<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.datacomm.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.datacomm.com/update-fatigue-how-the-relentless-pace-of-software-updates-is-breaking-user-trust-and-what-organizations-can-do-about-it/</loc>
		<lastmod>2026-04-28T18:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/kofis-korner-april-2026/</loc>
		<lastmod>2026-04-14T21:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/why-dedicated-ids-ips-still-matters-in-a-firewall-first-world/</loc>
		<lastmod>2026-04-14T13:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/project-glasswing-what-it-means-for-critical-infrastructure-ai-risk-and-cyber-defense/</loc>
		<lastmod>2026-04-10T16:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/increasing-technology-costs-what-you-need-to-know/</loc>
		<lastmod>2026-04-10T16:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-cve-2026-5281-zero-day/</loc>
		<lastmod>2026-04-08T16:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-google-chrome-cve-2026-2441-zero-day/</loc>
		<lastmod>2026-04-08T16:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-cve-2026-3910-active-exploitation/</loc>
		<lastmod>2026-03-31T16:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-windows-activex-cve-2008-0015-known-exploited-vulnerability/</loc>
		<lastmod>2026-02-23T15:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-microsoft-releases-6-actively-exploited-vulnerabilities/</loc>
		<lastmod>2026-02-17T21:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-fortinet-cve-2026-24858-active-exploitation-2/</loc>
		<lastmod>2026-02-17T21:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-microsoft-cve-2024-43468-actively-exploited/</loc>
		<lastmod>2026-02-17T21:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-notepad-cve-2025-15556-actively-exploited/</loc>
		<lastmod>2026-02-17T21:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/security-advisory-apple-cve-2026-20700-active-exploitation/</loc>
		<lastmod>2026-02-17T21:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/supply-chain-risk-management-scrm/</loc>
		<lastmod>2026-02-17T15:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/mitigating-the-ai-security-threat-a-practical-standards-aligned-playbook/</loc>
		<lastmod>2026-02-05T22:10:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/strengthening-the-human-element-the-most-underestimated-cyber-defense/</loc>
		<lastmod>2026-02-03T15:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/zero-trust-network-access-ztna-why-modern-organizations-need-a-new-approach-to-application-security/</loc>
		<lastmod>2026-02-03T15:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/preparing-for-the-post-quantum-era/</loc>
		<lastmod>2026-02-03T15:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/the-human-element-in-information-security/</loc>
		<lastmod>2026-02-02T22:47:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/siem-xdr-and-threat-intelligence-a-critical-layer-of-security-for-financial-institutions/</loc>
		<lastmod>2026-02-02T22:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/kofis-korner-january-2026/</loc>
		<lastmod>2026-01-20T16:15:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/datacomm-partners-with-ringcentral/</loc>
		<lastmod>2026-01-08T15:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/datacomm-partners-with-cyberfox-to-strengthen-privileged-access-security-for-financial-institutions/</loc>
		<lastmod>2026-01-08T15:54:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/datacomm-fortinet/</loc>
		<lastmod>2026-01-08T15:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/kofis-korner-september-2025/</loc>
		<lastmod>2025-12-24T15:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/why-choosing-a-soc-2-type-2-certified-network-security-partner-matters/</loc>
		<lastmod>2025-10-09T19:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/kofis-korner-march-2025-edition/</loc>
		<lastmod>2025-07-29T14:36:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.datacomm.com/kofis-korner-july-2025-edition/</loc>
		<lastmod>2025-07-29T14:35:49+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->