<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyvexsecurity.com</loc>
<lastmod>2026-05-04T17:30:15.423Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/about</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/contact</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/book-demo</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/careers</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/case-studies</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/compliance-automation</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breach-digest</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breach-response-playbook</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/breaches</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/continuous-vs-one-off-security-scans</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/cyvex-platform</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/how-cyber-attacks-start-in-small-businesses</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/how-cyvex-works</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/iso-27001-certification</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/managed-security-services</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/partners</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/penetration-testing</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/platform</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/pricing</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/security-disclosure-policy</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/soc-2-compliance</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/soc2-readiness-checklist</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/videos</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/video-creator</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/vulnerability-scanning</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/vulnerability-scanning-for-smes</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/what-is-vulnerability-scanning</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/threat-intelligence</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/solutions/cloud-security-posture-management</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/solutions/ransomware-incident-response</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/cookie-policy</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/privacy-policy</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/terms</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-best-practices</loc>
<lastmod>2026-05-02</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/blockchain-security-solutions-research</loc>
<lastmod>2026-05-02</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/threat-intel-trends-2026</loc>
<lastmod>2026-05-01</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/latest-cyber-threats</loc>
<lastmod>2026-05-01</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-awareness-campaign-launched</loc>
<lastmod>2026-05-01</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/data-breach-report-analysis</loc>
<lastmod>2026-05-01</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-training-workshops</loc>
<lastmod>2026-05-01</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/threat-intel-best-practices</loc>
<lastmod>2026-04-28</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/importance-of-cybersecurity-training</loc>
<lastmod>2026-04-28</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/major-data-breach-exposed</loc>
<lastmod>2026-04-28</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/iot-security-impact-study</loc>
<lastmod>2026-04-28</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/collaborative-cybersecurity-knowledge-hub</loc>
<lastmod>2026-04-28</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/latest-threat-intel-tools</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/risks-of-iot-devices</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/new-cybersecurity-legislation-proposed</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cyber-attack-trends-analysis</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-webinar-series</loc>
<lastmod>2026-04-25</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/zero-day-vulnerability-discovered</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/threat-intel-sharing-framework</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/how-to-secure-remote-employees</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/zero-day-vulnerabilities-report</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/latest-research-trends-cybersecurity</loc>
<lastmod>2026-04-20</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/ransomware-attacks-rise</loc>
<lastmod>2026-04-18</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cyber-threat-intel-importance</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/blog/cybersecurity-knowledge-sharing</loc>
<lastmod>2026-04-15</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security</loc>
<lastmod>2026-05-04T17:30:15.424Z</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/first-day-setup</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/invite-your-team</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/connect-first-asset</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/understand-dashboard</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/getting-started/configure-alerts</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/schedule-scans</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-scope</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/authenticated-scans</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/scan-exclusions</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/scanning/read-scan-report</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/soc2-evidence-basics</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/iso-27001-mapping</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/cyber-essentials-prep</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/export-audit-report</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/compliance/vuln-evidence-retention</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/slack-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/jira-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/github-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/aws-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/integrations/sso-integration</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/manage-seats</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/invoices-vat</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/billing/change-plan</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/enforce-mfa</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/api-keys</loc>
<lastmod>2026-04-22</lastmod>
</url>
<url>
<loc>https://cyvexsecurity.com/knowledge-base/security/audit-logs</loc>
<lastmod>2026-04-22</lastmod>
</url>
</urlset>
