<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  
  <!-- Blog Homepage -->
  <url>
    <loc>https://securythm.com/blog</loc>
    <lastmod>2025-01-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>

  <!-- Blog Articles -->
  <url>
    <loc>https://securythm.com/blog/enterprise-security-best-practices</loc>
    <lastmod>2025-02-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-02-03</news:publication_date>
      <news:title>Enterprise Security Best Practices: A Comprehensive Guide for 2025</news:title>
      <news:keywords>enterprise security, cybersecurity best practices, security framework</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Enterprise Security Best Practices</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/ai-security</loc>
    <lastmod>2025-02-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-02-10</news:publication_date>
      <news:title>AI Security in 2025: Protecting Artificial Intelligence Systems</news:title>
      <news:keywords>AI security, machine learning security, artificial intelligence protection</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1677442136019-21780ecad995?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>AI Security Solutions</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/gdpr-compliance</loc>
    <lastmod>2025-02-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-02-15</news:publication_date>
      <news:title>GDPR Compliance Guide 2025: Essential Steps for Business Success</news:title>
      <news:keywords>GDPR compliance, data protection, privacy regulations</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563986768609-322da13575f3?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>GDPR Compliance Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/third-party-security-risk</loc>
    <lastmod>2025-02-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-02-20</news:publication_date>
      <news:title>Third Party Security Risk Management: A Comprehensive Guide</news:title>
      <news:keywords>third party risk, vendor security, supply chain security</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1556761175-b413da4baf72?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Third Party Security Risk Management</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/data-governance</loc>
    <lastmod>2025-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-02-25</news:publication_date>
      <news:title>Data Governance in 2025: A Comprehensive Guide</news:title>
      <news:keywords>data governance, data management, compliance</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1451187580459-43490279c0fa?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Data Governance Framework</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/threat-intelligence</loc>
    <lastmod>2025-03-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-01</news:publication_date>
      <news:title>The Importance of Threat Intelligence in Modern Cybersecurity</news:title>
      <news:keywords>threat intelligence, cybersecurity, threat detection</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Threat Intelligence Solutions</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/ransomware-response</loc>
    <lastmod>2025-03-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-05</news:publication_date>
      <news:title>Step-by-Step Incident Response Plan for Ransomware Attacks</news:title>
      <news:keywords>ransomware response, incident response, cybersecurity</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Ransomware Incident Response</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/azure-purview</loc>
    <lastmod>2025-03-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-10</news:publication_date>
      <news:title>Microsoft Purview: Comprehensive Guide to Modern Data Classification</news:title>
      <news:keywords>Microsoft Purview, data classification, data governance</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Microsoft Purview Data Classification</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/soc-comparison</loc>
    <lastmod>2025-03-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-15</news:publication_date>
      <news:title>Modern SOC Design: Data-oriented vs Traditional Approaches</news:title>
      <news:keywords>SOC design, security operations, data security</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1581092787765-e3feb791b8ab?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Modern SOC Design</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/managed-data-privacy-services</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-20</news:publication_date>
      <news:title>Managed Data Privacy Services: Complete Implementation Guide</news:title>
      <news:keywords>data privacy services, managed services, compliance</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563986768609-322da13575f3?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Managed Data Privacy Services</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://securythm.com/blog/azure-confidential-computing</loc>
    <lastmod>2025-03-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
    <news:news>
      <news:publication>
        <news:name>Securythm Blog</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2025-03-25</news:publication_date>
      <news:title>Azure Confidential Computing: Securing Data in Use</news:title>
      <news:keywords>Azure confidential computing, data security, cloud security</news:keywords>
    </news:news>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1451187580459-43490279c0fa?auto=format&fit=crop&q=80&w=2000</image:loc>
      <image:title>Azure Confidential Computing</image:title>
    </image:image>
  </url>

  <!-- Security Intelligence -->
  <url>
    <loc>https://securythm.com/security-intelligence</loc>
    <lastmod>2025-01-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>

  <!-- Case Studies -->
  <url>
    <loc>https://securythm.com/case-studies</loc>
    <lastmod>2025-01-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>

</urlset>