<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyvexsecurity.com</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/about</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/contact</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/book-demo</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/careers</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/case-studies</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/compliance-automation</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breach-digest</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breach-response-playbook</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breaches</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/continuous-vs-one-off-security-scans</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/cyvex-platform</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/how-cyber-attacks-start-in-small-businesses</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/how-cyvex-works</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/iso-27001-certification</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/managed-security-services</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/partners</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/penetration-testing</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/platform</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/pricing</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/security-disclosure-policy</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/soc-2-compliance</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/soc2-readiness-checklist</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/videos</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/video-creator</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/vulnerability-scanning</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/vulnerability-scanning-for-smes</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/what-is-vulnerability-scanning</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/threat-intelligence</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/solutions/cloud-security-posture-management</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/solutions/ransomware-incident-response</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/cookie-policy</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/privacy-policy</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/terms</loc>
<lastmod>2026-05-01T06:47:59.606Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/ai-cybersecurity-defense</loc>
<lastmod>2026-04-26</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/threat-intel-trends-future-outlook</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/security-briefings-best-practices</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/iot-security-concerns</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/the-rise-of-ransomware-attacks-and-how-to-protect-against-them</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-training-tips</loc>
<lastmod>2026-04-23</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-regulations-updated</loc>
<lastmod>2026-04-23</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/impact-threat-intel-on-incident-response</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/the-role-of-ai-in-cybersecurity</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/threat-intel-sharing-best-practices</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/importance-of-patching-software</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/ransomware-attacks-surging</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-threats-2026-report</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-best-practices-for-iot-devices</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/zero-trust-framework-implemented</loc>
<lastmod>2026-04-19</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/latest-techniques-threat-intel</loc>
<lastmod>2026-04-18</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/latest-cyber-threats</loc>
<lastmod>2026-04-18</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/the-importance-of-cybersecurity-training</loc>
<lastmod>2026-04-18</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/how-threat-intel-improved-cybersecurity</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/how-to-protect-against-ransomware</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/data-breach-trends-2026-analysis</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/5-cybersecurity-tips-for-working-remotely</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/zero-day-vulnerabilities-research-findings</loc>
<lastmod>2026-04-10</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-spending-2026-report</loc>
<lastmod>2026-04-05</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/remote-work-security-research-insights</loc>
<lastmod>2026-03-30</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security</loc>
<lastmod>2026-05-01T06:47:59.607Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/first-day-setup</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/invite-your-team</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/connect-first-asset</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/understand-dashboard</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/configure-alerts</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/schedule-scans</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-scope</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/authenticated-scans</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-exclusions</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/read-scan-report</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/soc2-evidence-basics</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/iso-27001-mapping</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/cyber-essentials-prep</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/export-audit-report</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/vuln-evidence-retention</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/slack-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/jira-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/github-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/aws-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/sso-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/manage-seats</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/invoices-vat</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/change-plan</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/enforce-mfa</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/api-keys</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/audit-logs</loc>
<lastmod>2026-04-22</lastmod>
</url>
</urlset>
