<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/24/mobilize-your-mobile-security-mindset</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-4.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl4</image:caption><image:title>Defendifyspring20192500x1600v1rl4</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/6/11/got-sensitive-data</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-1.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl1</image:caption><image:title>Defendifyspring20192500x1600v1rl1</image:title></image:image><lastmod>2019-06-12</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/16/defendify-promotes-cybersecurity-awareness-at-local-hr-event</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/8/29/defendify-pledges-to-support-national-cybersecurity-awareness-month-2018-as-a-champion</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/2/26/defendify-hosts-cybersecurity-workshop-with-score-portland</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/ransomware-much-more-than-the-kings-ransom</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-3.jpg</image:loc><image:caption>BlogHeader3</image:caption><image:title>BlogHeader3</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/4/defendify-proud-supporter-of-nscas-business-leadership-conference</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/7/16/portland-trails-clean-up-crew</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/10/6/october-is-national-cyber-security-awareness-month</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/11/8/are-you-voting-for-or-against-byod</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-26.jpg</image:loc><image:caption>BlogHeader26</image:caption><image:title>BlogHeader26</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/16/defendify-volunteers-to-maintain-wildlife-habitat-at-the-united-way-day-of-action</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/cybersecurity-from-the-top</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/6/22/security-cameras-risk-or-reward</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-11.jpg</image:loc><image:caption>BlogHeader11</image:caption><image:title>BlogHeader11</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/img-2.jpg</image:loc><image:caption>img2</image:caption><image:title>img2</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/10/your-computer-cant-take-a-sick-day</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-7.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl7</image:caption><image:title>DefendifythePointblogheaderv1rl7</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/11/3/its-ok-to-be-sensitive-our-data-sure-is</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-66.jpg</image:loc><image:caption>BlogHeader66</image:caption><image:title>BlogHeader66</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/9/20/the-small-business-case-for-a-culture-of-cybersecurity</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-41.jpg</image:loc><image:caption>BlogHeader41</image:caption><image:title>BlogHeader41</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/business.com-feature-cybersecurity-and-safe-travels</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_summer2019_hubspot_hero-2.png</image:loc><image:caption>Defendifysummer2019hubspothero2</image:caption><image:title>Defendifysummer2019hubspothero2</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/7/22/as-goes-the-leader-so-goes-the-company</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-72.jpg</image:loc><image:caption>BlogHeader72</image:caption><image:title>BlogHeader72</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/21/a-good-referee-keeps-the-game-safe</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-9.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl9</image:caption><image:title>Defendifyspring20192500x1600v1rl9</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/10/26/safeguarding-the-nations-critical-infrastructure</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-47.jpg</image:loc><image:caption>BlogHeader47</image:caption><image:title>BlogHeader47</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/18/security-business-magazine-feature-the-integrators-convergence-to-cybersecurity</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/20/businesscom-feature-a-spring-clean-desk-policy-for-data-security</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-10.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl10</image:caption><image:title>Defendifyspring20192500x1600v1rl10</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/10/5/iot-can-mean-smarter-faster-cheaper-and-less-secure</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-23.jpg</image:loc><image:caption>BlogHeader23</image:caption><image:title>BlogHeader23</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/11/1/everyone-a-cyberdefender</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-24.jpg</image:loc><image:caption>BlogHeader24</image:caption><image:title>BlogHeader24</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/5/31/launch-security-looks-for-cybersecurity-to-take-off</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/logo-security-system-news-2.png</image:loc><image:caption>logosecuritysystemnews2</image:caption><image:title>logosecuritysystemnews2</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/7/15/play-ball-inside-the-numbers</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-73.jpg</image:loc><image:caption>BlogHeader73</image:caption><image:title>BlogHeader73</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/10/19/dont-let-this-one-slip-through-the-kracks</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-67.jpg</image:loc><image:caption>BlogHeader67</image:caption><image:title>BlogHeader67</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/10/11/cybersecurity-means-job-security</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-21.jpg</image:loc><image:caption>BlogHeader21</image:caption><image:title>BlogHeader21</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/3/12/isc-west</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/2/defendify-speaks-at-maine-insurance-agents-association-annual-convention</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/2/14/stay-in-touch-with-your-vulnerabilities</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-2.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl2</image:caption><image:title>DefendifythePointblogheaderv1rl2</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/5/25/how-do-you-know-youre-protected</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-9.jpg</image:loc><image:caption>BlogHeader9</image:caption><image:title>BlogHeader9</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/6/3/your-biggest-threat-might-be-sitting-right-next-to-you</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-2.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl2</image:caption><image:title>Defendifyspring20192500x1600v1rl2</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/cybersecurity-startup-defendify-pre-seed-funding</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/11/13/defendify-at-the-crossroads-of-cyber-security-and-small-business-at-largest-annual-northeast-us-security-convention</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/12/10/dont-toy-around-safety-first-means-security-first</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/12/13/holiday-deals-steals</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-65.jpg</image:loc><image:caption>BlogHeader65</image:caption><image:title>BlogHeader65</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/7/championing-women-in-cybersecurity-this-international-womens-day</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/9/13/the-kids-are-learning-and-so-is-your-computer</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-40.jpg</image:loc><image:caption>BlogHeader40</image:caption><image:title>BlogHeader40</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/2/1/women-of-defendify-join-day-of-shecurity-conference-to-advocate-inclusion-of-women-diversification-of-cybersecurity</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/7/28/how-bout-them-apples</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-71.jpg</image:loc><image:caption>BlogHeader71</image:caption><image:title>BlogHeader71</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/4/28/bootstrap-cybersecurity-start-up-and-stay-up</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-33.jpg</image:loc><image:caption>BlogHeader33</image:caption><image:title>BlogHeader33</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/9/7/human-error-its-not-an-it-thing</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-69.jpg</image:loc><image:caption>BlogHeader69</image:caption><image:title>BlogHeader69</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/6/9/gallbladders-and-usb-thumb-drives-things-you-can-live-without</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-12.jpg</image:loc><image:caption>BlogHeader12</image:caption><image:title>BlogHeader12</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/4/22/defendify-takes-hartford-at-data-connectors</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/8/22/to-linkedin-or-not-to-linkedin-that-is-the-question</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/launch-security-blog-jimmy-bay-207388-2.jpg</image:loc><image:caption>launchsecurityblogjimmybay2073882</image:caption><image:title>launchsecurityblogjimmybay2073882</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/launch-security-blog-ben-white-138762-2.jpg</image:loc><image:caption>launchsecurityblogbenwhite1387622</image:caption><image:title>launchsecurityblogbenwhite1387622</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-61.jpg</image:loc><image:caption>BlogHeader61</image:caption><image:title>BlogHeader61</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/6/defendify-co-founder-plenary-speaker-at-the-maine-state-bar-association-real-estate-institute</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/1/13/what-will-cybersecurity-bring-in-2018</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-60.jpg</image:loc><image:caption>BlogHeader60</image:caption><image:title>BlogHeader60</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/12/17/businesscom-feature-holiday-phishing-attacks</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/29/err-on-the-side-of-human-resources</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-8.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl8</image:caption><image:title>Defendifyspring20192500x1600v1rl8</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/02/28/looking-for-love</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-64.jpg</image:loc><image:caption>BlogHeader64</image:caption><image:title>BlogHeader64</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/2/21/put-the-phish-on-ice</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-3.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl3</image:caption><image:title>DefendifythePointblogheaderv1rl3</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/2/7/one-compromise-not-to-make</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-4.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl4</image:caption><image:title>DefendifythePointblogheaderv1rl4</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/14/businesscom-feature-how-do-you-kick-off-your-cybersecurity-program</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-5.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl5</image:caption><image:title>DefendifythePointblogheaderv1rl5</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/13/recognizing-and-defending-small-business</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-3.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl3</image:caption><image:title>Defendifyspring20192500x1600v1rl3</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/6/27/to-usb-or-not-to-usb</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_summer2019_hubspot_hero-2.png</image:loc><image:caption>Defendifysummer2019hubspothero2</image:caption><image:title>Defendifysummer2019hubspothero2</image:title></image:image><lastmod>2019-07-12</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/defendify-co-founder-featured-as-keynote-speaker-at-techsec-solutions</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/4/25/going-beyond-the-firewall</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/4/22/spear-phishing-a-new-take-on-an-old-classic</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-76.jpg</image:loc><image:caption>BlogHeader76</image:caption><image:title>BlogHeader76</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/5/2/factor-in-more-than-just-the-keys-to-the-castle</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-5.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl5</image:caption><image:title>Defendifyspring20192500x1600v1rl5</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/7/12/it-superheroes-part-firefighter-part-freedom-fighter-all-human</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-35.jpg</image:loc><image:caption>BlogHeader35</image:caption><image:title>BlogHeader35</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/6/28/cyber-declaration-of-independence</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-34.jpg</image:loc><image:caption>BlogHeader34</image:caption><image:title>BlogHeader34</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/9/17/schools-back-but-phishing-seasons-still-open</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-68.jpg</image:loc><image:caption>BlogHeader68</image:caption><image:title>BlogHeader68</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/11/17/think-inside-the-box</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-62.jpg</image:loc><image:caption>BlogHeader62</image:caption><image:title>BlogHeader62</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_summer2019_hubspot_hero-1.png</image:loc><image:caption>Defendifysummer2019hubspothero1</image:caption><image:title>Defendifysummer2019hubspothero1</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/12/21/making-your-cybersecurity-list-checking-it-twice</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-10.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl10</image:caption><image:title>DefendifythePointblogheaderv1rl10</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/3/26/defendify-joins-cs4me-initiative-to-promote-technology-and-cybersecurity-education</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/24/theres-a-lot-more-in-the-clouds-than-snow</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-1.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl1</image:caption><image:title>DefendifythePointblogheaderv1rl1</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/9/7/dont-let-that-internship-sink-the-ship</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-42.jpg</image:loc><image:caption>BlogHeader42</image:caption><image:title>BlogHeader42</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/12/3/its-nothing-personal-takeaways-from-cyber-monday</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/8/30/attackers-are-having-a-whale-of-a-time</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-39.jpg</image:loc><image:caption>BlogHeader39</image:caption><image:title>BlogHeader39</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/7/sips-and-tips-about-that-coffee-shop-wifi</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/launch-security-blog-patrick-tomasso-42345-2.jpg</image:loc><image:caption>launchsecurityblogpatricktomasso423452</image:caption><image:title>launchsecurityblogpatricktomasso423452</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-16.jpg</image:loc><image:caption>BlogHeader16</image:caption><image:title>BlogHeader16</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/the-right-and-privilege-to-remain-private</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-2.jpg</image:loc><image:caption>BlogHeader2</image:caption><image:title>BlogHeader2</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/4/12/whats-your-testing-frequency</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-7.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl7</image:caption><image:title>Defendifyspring20192500x1600v1rl7</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/8/24/defendify-shares-ins-and-outs-and-ups-and-downs-of-fast-growth-startup-life-at-trepcamp-boston</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/10/1/stay-cyberaware-this-national-cybersecurity-awareness-month</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/password-hacks-strength-in-numbers-and-letters-and-symbols</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-1.jpg</image:loc><image:caption>BlogHeader1</image:caption><image:title>BlogHeader1</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/defendify-launches-first-of-its-kind-cybersecurity-platform</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/17/business-com-feature-where-does-it-fit-in-the-cybersecurity-puzzle</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl</image:caption><image:title>DefendifythePointblogheaderv1rl</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/6/1/your-phone-is-risky-business</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-10.jpg</image:loc><image:caption>BlogHeader10</image:caption><image:title>BlogHeader10</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/10/18/its-everyones-job-to-ensure-online-safety-at-work</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-22.jpg</image:loc><image:caption>BlogHeader22</image:caption><image:title>BlogHeader22</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/8/23/sun-sand-and-cybersecurity</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-38.jpg</image:loc><image:caption>BlogHeader38</image:caption><image:title>BlogHeader38</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/6/30/3-things-to-remember-this-4th-of-july-stop-think-connect</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-74.jpg</image:loc><image:caption>BlogHeader74</image:caption><image:title>BlogHeader74</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/STC_color-2.png</image:loc><image:caption>STCcolor2</image:caption><image:title>STCcolor2</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/8/10/good-people-who-do-bad-people-things</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-70.jpg</image:loc><image:caption>BlogHeader70</image:caption><image:title>BlogHeader70</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/3/28/tax-season-means-hacker-hunting-season</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-63.jpg</image:loc><image:caption>BlogHeader63</image:caption><image:title>BlogHeader63</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/11/19/be-thankful-you-created-an-incident-response-plan</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-25.jpg</image:loc><image:caption>BlogHeader25</image:caption><image:title>BlogHeader25</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/4/5/guest-chef-defendify-cooks-up-a-storm-at-the-ronald-mcdonald-house</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/launch-security-is-now-defendify</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/defendify-layers-001-2.png</image:loc><image:caption>defendifylayers0012</image:caption><image:title>defendifylayers0012</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/4/17/a-krack-in-the-wireless-armor</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-32.jpg</image:loc><image:caption>BlogHeader32</image:caption><image:title>BlogHeader32</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/12/4/volunteering-with-the-preble-street-resource-center</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/3/23/secureworld-boston</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2018/7/16/startup-maine-conference</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2017/6/12/ransomware-the-risk-is-real-cover-story</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Imported_Blog_Media/img-2.png</image:loc><image:caption>img2</image:caption><image:title>img2</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Blog%20Header-75.jpg</image:loc><image:caption>BlogHeader75</image:caption><image:title>BlogHeader75</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/4/19/businesscom-feature-cybersecurity-means-competitive-advantage</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_spring2019_2500x1600_v1rl-11.jpg</image:loc><image:caption>Defendifyspring20192500x1600v1rl11</image:caption><image:title>Defendifyspring20192500x1600v1rl11</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/31/the-best-defense-is-a-good-offense</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-6.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl6</image:caption><image:title>DefendifythePointblogheaderv1rl6</image:title></image:image><lastmod>2019-07-05</lastmod></url><url><loc>https://5282572.hs-sites.com/cybersecurity-blog/2019/1/3/making-and-keeping-your-cybersecurity-resolution</loc><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_May2019_Theme/Images/PinExt.png</image:loc><image:caption>PinExt</image:caption><image:title>PinExt</image:title></image:image><image:image><image:loc>https://5282572.fs1.hubspotusercontent-na1.net/hubfs/5282572/Defendify_thePoint_blog_header_v1rl-11.jpg</image:loc><image:caption>DefendifythePointblogheaderv1rl11</image:caption><image:title>DefendifythePointblogheaderv1rl11</image:title></image:image><lastmod>2019-07-05</lastmod></url></urlset>