model-intrusion-analysis/</loc>
		<lastmod>2023-05-15T13:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/The-Diamond-Methodology@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/what-if-analysis/</loc>
		<lastmod>2023-05-23T14:59:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/02/Screen-Shot-2023-05-23-at-10.57.44-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-white-paper-intelligence-driven-soar/</loc>
		<lastmod>2023-06-27T02:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/intelligence-driven-soar-white-paper-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/volume-2-disrupting-adversary-infrastructure/</loc>
		<lastmod>2023-07-26T16:40:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepaper-Cover-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/using-visualization-to-make-threat-intelligence-actionable/</loc>
		<lastmod>2023-07-26T16:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/using-mitre-attck-and-threat-intelligence-to-stop-attacks/</loc>
		<lastmod>2023-07-26T16:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnects-customer-success-team/</loc>
		<lastmod>2023-07-26T16:46:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Customer-Success-and-FAQs-Thumbnail@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-training-workshops-and-services-catalog/</loc>
		<lastmod>2023-07-26T16:46:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Training-Workshops-and-Services-Catalog@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-training-playbook-components/</loc>
		<lastmod>2023-07-26T16:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-powered-by-sap-hana/</loc>
		<lastmod>2023-07-26T16:47:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Powered-by-SAP-HANA@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-palo-alto-networks-integration/</loc>
		<lastmod>2023-07-26T16:47:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Palo-Alto-Networks-Integration@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-overview-and-domaintools-integration/</loc>
		<lastmod>2023-07-26T16:47:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-intelligence-driven-soar-data-sheet/</loc>
		<lastmod>2023-08-24T16:45:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SOAR-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/grc-solutions-threatconnect-rq/</loc>
		<lastmod>2023-08-24T17:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot_2021-03-01-Threatconnect-RQ-GRC-Data-Sheet-pdf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/intelligence-driven-soar-global-aerospace-and-defense/</loc>
		<lastmod>2023-08-30T15:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/more-is-not-more-busting-the-myth-that-more-threat-intel-feeds-lead-to-better-security/</loc>
		<lastmod>2023-09-20T00:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/More-is-Not-More@2x-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/detection-of-automatically-generated-domain-names-in-real-time-with-machine-learning/</loc>
		<lastmod>2023-09-20T03:59:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/DGADetection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/changing-the-way-security-works-riskthreatresponse-the-acquisition-of-nehemiah-security/</loc>
		<lastmod>2023-09-20T04:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/neamiah-webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-fresh-look-at-security-analytics/</loc>
		<lastmod>2023-09-20T04:02:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-A-Fresh-Look-at-Security-Analytics@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-domaintools/</loc>
		<lastmod>2023-09-20T04:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Resources-Datasheet-DomainTools-Featured-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-connection-using-phishing-emails-to-demonstrate-threatconnects-soar-capabilities/</loc>
		<lastmod>2023-09-20T04:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/ciso-challenges-infosec-connect-europe/</loc>
		<lastmod>2023-09-20T04:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TIP-1-Cropped.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/streamline-your-cyber-threat-research-with-threatconnect-intelligence-requirement-webinar/</loc>
		<lastmod>2023-09-28T03:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threat-intelligence-isnt-one-size-fits-all-2/</loc>
		<lastmod>2023-10-02T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-crowdstrike-falcon-host/</loc>
		<lastmod>2023-10-06T20:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/01/Screen-Shot-2023-09-06-at-12.19.22-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/data-driven-threat-intelligence-metrics-on-indicators-dissemination-and-sharing/</loc>
		<lastmod>2023-11-21T18:54:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/large-enterprise-software-company-leverages-one-platform-across-various-security-teams-to-improve-efficiency/</loc>
		<lastmod>2023-11-21T19:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Screen-Shot-2023-04-14-at-3.02.59-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/webinar-the-role-of-the-ciso-in-overhauling-and-future-proofing-cybersecurity/</loc>
		<lastmod>2023-11-21T19:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shutterstock_1697863657.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/siem-threat-intelligence-quickly-identify-the-threats-that-matter-to-you/</loc>
		<lastmod>2023-11-21T19:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-SIEM-Threat-Intelligence-Whitepaper@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-to-prioritize-and-protect-against-relevant-threats-context-is-the-key/</loc>
		<lastmod>2023-11-21T19:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/building-and-managing-the-next-generation-security-operations-center-soc/</loc>
		<lastmod>2023-11-21T19:14:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/tql-dashboards-better-insight-into-your-threat-intelligence-operations/</loc>
		<lastmod>2023-11-21T19:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/turn-historical-threat-data-into-actionable-intelligence-using-analytics/</loc>
		<lastmod>2023-11-21T19:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/fragmentation-the-silent-killer-of-your-security-management-program/</loc>
		<lastmod>2023-11-21T19:26:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Fragmentation_-The-Silent-Killer-of-Your-Security-Management-Program@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/exploiting-the-adversary-how-to-the-proactive-with-threat-intelligence/</loc>
		<lastmod>2023-11-21T19:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-to-get-promoted-developing-metrics-to-show-how-threat-intel-works/</loc>
		<lastmod>2023-11-21T19:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/mapping-connected-infrastructure-with-threatconnect-and-domain-tools/</loc>
		<lastmod>2023-11-21T19:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-intelligence-what-is-it-and-how-do-i-best-utilize-it/</loc>
		<lastmod>2023-11-21T19:37:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/webinar-leveraging-big-data-to-measure-cyber-risk/</loc>
		<lastmod>2023-11-22T05:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/CRQ-Big-Data-Webinar-LP-header-360-%C3%97-250-px-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/practical-cyber-risk-quantification-usage-real-life-scenarios-webinar/</loc>
		<lastmod>2023-11-22T05:40:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Kroll-Webinar-web-lp-e1682004774465.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/operationalizing-cyber-threat-intelligence-webinar/</loc>
		<lastmod>2023-11-22T07:34:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/OCTI-Webinar-On-Demand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/peaky-blinders-combat-ransomware-gangs-with-high-fidelity-intelligence-driven-operations/</loc>
		<lastmod>2023-11-22T07:46:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/22-TC-Peaky-Blinders-Webinar-Social-Card-%E2%80%93-Option-2%402x-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/risk-based-vulnerability-management/</loc>
		<lastmod>2023-11-22T08:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-SANS-SOAR_Twitter_1200x675-%E2%80%93-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/automating-risk-quantification-webinar/</loc>
		<lastmod>2023-11-22T08:43:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2021-10-18-at-11.36.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/key-functionalities-of-modern-cti-programs/</loc>
		<lastmod>2023-11-28T18:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-CTI-Summit-Presentation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-servicenow-integration/</loc>
		<lastmod>2023-12-05T18:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/12/Screen-Shot-2023-12-05-at-1.17.11-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-how-has-the-increase-in-ransomware-attacks-changed-the-risk-posture-for-companies/</loc>
		<lastmod>2023-12-14T05:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Yousef-SSS-Video-3-How-Has-The-Increase-In-Ransomware-Attacks-Changed-The-Risk-Posture-For-Companies.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-with-pwc-cyber-risk-expert/</loc>
		<lastmod>2023-12-14T05:35:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Yousef-GT-LP-Featured-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-video-series-with-yousef-ghazi-tabatabai-what-are-the-challenges-with-risk-quantification/</loc>
		<lastmod>2023-12-14T05:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Yousef-SSS-Video-2-What-Are-The-Challenges-With-Risk-Quantification-and-How-Is-It-Evolving.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-expert-series-with-colin-anderson-video/</loc>
		<lastmod>2023-12-14T05:35:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Colin-A-LP-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-video-series-with-colin-anderson-how-do-you-operationalize-cyber-threat-intelligence-and-where-do-you-start/</loc>
		<lastmod>2023-12-14T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Colin-A-LP-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-video-series-the-importance-of-cyber-risk-quantification/</loc>
		<lastmod>2023-12-14T05:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/02/SSS-Video-5-CRQ-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-meet-the-decisive-group/</loc>
		<lastmod>2023-12-14T06:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-what-is-threat-hunting/</loc>
		<lastmod>2023-12-14T06:10:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-the-threatconnect-difference/</loc>
		<lastmod>2023-12-14T06:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-the-importance-of-cyber-threat-intelligence-in-todays-industry/</loc>
		<lastmod>2023-12-14T06:24:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/SSS-Video-2-CTI-Part-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-zscaler-internet-access/</loc>
		<lastmod>2023-12-18T20:55:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/06/Screen-Shot-2023-12-18-at-3.53.23-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-validating-geodata/</loc>
		<lastmod>2024-01-22T23:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/applying-threat-intelligence-to-the-star-wars-battle-of-yavin/</loc>
		<lastmod>2024-01-23T14:10:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Applying-Threat-Intelligence-to-the-Star-Wars-Battle-of-Yavin@2x-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/cyber-risk-quantification-guide-for-c-level-executives/</loc>
		<lastmod>2024-01-23T14:10:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cyberminds-webinar-2021.12.15.pptx.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/financial-services-sees-success-with-smarter-threat-intelligence/</loc>
		<lastmod>2024-01-23T14:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/proactive-infrastructure-hunting-with-threatconnect-domaintools/</loc>
		<lastmod>2024-01-23T14:15:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/quantifying-risk-understanding-cyber-insurance/</loc>
		<lastmod>2024-01-23T14:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cyber-insurance-3-Cropped.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Copy-of-ThreatConnect-Social-Share-Templates.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/reduce-risk-and-improve-security-through-infrastructure-automation/</loc>
		<lastmod>2024-01-23T14:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-faster-security-orchestration-with-threat-intelligence/</loc>
		<lastmod>2024-01-23T14:25:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Smarter-Faster-Whitepaper@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-driving-context-around-endpoints-to-automate-detection-and-response/</loc>
		<lastmod>2024-01-23T14:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-environment-context-and-situational-awareness/</loc>
		<lastmod>2024-01-23T14:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/state-of-rq-a-practitioner-view-webinar/</loc>
		<lastmod>2024-01-24T19:53:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/addressing-the-sec-requirements-for-materiality-disclosure-webinar/</loc>
		<lastmod>2024-02-21T16:33:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-ransomware-realities-insights-from-the-financial-industry/</loc>
		<lastmod>2024-03-11T21:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-3-Ransomware-Realities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-the-evolving-landscape-of-behavioral-security/</loc>
		<lastmod>2024-03-11T21:18:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-6-The-Evolving-Landscape.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-the-convergence-of-physical-and-cyber-security/</loc>
		<lastmod>2024-03-18T16:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-8-Security-Expert-Reveals.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-security-expert-reveals-top-concerns-in-an-evolving-digital-landscape/</loc>
		<lastmod>2024-03-18T16:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-9-The-Convergence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-how-does-cyber-insurance-fit-into-an-organizations-risk-management-strategy/</loc>
		<lastmod>2024-03-27T16:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Yousef-SSS-Video-5-How-Does-Cyber-Insurance-Fit-Into-An-Organizations-Risk-Management-Strategy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-how-do-companies-manage-the-risk-for-low-frequency-and-high-severity-events/</loc>
		<lastmod>2024-03-27T16:05:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Yousef-SSS-Video-4-How-Do-Companies-Manage-The-Risk-For-Low-Frequency-and-High-Severity-Events-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-empowering-threat-informed-defense-incident-response-with-threatconnect/</loc>
		<lastmod>2024-03-27T16:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-5-Empowering-Threat-Informed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-how-to-move-your-cti-team-from-a-reactive-to-proactive-posture/</loc>
		<lastmod>2024-03-27T16:07:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/SSS-Video-3-CTI-Part-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-unified-alert-response-a-use-case-for-all-security-tools/</loc>
		<lastmod>2024-03-27T16:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-9-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-the-putty-that-fits-into-all-your-security-tools/</loc>
		<lastmod>2024-03-27T16:09:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-5-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-leveraging-resources-to-prioritize-your-efforts/</loc>
		<lastmod>2024-03-27T16:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-7-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-expanding-threat-intelligence-into-devops/</loc>
		<lastmod>2024-03-27T16:17:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-expert-insights-on-alert-fatigue-new-technologies-and-detection-systems/</loc>
		<lastmod>2024-03-27T16:20:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-7-Expert-Insights.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-evolving-security-operations-in-the-cloud-era-challenges-and-solutions/</loc>
		<lastmod>2024-03-27T16:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Matt-S-Evolving-Security-Operations-in-the-Cloud-Era-Challenges-and-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-vulnerability-management-survey-2020/</loc>
		<lastmod>2024-05-28T17:56:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Resources-White-Paper-SANS-Vulnerability-Management-Survey-Cover-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-survey-improving-the-bottom-line-with-effective-security-metrics/</loc>
		<lastmod>2024-05-28T17:57:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-SANS-Survey-Improving-the-Bottom-Line-with-Effective-Security-Metrics-Featured-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-survey-closing-the-critical-skills-gap-for-modern-and-effective-security-operations-centers-socs/</loc>
		<lastmod>2024-05-28T17:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepaper-Cover-Image-2020-SANS-Survey-Closing-the-Critical-Skills-Gap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-2020-automation-and-integration-survey/</loc>
		<lastmod>2024-05-28T17:57:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepaper-Cover-Image-2020-SANS-Automation-and-Integration-Survey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/common-best-practices-for-security-operations-centers-results-of-the-2019-soc-survey/</loc>
		<lastmod>2024-05-28T17:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepapers-Common-and-Best-Practices-for-SOC@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-women-in-cybersecurity-survey-spanning-the-career-life-cycle/</loc>
		<lastmod>2024-05-28T18:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepaper-Cover-Image-SANS-Women-in-Cybersecurity-Survey-Spanning-the-Career-Life-Cycle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/2020-sans-cyber-threat-intelligence-cti-survey/</loc>
		<lastmod>2024-05-28T18:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Whitepaper-Cover-Image-2020-SANS-Cyber-Threat-Intelligence-CTI-Survey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/cyber-risk-a-fireside-conversation/</loc>
		<lastmod>2024-06-11T20:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/expert-panel-webinar-cyber-risk-quantification-in-the-real-world/</loc>
		<lastmod>2024-06-11T20:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/customer-story-national-medical-insurance-provider-quantifies-risk/</loc>
		<lastmod>2024-07-08T18:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/webinar-how-to-prioritize-and-protect-against-relevant-threats-context-is-key/</loc>
		<lastmod>2024-07-08T18:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/customer-story-large-enterprise-needed-centralized-threat-intelligence-management/</loc>
		<lastmod>2024-07-08T19:14:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-polarity-a-better-together-story-webinar/</loc>
		<lastmod>2024-07-29T20:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/combo-logos_16x9-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/use-cases-and-quick-wins-for-offensive-security-vulnerability-management/</loc>
		<lastmod>2024-10-02T15:33:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/vuln-management-quick-wins_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/leveraging-channels-in-polarity/</loc>
		<lastmod>2024-10-02T18:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/07/channelwebinar-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/optiv-clearshark-polarity-on-the-go/</loc>
		<lastmod>2024-12-26T15:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/clearshark-webinar_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/combining-the-power-of-polarity-mandiant/</loc>
		<lastmod>2024-12-26T15:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/mandiant-webinar-two_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/power-of-polarity-and-google/</loc>
		<lastmod>2024-12-26T15:10:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/maximizing-investments-with-real-time-tool-validation/</loc>
		<lastmod>2024-12-26T15:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/max-investment_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/webinar-guccifer-2-0-the-dnc-hack-and-fancy-bears-oh-my/</loc>
		<lastmod>2025-01-30T15:12:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/need-a-polarity-refresher-watch-this-5-minute-video/</loc>
		<lastmod>2025-03-26T17:50:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Screenshot-2025-03-26-at-11.17.17-PM-e1743011420120.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-guided-quickstart-of-polarity/</loc>
		<lastmod>2025-03-31T13:40:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/Screenshot-2025-03-31-at-7.09.32-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/working-in-the-soc-with-power-tools/</loc>
		<lastmod>2025-03-31T14:49:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/Screenshot-2025-03-31-at-7.12.05-PM-e1743428561803.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-demystifying-the-deep-and-dark-web-intel/</loc>
		<lastmod>2025-04-21T13:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-need-for-an-evolved-threat-intel-lifecycle-webinar/</loc>
		<lastmod>2025-04-21T14:22:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/threat-intel-lifecycle-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-how-companies-approach-cyber-risk-quantification/</loc>
		<lastmod>2025-05-01T16:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Yousef-SSS-Video-1-CRQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/cyber-defense-tv-a-smart-approach-to-threat-and-risk-management/</loc>
		<lastmod>2025-06-15T19:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Screenshot-2025-04-10-at-1.44.13%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/explore-vulnerability-prioritization-with-lara-meadows/</loc>
		<lastmod>2025-06-15T19:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Screenshot-2024-06-14-at-2.17.02-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/watch-tc-risk-quantifier-demo-a-comprehensive-risk-management-solution/</loc>
		<lastmod>2025-06-15T20:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/Screenshot-2025-05-15-at-4.38.47%E2%80%AFPM-e1747341654867.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/demystifying-intelligence-analysis/</loc>
		<lastmod>2025-06-16T19:53:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-the-rebels-beat-the-empire-cyber-threat-intelligence-lessons-from-star-wars/</loc>
		<lastmod>2025-06-16T20:23:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Screenshot-2025-03-20-at-9.54.32-PM-e1742490420652.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-hunt-is-on-fusing-global-threat-intelligence-with-a-threat-intelligence-platform-2/</loc>
		<lastmod>2025-06-16T21:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/identify-manage-and-block-threats-faster-webinar-with-esg-lab/</loc>
		<lastmod>2025-06-17T17:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnects-revamped-search-functionality/</loc>
		<lastmod>2025-06-17T17:07:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-stix-taxii/</loc>
		<lastmod>2025-06-17T17:08:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-playbook-actions/</loc>
		<lastmod>2025-06-17T17:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/playbook-fridays-qradar-tag-search/</loc>
		<lastmod>2025-06-17T17:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-cal-integration-with-polarity/</loc>
		<lastmod>2025-07-14T18:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screenshot-2024-10-16-at-4.31.32-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/enhance-insights-with-ai-summaries/</loc>
		<lastmod>2025-07-16T22:16:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Screenshot-2024-12-09-at-5.45.46-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/unlocking-the-potential-of-cyber-risk-quantification-a-guide-to-navigating-sec-cybersecurity-regulations/</loc>
		<lastmod>2025-07-16T22:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Screen-Shot-2024-04-05-at-4.45.22-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/use-cases-and-quick-wins-for-offensive-security-and-vulnerability-management/</loc>
		<lastmod>2025-07-16T22:34:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-04-at-11.19.37-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/supporting-closed-network-deployments/</loc>
		<lastmod>2025-07-16T22:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/closed-network-deployments-05-e1734104395443.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/enhance-your-defense-with-threatconnects-unified-threat-library/</loc>
		<lastmod>2025-07-16T22:38:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Screen-Shot-2023-12-06-at-12.03.56-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/choosing-the-right-platform-for-threat-intelligence-e-book/</loc>
		<lastmod>2025-07-16T22:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Screen-Shot-2023-11-30-at-2.16.19-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/state-government-and-intelligence-powered-operations/</loc>
		<lastmod>2025-07-16T22:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Screen-Shot-2023-11-14-at-6.44.13-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/utilities-and-energy-organization-achieves-higher-efficiency-and-better-cyber-defense-with-one-platform/</loc>
		<lastmod>2025-07-16T22:46:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Screen-Shot-2023-10-31-at-5.13.28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/intelligence-powered-security-operations-whitepaper/</loc>
		<lastmod>2025-07-23T02:52:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/Screen-Shot-2022-12-21-at-1.25.57-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-threatconnect-enables-cyber-fusion-operations/</loc>
		<lastmod>2025-07-23T03:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/cyber-fusion-operations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-series-fail-fast-fail-hard-in-incident-response/</loc>
		<lastmod>2025-07-23T13:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Devin-Video-5-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-how-purple-teaming-with-the-mitre-attck-framework-boosts-incident-response/</loc>
		<lastmod>2025-07-23T13:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Video-4-How-Purple-Teaming.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/large-enterprise-pharmaceutical-achieves-faster-turn-around-with-threatconnect-risk-quantifier-rq/</loc>
		<lastmod>2025-08-04T17:49:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-28-at-10.49.38-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-a-global-sportswear-brand-reduced-false-positives-by-100-percent/</loc>
		<lastmod>2025-08-04T20:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Screenshot-2025-03-25-at-11.58.51-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-flashpoint/</loc>
		<lastmod>2025-08-06T19:32:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/03/Screenshot-2024-11-13-at-5.06.14-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/instant-recall-of-flashpoint-intelligence-with-polarity/</loc>
		<lastmod>2025-08-06T20:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Screenshot-2025-03-05-at-10.44.41%E2%80%AFPM-e1741232715956.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/creating-channels-that-matter/</loc>
		<lastmod>2025-08-07T14:26:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-03-at-11.11.15-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-use-cases-mssp-mdr/</loc>
		<lastmod>2025-08-07T14:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-04-at-11.41.48-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-fastest-triage-action-possible/</loc>
		<lastmod>2025-08-08T14:20:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/01/Screenshot-2024-12-09-at-6.25.45-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-low-code-automation/</loc>
		<lastmod>2025-08-08T14:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screenshot-2023-07-14-at-10.45.58-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-tc-analyze-success-story-upgrading-from-an-open-source-ti-database/</loc>
		<lastmod>2025-08-08T14:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-06-at-10.44.53-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-threat-intel-analysts/</loc>
		<lastmod>2025-08-08T14:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/09/Screen-Shot-2022-12-20-at-6.04.31-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-incident-response/</loc>
		<lastmod>2025-08-08T14:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/09/Screen-Shot-2022-12-28-at-4.41.51-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/dawn-of-threat-intelligence-operations-white-paper/</loc>
		<lastmod>2025-08-08T14:56:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/dawn-ti-ops-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-tc-complete-success-story-automating-analytical-processes/</loc>
		<lastmod>2025-08-08T15:10:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screen-Shot-2023-05-31-at-1.52.06-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-security-leadership/</loc>
		<lastmod>2025-08-08T15:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/09/Screen-Shot-2022-12-28-at-4.40.07-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-risk-quantification-report-healthcare-manufacturing-utilities/</loc>
		<lastmod>2025-08-08T15:31:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/04/Screenshot-2025-08-08-at-11.31.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/prioritize-cves-by-financial-risk-with-risk-quantifier/</loc>
		<lastmod>2025-08-08T16:29:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/04/Screen-Shot-2023-01-09-at-1.16.00-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-tc-complete-success-story-using-automation-to-collaborate-with-partners/</loc>
		<lastmod>2025-08-08T17:29:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-06-at-12.13.47-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/packaged-goods-leader-takes-automated-cyber-risk-quantification-global-4/</loc>
		<lastmod>2025-08-08T17:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Screen-Shot-2023-06-05-at-11.37.35-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-cal-collective-analytics-layer-data-sheet/</loc>
		<lastmod>2025-08-08T17:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/08/Screen-Shot-2022-12-28-at-4.45.31-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-threatconnect-customer-success-story-creating-an-efficient-reporting-workflow-to-and-from-the-security-operations-center/</loc>
		<lastmod>2025-08-08T17:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/09/Screen-Shot-2023-05-31-at-2.05.43-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-threatconnect-customers-share-their-improved-security-outcomes/</loc>
		<lastmod>2025-08-08T20:48:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Screen-Shot-2023-03-21-at-1.30.14-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-tc-analyze-success-story-focusing-on-relevant-intelligence/</loc>
		<lastmod>2025-08-16T02:16:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screen-Shot-2023-05-31-at-1.48.15-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-threatconnect-customer-success-story-maturing-cybersecurity-infrastructure-with-intelligence-driven-operations/</loc>
		<lastmod>2025-08-16T02:19:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/01/Screen-Shot-2023-05-31-at-1.58.16-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/use-cases-and-quick-wins-for-security-operations-centers/</loc>
		<lastmod>2025-08-20T13:42:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-04-at-1.43.34-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/advanced-threat-hunting/</loc>
		<lastmod>2025-08-20T13:43:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/08/Screenshot-2024-12-13-at-10.42.18-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/end-to-end-triage-of-atomic-indicators-with-polarity/</loc>
		<lastmod>2025-08-20T13:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/10/Screenshot-2024-12-09-at-5.40.42-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-threatconnect-customer-success-story-establishing-a-strong-partnership-to-ensure-continued-success/</loc>
		<lastmod>2025-08-20T13:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/09/Screen-Shot-2023-02-15-at-12.01.03-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-rq/</loc>
		<lastmod>2025-08-20T18:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Screen-Shot-2024-05-09-at-4.01.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-risk-quantifier/</loc>
		<lastmod>2025-08-20T18:26:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Screen-Shot-2024-05-09-at-4.01.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-threatconnect-platform/</loc>
		<lastmod>2025-08-20T18:43:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/08/Screen-Shot-2022-12-22-at-4.32.11-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-for-security-operations/</loc>
		<lastmod>2025-08-20T19:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/09/Screen-Shot-2022-12-28-at-4.43.17-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/leveraging-channel-colors-for-instant-data-awareness/</loc>
		<lastmod>2025-08-20T19:54:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/02/channels-color-guide.pdf</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/rq-fair-lets-evolve-together/</loc>
		<lastmod>2025-08-22T15:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/10/Screen-Shot-2022-12-23-at-11.45.23-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-tip-data-sheet/</loc>
		<lastmod>2025-08-22T17:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-06-at-10.41.50-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/break-down-silos-and-boost-productivity-with-polarity/</loc>
		<lastmod>2025-08-22T18:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Screenshot-2025-02-21-at-11.45.27-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/08/Screenshot-2025-02-21-at-11.16.12%E2%80%AFAM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/enabling-analysts-intel-driven-cve-enrichment-remediation/</loc>
		<lastmod>2025-08-26T15:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Webinar-1200-x-675-V1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/leverage-channel-and-integration-colors-for-in-line-context-malware-analysis/</loc>
		<lastmod>2025-08-26T15:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/10/Screenshot-2024-12-09-at-5.36.10-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/discover-how-genuine-parts-company-transformed-their-cyber-risk-strategy/</loc>
		<lastmod>2025-08-26T15:57:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screenshot-2024-10-09-at-10.56.04-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/practical-use-of-ai-in-cyber-security-analysis-with-polarity-ventech/</loc>
		<lastmod>2025-08-26T15:59:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/ventech-webinar_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/fortifying-europe-how-threatconnect-and-ikarus-redefined-threat-intelligence/</loc>
		<lastmod>2025-08-28T19:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/TC-Ikarus-Case-Study.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-a-top-tier-automaker-centralized-threat-intelligence/</loc>
		<lastmod>2025-08-28T20:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/Screenshot-2025-08-21-at-11.25.10-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/demo-of-polarity-federated-search-and-analysis-tool/</loc>
		<lastmod>2025-09-03T19:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-risk-quantifier-app-for-servicenow-risk-management-product/</loc>
		<lastmod>2025-09-04T16:22:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/RQ-for-SNOW.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/use-cases-and-quick-wins-for-threat-intelligence-teams/</loc>
		<lastmod>2025-09-12T13:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-04-at-1.42.28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/leveraging-ai-integrations-to-enhance-organizational-effectiveness/</loc>
		<lastmod>2025-09-23T13:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screenshot-2025-02-20-at-10.01.11-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/image6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/maximize-your-splunk-investment-with-polaritys-splunk-integration/</loc>
		<lastmod>2025-09-23T13:30:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/splunk2_weiba2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-source-analytics-enabling-leaders-and-upleveling-teams/</loc>
		<lastmod>2025-09-23T13:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/05/telemetry-webinar_weiba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/maximizing-internal-intelligence-for-defense-enablement-webinar/</loc>
		<lastmod>2025-09-23T13:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screenshot-2024-10-01-at-2.58.15-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/collecting-and-analyzing-intelligence-about-potential-threats-2/</loc>
		<lastmod>2025-09-23T13:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/overview-of-using-the-mitre-attck-framework-in-threatconnect/</loc>
		<lastmod>2025-09-23T13:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/building-a-threat-intelligence-program-growing-the-program/</loc>
		<lastmod>2025-09-23T13:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect_Growing-the-Program-Infographic@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/project-camerashy-closing-the-aperture-on-chinas-unit-78020/</loc>
		<lastmod>2025-09-23T13:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Project-Camera-Shy-Report_cover@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/mitigate-threats-faster-with-an-intelligence-driven-defense/</loc>
		<lastmod>2025-09-23T14:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/shaking-off-security-alert-fatigue-tips-for-taking-control/</loc>
		<lastmod>2025-09-23T14:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/evilness-rating-skulls-scale-for-cyber-threats-4/</loc>
		<lastmod>2025-09-23T14:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screen-Shot-2024-04-03-at-11.50.41-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/fusing-intelligence-operations-with-security-orchestration/</loc>
		<lastmod>2025-09-23T14:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-introducing-matt-scheurer-assistant-csirt-vp-and-threatreel-host/</loc>
		<lastmod>2025-09-23T15:08:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/01/Matt-S-Video-Introducing-Matt-Scheurer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-threatconnect-leverages-ai/</loc>
		<lastmod>2025-09-29T23:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Screenshot-2025-02-24-at-11.36.29-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/new-threats-emerging-screenshot-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/success-story-large-u-s-health-system/</loc>
		<lastmod>2025-09-29T23:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/global-credit-union-reduces-alert-fatigue-to-detect-and-respond-to-threats-faster/</loc>
		<lastmod>2025-10-30T18:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Screenshot-2025-03-05-at-2.27.05-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-a-top-canadian-bank-revolutionized-cybersecurity-with-ai-driven-threatconnect/</loc>
		<lastmod>2025-10-30T18:06:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Screenshot-2025-03-18-at-7.52.53-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-video-series-with-colin-anderson-how-to-move-your-cti-team-from-a-reactive-to-proactive-posture/</loc>
		<lastmod>2025-10-30T18:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Colin-A-LP-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/smarter-security-video-series-with-colin-anderson-the-importance-of-cyber-threat-intelligence-in-todays-industry/</loc>
		<lastmod>2025-10-30T18:11:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/11/Colin-A-LP-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threat-intelligence-process-not-destination/</loc>
		<lastmod>2025-10-30T18:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/prioritizing-the-1-how-to-focus-on-the-vulnerabilities-that-actually-get-exploited/</loc>
		<lastmod>2025-11-05T18:31:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Screenshot-2025-11-05-at-1.30.24-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-tour/</loc>
		<lastmod>2025-11-12T16:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/Screenshot-2025-11-12-at-11.45.18-AM-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-risk-quantifier-tour/</loc>
		<lastmod>2025-11-12T16:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Screenshot-2025-11-12-at-11.41.39-AM-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-platform-tour/</loc>
		<lastmod>2025-11-12T16:51:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Screenshot-2025-11-12-at-11.48.36-AM-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/watch-threatconnect-demo-beyond-a-threat-intelligence-platform/</loc>
		<lastmod>2025-11-12T16:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Interactive-graphic.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/beyond-the-pos-how-a-leading-retailer-secured-its-enterprise-with-threatconnect/</loc>
		<lastmod>2025-11-21T16:45:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/Screenshot-2025-11-17-at-4.27.11-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/unifying-global-security-operations-for-an-enterprise-software-leader/</loc>
		<lastmod>2025-11-25T16:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/11/Screenshot-2025-11-25-at-11.36.19-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/cracking-cyber-threats-with-modern-threat-intelligence-platforms/</loc>
		<lastmod>2025-12-08T20:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/06/image-16-e1753717846933.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-cofense-intelligence/</loc>
		<lastmod>2026-01-15T19:03:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-and-PhishMe-Intelligence@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threat-intelligence-platforms/</loc>
		<lastmod>2026-01-15T19:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-TIP-EBook@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-white-paper-cybersecurity-under-stress/</loc>
		<lastmod>2026-01-15T19:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/01/Screen-Shot-2022-12-28-at-4.11.37-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-intel-edition-by-threatconnect/</loc>
		<lastmod>2026-01-15T19:22:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/Screenshot-2024-09-09-at-2.01.51-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-and-securityscorecard/</loc>
		<lastmod>2026-01-15T19:25:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Screen-Shot-2023-09-05-at-10.00.56-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/slashnext-intel/</loc>
		<lastmod>2026-01-15T19:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SlashNext-Agentless-Phishing-Defense.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/slashnext-phishing/</loc>
		<lastmod>2026-01-15T19:28:48+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/TC-Resource-Data-Sheet-Slashnext-Data-Sheet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-rsa-netwitness-suite-integration/</loc>
		<lastmod>2026-01-15T19:29:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-RSA-Netwitness-Data-Sheet@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/choosing-the-right-cyber-risk-quantification-solution-webinar/</loc>
		<lastmod>2026-01-15T19:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/beyond-the-buzzword-real-world-applications-for-ai-in-cyber-threat-intel-webinar/</loc>
		<lastmod>2026-01-15T19:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Screenshot-2025-03-11-at-1.14.34%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sandboxing-powered-threat-intelligence-defending-against-stealer-malware/</loc>
		<lastmod>2026-01-15T19:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/10/VMRay-speakers-for-lp-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-emerging-threat-playbook-operationalizing-exploit-intelligence/</loc>
		<lastmod>2026-01-15T19:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/Vulncheck-speakers-for-lp-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/bridging-the-gap-between-business-and-cyber-risk-management/</loc>
		<lastmod>2026-01-15T19:46:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/Boardroom-Reporting-speakers-for-lp-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/watch-on-demand-how-cti-and-risk-management-unite-as-cyber-soulmates/</loc>
		<lastmod>2026-01-15T19:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Cyber-Soulmates_-Love-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/the-diamond-model-an-analysts-best-friend/</loc>
		<lastmod>2026-01-15T19:55:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screenshot-2026-01-15-at-2.54.18-PM-e1768506909642.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/four-things-you-might-not-be-doing-in-threatconnect-but-should-be/</loc>
		<lastmod>2026-01-15T20:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/Screenshot-2026-01-15-at-2.56.38-PM-e1768507267456.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-threatconnect-success-story-identifying-additional-insights-on-cyber-adversaries/</loc>
		<lastmod>2026-01-15T20:24:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-06-at-10.50.28-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/a-threatconnect-success-storyautomating-the-process-of-blocking-malicious-indicators-with-playbooks/</loc>
		<lastmod>2026-01-15T20:24:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/06/Screen-Shot-2023-06-15-at-11.31.27-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-intelligence-cycle/</loc>
		<lastmod>2026-01-15T20:39:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Intelligence-Cycle-Infographic-Featured-Image@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/phishing-with-threatconnect/</loc>
		<lastmod>2026-01-15T20:41:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Phishing-Webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/discover-rq-9-0-continuous-control-monitoring/</loc>
		<lastmod>2026-01-15T20:50:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/09/RQ9-hero-graphic-v4_transparent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-enterprise-by-threatconnect/</loc>
		<lastmod>2026-01-15T20:53:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Screenshot-2025-01-28-at-5.06.27%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-attck-visualizer/</loc>
		<lastmod>2026-01-15T20:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Screen-Shot-2023-10-30-at-11.14.47-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-intelligence-requirements/</loc>
		<lastmod>2026-01-15T20:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Screen-Shot-2023-10-04-at-12.30.47-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-2019-threat-hunting-survey-the-differing-needs-of-new-and-experienced-hunters/</loc>
		<lastmod>2026-01-15T21:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Whitepapers-Survey-ThreatHunting-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/building-a-threat-intelligence-program-managing-the-program/</loc>
		<lastmod>2026-01-15T21:06:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Managing-the-Program-Infographic@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/building-a-threat-intelligence-program/</loc>
		<lastmod>2026-01-15T21:07:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect_Building-a-Threat-Intelligence-Program@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-intel-edition-real-time-threat-intelligence-for-your-security-operations-webinar/</loc>
		<lastmod>2026-01-15T21:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/09/Polarity-Intel-Webinar-Speakers-for-lp-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/enabling-leaders-with-polarity-source-analytics/</loc>
		<lastmod>2026-01-15T21:20:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Screenshot-2025-03-26-at-7.04.06-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/enterprise-defense-at-the-speed-of-data/</loc>
		<lastmod>2026-01-15T21:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Enterprise-Defense-at-the-Speed-of-Data_@2x.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-healthcare-giants-operationalize-intel-at-scale/</loc>
		<lastmod>2026-01-20T20:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/01/Screenshot-2026-01-20-at-3.57.46-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-ucri-is-changing-the-cyber-landscape-2025-survey-results/</loc>
		<lastmod>2026-01-26T18:59:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/01/Screenshot-2026-01-26-at-12.29.04-PM-e1769448608422.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/banking-and-finance-organization-matures-threat-intelligence-operations-with-one-platform/</loc>
		<lastmod>2026-02-03T16:22:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Banking-Finance-Organization-Matures-Threat-Intelligence-Operations-One-Platform-screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/stop-guessing-start-quantifying-how-a-cpg-giant-solved-the-cyber-risk-puzzle/</loc>
		<lastmod>2026-02-03T22:56:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Screenshot-2026-02-03-at-11.26.20-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/from-pockets-of-intel-to-enterprise-wide-defense-modernizing-threat-intel-in-financial-services/</loc>
		<lastmod>2026-02-11T17:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Screenshot-2026-02-10-at-12.09.37-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/utilities-energy-enterprise-cuts-false-positives-by-over-75/</loc>
		<lastmod>2026-02-12T20:48:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Screenshot-2026-02-12-at-12.21.31-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/how-a-big-four-firm-set-the-standard-for-unified-security-operations/</loc>
		<lastmod>2026-02-17T17:39:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/02/Screenshot-2026-02-13-at-11.39.44-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/empower-the-threatconnect-buyers-guide-for-threat-intelligence-operations/</loc>
		<lastmod>2026-02-18T20:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Untitled-design-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/polarity-case-study-financial-service/</loc>
		<lastmod>2026-02-18T21:09:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/10/Screenshot-2026-02-18-at-3.14.05-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/maturing-a-threat-intelligence-program/</loc>
		<lastmod>2026-02-18T21:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2026-02-18-at-3.18.26-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/wyndham-improves-threat-detection-and-response-while-scaling-security-operations/</loc>
		<lastmod>2026-02-18T21:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Screenshot-2026-02-18-at-3.20.55-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-ti-ops-and-polarity-solution-brief/</loc>
		<lastmod>2026-02-18T21:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/Screenshot-2026-02-18-at-3.23.02-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnects-guide-to-cyber-risk-quantification/</loc>
		<lastmod>2026-02-18T21:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/04/Screenshot-2026-02-18-at-4.25.03-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-cti-survey-2024-managing-the-evolving-threat-landscape/</loc>
		<lastmod>2026-02-19T15:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/Screenshot-2026-02-18-at-4.27.26-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/Screenshot-2025-06-03-at-12.02.12%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/Screenshot-2025-06-03-at-12.06.05%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/elevate-your-soc-with-threatconnect-insights-from-the-2025-sans-soc-survey/</loc>
		<lastmod>2026-02-20T21:18:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/Screenshot-2026-02-18-at-2.17.27-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/operationalizing-intelligence-requirements-a-comprehensive-guide/</loc>
		<lastmod>2026-02-20T21:24:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Screenshot-2026-02-18-at-2.59.52-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-buyers-guide-for-cyber-risk-quantification-solutions/</loc>
		<lastmod>2026-02-20T21:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Screenshot-2026-02-18-at-3.16.12-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/sans-2025-cti-survey-navigating-uncertainty-in-todays-threat-landscape/</loc>
		<lastmod>2026-02-20T21:27:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/Screenshot-2026-02-18-at-2.41.33-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/operationalizing-threat-hunting-a-comprehensive-guide/</loc>
		<lastmod>2026-02-20T21:28:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Screenshot-2026-02-18-at-2.37.16-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/evolved-threat-intel-lifecycle-infographic/</loc>
		<lastmod>2026-02-23T18:22:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/01/Screenshot-2026-02-18-at-3.04.13-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/threatconnect-buyers-guide-for-threat-intelligence-operations/</loc>
		<lastmod>2026-02-24T15:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/09/Buyers-Guide-TI-Ops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/modernize-your-threat-intelligence-platform-whitepaper/</loc>
		<lastmod>2026-03-12T03:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/03/Screenshot-2026-02-18-at-4.31.13-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/operationalizing-risk-quantification-for-smarter-security/</loc>
		<lastmod>2026-03-12T03:04:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/Screenshot-2026-02-18-at-3.07.12-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/modern-mssp-services-powered-by-threatconnect/</loc>
		<lastmod>2026-03-12T03:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/11/Screenshot-2025-07-15-at-11.36.40-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/building-cyber-resilience-aligning-business-threat-intel-and-secops/</loc>
		<lastmod>2026-03-12T03:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/07/Screenshot-2026-02-18-at-2.40.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/operationalizing-cyber-risk-quantification/</loc>
		<lastmod>2026-03-12T03:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/02/Screenshot-2026-02-18-at-3.02.06-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/resource/mending-the-broken-cyber-defense-chain/</loc>
		<lastmod>2026-03-31T13:34:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-1.15.31-PM.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->