<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cyb3r-x.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-13 02:40:06 GMT -->
	<url>
		<loc>https://cyb3r-x.com/</loc>
		<lastmod>2022-10-17T22:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/more-leads/</loc>
		<lastmod>2023-05-02T17:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/contact-us/</loc>
		<lastmod>2023-01-19T22:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/msp-sales-marketing-empowerment-webinar/</loc>
		<lastmod>2022-12-06T14:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/emergency-incident-response/</loc>
		<lastmod>2021-11-13T21:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/managed-siem/</loc>
		<lastmod>2021-11-10T23:08:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/xdr/</loc>
		<lastmod>2021-09-09T23:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/marketing-qa-with-cyb3r-x/</loc>
		<lastmod>2021-09-02T15:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/introductory-offer/</loc>
		<lastmod>2021-08-17T21:59:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/subscribe/</loc>
		<lastmod>2021-08-17T20:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/bootcamp/</loc>
		<lastmod>2021-05-11T22:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tmt-special-offer/</loc>
		<lastmod>2023-04-11T22:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/msp-sell/</loc>
		<lastmod>2021-05-04T17:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/uba-user-behavior-analytics-2/</loc>
		<lastmod>2021-04-07T22:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/ngav-next-generation-antivirus-protection-2/</loc>
		<lastmod>2021-04-07T19:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tbg-special/</loc>
		<lastmod>2021-04-23T16:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/homepage-draft/</loc>
		<lastmod>2021-03-16T16:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/msp-win/</loc>
		<lastmod>2021-03-11T14:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/webinar-mktg/</loc>
		<lastmod>2021-04-08T21:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/linkedin-webinar/</loc>
		<lastmod>2021-04-08T16:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tbg1117/</loc>
		<lastmod>2020-11-16T20:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tmt-special-offer-draft/</loc>
		<lastmod>2023-01-20T17:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tmtoct/</loc>
		<lastmod>2020-10-26T18:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tmt10-21/</loc>
		<lastmod>2020-10-22T20:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/tmt-webinar-offer-starter-package/</loc>
		<lastmod>2020-09-18T15:12:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/nextgen-anti-virus/</loc>
		<lastmod>2021-11-04T15:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/xdr-extended-detection-response/</loc>
		<lastmod>2020-10-23T01:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/network-analytics/</loc>
		<lastmod>2020-10-21T09:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/uba-user-behavior-analytics/</loc>
		<lastmod>2021-11-05T12:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/deception/</loc>
		<lastmod>2021-11-08T10:51:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/continuous-monitoring-control/</loc>
		<lastmod>2021-11-08T16:34:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/incident-response-orchestration/</loc>
		<lastmod>2021-11-08T16:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/eula/</loc>
		<lastmod>2021-04-08T22:07:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/terms-and-conditions/</loc>
		<lastmod>2021-12-09T21:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/privacy-policy/</loc>
		<lastmod>2020-10-21T08:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/4q21pricing/</loc>
		<lastmod>2021-12-16T00:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/platform/</loc>
		<lastmod>2020-10-23T01:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/company/</loc>
		<lastmod>2020-08-30T07:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/about-us/</loc>
		<lastmod>2022-10-14T07:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/12/27/how-to-protect-your-network-from-ransomware-tips-from-the-fbi/</loc>
		<lastmod>2023-12-27T16:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/12/13/8-essential-skills-for-modern-cybersecurity-professionals/</loc>
		<lastmod>2023-12-13T15:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/12/06/what-is-risk-appetite/</loc>
		<lastmod>2023-12-06T20:12:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/11/09/how-cyb3r-x-can-help-msps/</loc>
		<lastmod>2023-11-09T18:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/10/17/cyb3r-x-key-business-benefits/</loc>
		<lastmod>2023-10-17T16:20:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/10/17/private-cloud-storage-vs-public-cloud-storage/</loc>
		<lastmod>2023-10-17T15:49:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/09/27/cve-2023-5129-a-critical-libwebp-vulnerability/</loc>
		<lastmod>2023-09-28T21:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/09/19/what-is-security-posture/</loc>
		<lastmod>2023-09-19T19:55:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/09/13/why-managed-endpoint-security-eliminates-cybersecurity-blind-spots/</loc>
		<lastmod>2023-09-13T17:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/09/09/five-myths-about-ransomware/</loc>
		<lastmod>2023-09-12T22:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/08/25/how-to-overcome-three-major-cybersecurity-budget-hurdles/</loc>
		<lastmod>2023-08-25T16:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/08/10/5-pitfalls-in-cloud-cybersecurity-shared-responsibility-model/</loc>
		<lastmod>2023-08-10T16:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/06/16/the-1-differentiator-for-msps/</loc>
		<lastmod>2023-06-16T16:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/24/mssp-saas-cloud-computing-confused-i-know-i-am/</loc>
		<lastmod>2023-05-24T16:09:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/22/pci-compliance-and-hotels/</loc>
		<lastmod>2023-05-22T16:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/18/how-msps-are-delivering-better-faster-incident-response/</loc>
		<lastmod>2023-05-18T15:49:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/17/align-your-cybersecurity-posture-to-your-cyber-risk-tolerance/</loc>
		<lastmod>2023-05-17T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/11/cyb3r-x-managed-threat-protection-vs-siem-only/</loc>
		<lastmod>2023-05-11T17:19:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/05/the-ten-steps-post-data-breach/</loc>
		<lastmod>2023-05-05T19:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/05/03/threat-hunting-experts/</loc>
		<lastmod>2023-05-03T15:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/24/hipaa-breach-notifications/</loc>
		<lastmod>2023-04-24T16:44:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/19/how-to-control-and-detect-users-logging-onto-unauthorized-computers/</loc>
		<lastmod>2023-04-19T17:52:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/14/top-3-high-risk-behaviors-that-compromise-it-security/</loc>
		<lastmod>2023-04-14T19:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/11/cyb3r-x-in-the-2023-it-sales-and-marketing-boot-camp/</loc>
		<lastmod>2023-04-11T17:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/06/tracking-removable-storage/</loc>
		<lastmod>2023-04-06T22:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/04/03/when-a-siem-is-like-an-exercise-machine-stuck-behind-the-junk-in-your-garage/</loc>
		<lastmod>2023-04-03T17:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/29/breakdown-of-cybersecuritys-biggest-buzzwords/</loc>
		<lastmod>2023-03-29T14:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/28/can-small-and-mid-size-companies-benefit-from-xdr/</loc>
		<lastmod>2023-03-28T22:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/24/what-are-the-crucial-components-of-xdr/</loc>
		<lastmod>2023-03-24T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/22/breaking-3-cybersecurity-barriers/</loc>
		<lastmod>2023-03-22T20:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/14/a-complete-guide-to-zero-day-attacks/</loc>
		<lastmod>2023-03-14T22:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/10/cyb3r-x-security-service-provider-mind-the-security-gap/</loc>
		<lastmod>2023-03-10T21:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/03/03/are-you-guilty-of-any-of-these-pci-myths/</loc>
		<lastmod>2023-03-03T23:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/02/28/cyb3r-x-san-diego-tmt-event/</loc>
		<lastmod>2023-02-28T00:22:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/02/23/maximizing-productivity-tools-and-strategies-for-small-business-owners/</loc>
		<lastmod>2023-02-23T18:07:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/02/15/cyb3r-x-managed-siem/</loc>
		<lastmod>2023-02-15T15:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/02/09/cyb3r-x-as-a-security-operations-center-soc/</loc>
		<lastmod>2023-02-09T19:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/02/06/ransomwares-next-move/</loc>
		<lastmod>2023-02-06T23:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/01/26/incident-response-whose-job-is-it/</loc>
		<lastmod>2023-01-26T23:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/01/20/practices-to-consider-when-msps-offer-security-services/</loc>
		<lastmod>2023-01-20T23:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/01/16/cybersecurity-cyber-crime-in-2023-what-msps-need-to-know-2/</loc>
		<lastmod>2023-01-16T23:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2023/01/06/incident-responders-for-msps/</loc>
		<lastmod>2023-01-06T23:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/27/encourage-a-healthy-security-attitude/</loc>
		<lastmod>2022-12-27T17:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/21/essential-soft-skills-for-cybersecurity-success/</loc>
		<lastmod>2022-12-21T17:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/19/cybersecurity-cyber-crime-in-2023-what-msps-need-to-know/</loc>
		<lastmod>2022-12-19T22:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/14/understanding-xdr-security/</loc>
		<lastmod>2022-12-14T18:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/12/it-service-providers-mind-the-security-gap/</loc>
		<lastmod>2022-12-12T23:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/07/implementing-zero-trust-policy/</loc>
		<lastmod>2022-12-07T22:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/12/06/foster-a-healthy-security-posture/</loc>
		<lastmod>2022-12-06T00:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/29/what-is-siem/</loc>
		<lastmod>2022-11-29T23:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/26/cyberattack-defense-for-managed-service-providers/</loc>
		<lastmod>2022-11-26T00:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/23/distribution-anatomy-protection-ftcode-ransomware/</loc>
		<lastmod>2022-11-23T23:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/18/can-you-call-your-cybersecurity-approach-reactive-chaos/</loc>
		<lastmod>2022-11-18T18:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/17/cybercrime-doesnt-recognizes-holiday/</loc>
		<lastmod>2022-11-17T23:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/14/your-cybersecurity-arsenal-siem-ueba-and-soar/</loc>
		<lastmod>2022-11-14T22:03:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/11/do-you-know-your-cyber-blind-spot/</loc>
		<lastmod>2022-11-11T23:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/11/your-voice-for-smb-compliance-pains/</loc>
		<lastmod>2022-11-11T00:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/08/how-to-protect-your-organization-from-dns-attack-in-5-best-ways/</loc>
		<lastmod>2022-11-08T20:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/04/venom-vulnerability-on-cyberattacks/</loc>
		<lastmod>2022-11-04T22:45:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/03/pay-attention-to-events-involving-system-access-security/</loc>
		<lastmod>2022-11-03T21:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/11/01/the-real-price-of-opening-and-running-a-round-the-clock-security-operations-center-soc/</loc>
		<lastmod>2022-11-01T20:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/27/difference-between-mdr-and-other-security-solutions/</loc>
		<lastmod>2022-10-27T21:56:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/24/an-mssp-for-your-msp/</loc>
		<lastmod>2022-10-17T23:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/21/what-is-user-behavior-analytics-ueba/</loc>
		<lastmod>2022-10-17T22:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/20/advanced-threat-detection-and-protection-with-cyb3r-x/</loc>
		<lastmod>2022-10-17T22:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/19/zero-day-attacks-exploits-and-why-its-dangerous/</loc>
		<lastmod>2022-10-17T22:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/18/buy-rent-or-uber-your-security-operations-center/</loc>
		<lastmod>2022-10-17T22:38:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/17/get-familiar-with-sdr-functions-and-its-importance/</loc>
		<lastmod>2022-10-17T22:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/14/establishing-a-central-system-for-log-collection/</loc>
		<lastmod>2022-10-14T20:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/12/get-familiar-with-xdr-functions-and-importance/</loc>
		<lastmod>2022-10-12T23:34:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/10/firewall-benefits-the-importance-of-firewall-security/</loc>
		<lastmod>2022-10-10T22:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/07/financial-data-protection-cyber-risks-msps-cant-ignore/</loc>
		<lastmod>2022-10-07T22:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/10/05/remote-working-and-cyber-security-tips/</loc>
		<lastmod>2022-10-05T21:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/29/how-critical-edr-with-smb-security/</loc>
		<lastmod>2022-09-29T23:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/26/3-dos-and-1-dont-to-improve-your-it-security/</loc>
		<lastmod>2022-09-26T23:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/20/guidelines-for-preventing-insider-threats/</loc>
		<lastmod>2022-09-20T21:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/16/cybersecurity-insights-that-enhance-security-operation/</loc>
		<lastmod>2022-09-16T23:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/15/learn-why-data-privacy-is-good-for-your-business-reference/</loc>
		<lastmod>2022-09-15T23:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/14/it-security-how-much-should-you-spend/</loc>
		<lastmod>2022-09-07T19:40:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/13/protecting-legal-data-3-ways-msps-can-enhance-cybersecurity/</loc>
		<lastmod>2022-09-13T23:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/12/is-the-elk-stack-a-siem/</loc>
		<lastmod>2022-09-07T19:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/09/how-the-endpoint-protection-evolution-is-changing-managed-threat-detection-and-response/</loc>
		<lastmod>2022-09-07T19:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/08/avoid-log-monitoring-gaps-with-holistic-coverage/</loc>
		<lastmod>2022-09-08T18:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/07/7-threats-to-watch-on-labor-day/</loc>
		<lastmod>2022-09-07T19:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/06/maximizing-endpoint-security/</loc>
		<lastmod>2022-08-29T19:22:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/05/key-benefits-of-xdr-what-should-it-solutions-do-for-you/</loc>
		<lastmod>2022-08-29T19:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/02/use-vpn-properly-to-support-work-from-home-employees/</loc>
		<lastmod>2022-08-29T17:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/09/01/ten-work-from-home-cybersecurity-and-productivity-tips/</loc>
		<lastmod>2022-08-29T17:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/31/think-like-a-hacker-vulnerability-management-and-protection/</loc>
		<lastmod>2022-08-29T17:36:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/30/cloud-and-saas-security-mind-the-gap-2/</loc>
		<lastmod>2022-08-29T17:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/29/which-soc-approach-is-best-for-you/</loc>
		<lastmod>2022-08-29T16:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/25/threat-hunting-five-myths-for-msps-to-overcome-directions/</loc>
		<lastmod>2022-08-25T23:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/22/msp-preparation-for-economic-uncertainty-2/</loc>
		<lastmod>2022-08-22T23:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/18/msp-preparation-for-economic-uncertainty/</loc>
		<lastmod>2022-08-18T21:17:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/17/msps-need-both-cybersecurity-automation-and-human-expertise/</loc>
		<lastmod>2022-08-17T23:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/16/the-top-10-commandments-of-incident-response/</loc>
		<lastmod>2022-08-08T19:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/15/what-are-the-advantages-of-siem/</loc>
		<lastmod>2022-08-08T19:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/12/understanding-cyb3-x-user-behavior-analytics-rule/</loc>
		<lastmod>2022-08-08T19:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/11/understanding-ngav-next-generation-anti-virus-protection/</loc>
		<lastmod>2022-08-08T19:05:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/10/why-managed-xdr-is-the-future-of-cybersecurity-operations/</loc>
		<lastmod>2022-08-08T19:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/08/improve-security-with-a-cyber-hygiene-routine-2/</loc>
		<lastmod>2022-08-08T18:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/08/06/renew-focus-on-web-application-security-2/</loc>
		<lastmod>2022-08-06T00:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/29/incident-response-policy-a-quick-guide-for-msps/</loc>
		<lastmod>2022-07-29T23:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/28/what-is-managed-siem/</loc>
		<lastmod>2022-07-28T00:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/18/cyber-world-how-to-protect-your-business-from-unknown/</loc>
		<lastmod>2022-07-18T23:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/15/security-alert-hackers-and-cyber-criminals-are-now-concentrating-their-attacks-on-small-business-2/</loc>
		<lastmod>2022-07-15T23:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/14/understanding-and-applying-siem-a-boost-to-security/</loc>
		<lastmod>2022-07-14T22:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/13/be-smarter-protecting-yourself-from-scams/</loc>
		<lastmod>2022-07-13T23:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/12/discover-the-benefits-of-data-privacy-for-your-business/</loc>
		<lastmod>2022-07-12T23:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/11/which-is-better/</loc>
		<lastmod>2022-07-11T23:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/09/the-importance-of-virtual-private-networks/</loc>
		<lastmod>2022-07-09T00:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/07/stretching-your-cybersecurity-dollar-in-3-unique-ways/</loc>
		<lastmod>2022-07-07T23:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/06/they-dont-take-a-break-cybercrime-doesnt-take-a-holiday/</loc>
		<lastmod>2022-07-06T23:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/05/web-application-security-refocus-and-redefined/</loc>
		<lastmod>2022-07-05T21:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/07/01/increase-consumer-loyalty-and-trust-on-this-effective-tips/</loc>
		<lastmod>2022-07-01T23:45:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/30/top-ten-tips-for-work-from-home-employee/</loc>
		<lastmod>2022-06-30T23:57:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/29/nobelium-threats-cybersecurity-once-again/</loc>
		<lastmod>2022-06-29T22:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/28/fact-check-myths-on-ransomware-uncovered/</loc>
		<lastmod>2022-06-28T22:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/27/predict-prevent-detect-ransomware-protection-tips/</loc>
		<lastmod>2022-06-27T22:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/24/the-solution-to-the-cybersecurity-vendor-sprawl-consolidation/</loc>
		<lastmod>2022-06-24T21:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/23/counter-attack-with-a-cyber-hygiene-routine/</loc>
		<lastmod>2022-06-23T19:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/22/endure-login-attacks-learn-this-5-easy-ways/</loc>
		<lastmod>2022-06-22T16:17:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/21/saving-data-breaches-cost-like-ride-sharing-ideas/</loc>
		<lastmod>2022-06-21T23:04:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/20/your-cybersecurity-dollar-saved-in-3-steps/</loc>
		<lastmod>2022-06-20T19:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/17/msps-how-to-quickly-and-cost-effectively-add-security-services/</loc>
		<lastmod>2022-06-17T19:53:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/16/key-awareness-cloud-and-saas-security/</loc>
		<lastmod>2022-06-16T18:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/15/skyrocketing-business-ransomware-as-a-service/</loc>
		<lastmod>2022-06-15T19:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/14/5-smart-ways-to-thwart-login-attacks/</loc>
		<lastmod>2022-06-14T16:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/10/threat-hunting-five-myths-for-msps-to-overcome/</loc>
		<lastmod>2022-06-10T23:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/06/01/renew-focus-on-web-application-security/</loc>
		<lastmod>2022-06-01T17:49:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/25/a-market-leader-in-cybersecurity/</loc>
		<lastmod>2022-05-25T23:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/24/explore-cyb3r-x-managed-threat-protection/</loc>
		<lastmod>2022-05-24T22:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/20/bring-in-managed-to-reduce-complexity-and-cost/</loc>
		<lastmod>2022-05-20T23:27:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/18/first-critical-component-of-an-effective-xdr-platform/</loc>
		<lastmod>2022-05-18T20:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/16/addressing-cybersecurity-skills-gap/</loc>
		<lastmod>2022-05-16T23:36:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/10/reducing-alert-flood-and-operational-inefficiency/</loc>
		<lastmod>2022-05-10T23:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/06/tackling-sophisticated-threats-with-ai-driven-correlation-at-scale/</loc>
		<lastmod>2022-05-06T20:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/04/what-is-xdr-and-why-does-it-exist/</loc>
		<lastmod>2022-05-04T23:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/05/02/are-current-cybersecurity-stacks-effective/</loc>
		<lastmod>2022-05-02T23:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/04/29/securing-zoom-conferencing-to-protect-data/</loc>
		<lastmod>2022-04-29T18:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/04/21/key-takeaways-from-mitre-attckcon-3-0-for-defenders/</loc>
		<lastmod>2022-04-21T00:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/04/15/improve-security-with-a-cyber-hygiene-routine/</loc>
		<lastmod>2022-04-15T22:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/04/09/ten-steps-to-defend-your-microsoft-exchange-servers-from-proxylogon-exploit/</loc>
		<lastmod>2022-04-09T00:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/30/what-is-ransomware/</loc>
		<lastmod>2022-03-30T23:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/29/4-steps-to-keep-you-cyber-safe/</loc>
		<lastmod>2022-03-29T00:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/25/understanding-edr-2/</loc>
		<lastmod>2022-03-25T22:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/18/protecting-msps-from-cyber-attacks/</loc>
		<lastmod>2022-03-18T22:10:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/14/ransomware-protection/</loc>
		<lastmod>2022-03-14T23:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/11/consolidation-the-antidote-to-cybersecurity-vendor-sprawl/</loc>
		<lastmod>2022-03-11T17:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/08/cisa-and-fbi-publish-advisory-to-protect-organizations-from-destructive-malware-used-in-ukraine/</loc>
		<lastmod>2022-03-08T00:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/03/05/what-should-xdr-solutions-do-for-you/</loc>
		<lastmod>2022-03-05T01:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/25/ransomware-as-a-service-is-skyrocketing/</loc>
		<lastmod>2022-03-01T13:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/22/security-alert-hackers-and-cyber-criminals-are-now-concentrating-their-attacks-on-small-business/</loc>
		<lastmod>2022-02-22T00:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/16/msps-how-to-add-security-services-fast-and-affordably-2/</loc>
		<lastmod>2022-02-16T01:31:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/11/why-every-business-needs-to-implement-threat-hunting/</loc>
		<lastmod>2022-02-11T23:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/10/how-to-combat-the-rising-costs-of-cybersecurity-insurance/</loc>
		<lastmod>2022-02-10T00:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/08/what-is-edr-and-why-it-is-important-to-smb-security/</loc>
		<lastmod>2022-02-08T00:44:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/04/cloud-and-saas-security-mind-the-gap/</loc>
		<lastmod>2022-02-04T18:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/02/03/use-mitre-attck-to-thwart-ransomware-faster-2/</loc>
		<lastmod>2022-02-03T00:35:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/31/prevention-is-key-in-cybersecurity/</loc>
		<lastmod>2022-01-31T18:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/28/this-malware-might-be-undetectable-to-some-antivirus-programs/</loc>
		<lastmod>2022-01-28T15:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/25/ten-steps-to-defend-your-microsoft-servers-from-proxylogon-exploit/</loc>
		<lastmod>2022-01-25T00:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/24/what-is-a-soc-10-core-functions-and-6-key-challenges/</loc>
		<lastmod>2023-01-24T22:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/21/four-key-steps-to-emergency-rapid-response/</loc>
		<lastmod>2022-01-21T23:24:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/19/top-5-cyber-security-threats-every-business-owners-should-know/</loc>
		<lastmod>2022-01-19T22:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/18/criminals-are-using-youtube-video-channels-to-spread-malware/</loc>
		<lastmod>2022-01-18T00:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/11/3566/</loc>
		<lastmod>2022-01-11T00:09:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/07/msps-how-to-add-security-services-fast-and-affordably/</loc>
		<lastmod>2022-01-07T17:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/06/msps-versus-ransomware-in-2022-where-multi-layered-security-fits-in/</loc>
		<lastmod>2022-01-06T01:57:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2022/01/04/aws-outage-caused-major-headaches-for-businesses/</loc>
		<lastmod>2022-01-04T00:47:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/22/understanding-xdr/</loc>
		<lastmod>2021-12-22T20:02:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/20/msp-margins-are-becoming-slimmer-and-customers-less-loyal/</loc>
		<lastmod>2021-12-20T22:57:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/17/understanding-epp/</loc>
		<lastmod>2021-12-17T21:12:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/15/understanding-edr/</loc>
		<lastmod>2021-12-15T23:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/13/securing-zoom-to-protect-data/</loc>
		<lastmod>2021-12-13T17:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/10/why-managed-endpoint-security-eliminates-cybersecurity-blind-spots-3/</loc>
		<lastmod>2021-12-10T17:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/08/steps-for-internal-cyber-security/</loc>
		<lastmod>2021-12-08T17:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/06/what-you-need-to-know-about-cyber-insurance-and-cyber-security/</loc>
		<lastmod>2021-12-06T18:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/03/understanding-mdr/</loc>
		<lastmod>2021-12-03T21:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/12/01/think-like-a-hacker-with-mitre-attck/</loc>
		<lastmod>2021-12-01T21:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/29/exchange-servers-are-the-target-of-this-new-ransomware/</loc>
		<lastmod>2021-11-29T23:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/26/3-tips-to-stretch-your-cybersecurity-dollar/</loc>
		<lastmod>2021-11-26T17:37:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/24/3443/</loc>
		<lastmod>2021-12-21T19:59:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/22/your-business-should-prioritize-cyber-security-today/</loc>
		<lastmod>2021-11-22T23:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/19/what-is-the-most-difficult-thing-facing-business-owners-and-it-executives-to-help-them-fight-ransomware/</loc>
		<lastmod>2021-11-19T19:11:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/17/why-managed-endpoint-security-eliminates-cybersecurity-blind-spots-2/</loc>
		<lastmod>2021-11-17T16:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/12/assessing-your-siem-options/</loc>
		<lastmod>2021-11-12T16:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/10/the-importance-of-periodic-cyber-security-assessments/</loc>
		<lastmod>2021-11-10T17:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/08/the-u-s-government-will-start-suing-contractors-who-hide-security-breaches-and-incidents/</loc>
		<lastmod>2021-11-08T16:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/05/vulnerability-management-think-like-a-hacker/</loc>
		<lastmod>2021-11-05T16:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/03/how-to-validate-edr-with-top-3-business-cases/</loc>
		<lastmod>2021-11-03T14:37:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/11/01/how-soc-as-a-service-enhances-security-operations/</loc>
		<lastmod>2021-11-01T17:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/29/selecting-the-right-xdr-provider/</loc>
		<lastmod>2023-07-11T18:32:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/25/executive-involvement-in-cybersecurity-leadership/</loc>
		<lastmod>2021-10-25T16:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/22/change-your-nas-device-password-to-avoid-ransomware-attacks/</loc>
		<lastmod>2021-10-22T15:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/21/this-malware-could-be-using-your-pc-to-make-money/</loc>
		<lastmod>2021-10-21T16:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/18/criminal-gang-nobelium-ramps-up-attacks/</loc>
		<lastmod>2021-10-18T15:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/15/use-mitre-attck-to-thwart-ransomware-faster/</loc>
		<lastmod>2021-10-15T18:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/04/mdr-is-a-critical-capabilities-for-mssps-keys-to-making-the-right-choice/</loc>
		<lastmod>2021-10-25T19:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyb3r-x.com/2021/10/01/building-trust-four-tips-for-mssps/</loc>
		<lastmod>2021-11-23T15:38:47+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
