<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:ns2="http://www.google.com/schemas/sitemap-news/0.9">
    <url>
        <loc>https://www.techtarget.com/searchsecurity/news/366641212/News-brief-Iran-cyberattacks-escalate-US-targets-named</loc>
        <ns2:news>
            <ns2:publication_date>2026-04-03</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>News brief: Iran cyberattacks escalate, U.S. targets named</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Top-SOC-as-a-service-providers-and-how-to-evaluate-them</loc>
        <ns2:news>
            <ns2:publication_date>2026-04-02</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>5 top SOC-as-a-service providers and how to evaluate them</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Cloud-security-architecture-Enterprise-cloud-blueprint-for-CISOs</loc>
        <ns2:news>
            <ns2:publication_date>2026-04-02</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Cloud security architecture: Enterprise cloud blueprint for CISOs</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/feature/How-AI-caught-a-malicious-North-Korean-insider-at-Exabeam</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-30</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>How AI caught a malicious North Korean insider at Exabeam</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/feature/Watch-your-words-Tim-Browns-advice-for-CISOs</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-27</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Watch your words: Tim Brown's advice for CISOs</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/news/366640708/News-brief-US-absence-at-RSAC-sparks-leadership-concerns</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-27</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>News brief: U.S. absence at RSAC sparks leadership concerns</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/10-enterprise-secure-remote-access-best-practices</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-24</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>10 enterprise secure remote access best practices</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Top-vulnerability-scanning-tools-for-security-teams</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-23</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Top vulnerability scanning tools for security teams</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/news/366640592/News-brief-Stryker-recovering-after-large-scale-cyberattack</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-20</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>News brief: Stryker recovering after large-scale cyberattack</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/What-AI-zero-days-mean-for-enterprise-cybersecurity</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-19</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>What AI zero days mean for enterprise cybersecurity</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/8-secure-file-transfer-services-for-the-enterprise</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-19</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Secure file transfer services: Types, tools and selection tips</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Top-10-UEBA-enterprise-use-cases</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-17</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Top UEBA use cases in enterprise cybersecurity</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Boost-SOC-efficiency-with-Python-security-automation</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-17</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Boost SOC efficiency with Python security automation</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Calculating-the-ROI-of-AI-in-cybersecurity</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-16</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Calculating the ROI of AI in cybersecurity</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/news/366640393/News-brief-Risk-of-Iran-backed-cyberattacks-rising-in-US</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-13</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>News brief: Risk of Iran-backed cyberattacks rising in U.S.</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/Streamline-SecOps-with-SOAR-workflows-and-playbooks</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-13</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Streamline SecOps with SOAR workflows and playbooks</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/tip/How-to-start-an-enterprise-bug-bounty-program-A-CISOs-guide</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-11</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>How to start an enterprise bug bounty program: A CISO's guide</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/feature/SIEM-isnt-dead-its-place-in-the-SOC-is-just-evolving</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-11</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>SIEM isn't dead, its place in the SOC is just evolving</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/news/366639824/News-brief-Strikes-on-Iran-put-cybersecurity-teams-on-alert</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-06</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>News brief: Strikes on Iran put cybersecurity teams on alert</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/feature/Explore-this-NGFW-comparison-of-leading-vendors-on-the-market</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-05</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Comparison of 5 top next-generation firewall vendors</ns2:title>
        </ns2:news>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/feature/Should-a-CISO-have-an-MBA</loc>
        <ns2:news>
            <ns2:publication_date>2026-03-05</ns2:publication_date>
            <ns2:publication>
                <ns2:name>TechTarget</ns2:name>
                <ns2:language>en</ns2:language>
            </ns2:publication>
            <ns2:title>Should a CISO have an MBA?</ns2:title>
        </ns2:news>
    </url>
</urlset>
