<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/phishing-simulation</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/security-awareness-training</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/linkedin-api/analytics-privacy-policy</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/qbo/finance-analytics-privacy-policy</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/qbo/finance-analytics-eula</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/qbo/reconnect</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/qbo/disconnect</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/qbo/finance</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/security-awareness-training-v2</loc>
    <lastmod>2026-05-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/threat-wire</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/shadow-it</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/ai-governance</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/email-security</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/protecting-older-adults</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/phish-triage</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/dealregistration</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resources/product-updates</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resources/videos</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resources</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resources/events</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/sms-phishing-simulations</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/careers</loc>
    <lastmod>2026-05-08</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/protecting-students</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/risk</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/legal</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/executive-dossier</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/br/phishing-simulations</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/br/security-awareness-training</loc>
    <lastmod>2026-05-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/lp/nb/guided-tour</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/demo/cyber-security-awareness-training</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/2025-cybersecurity-awareness-month-thank-you</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/2025-cybersecurity-awareness-month</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/control-center</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/reporting</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/integrations</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compliance</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resources/guides</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/press</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/pricing</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/demo/phishing-simulations</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/partners</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/demo/security-awareness-training</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/support</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/msa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/contact</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/about</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/security-awareness-training</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/phishing-simulations</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/why-adaptive</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-effectiveness</loc>
    <lastmod>2026-05-08</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-platform-challenges</loc>
    <lastmod>2026-05-08</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/role-based-security-awareness-training-program</loc>
    <lastmod>2026-05-08</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-platform-vs-lms</loc>
    <lastmod>2026-05-07</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/benefits-of-cybersecurity-awareness-training</loc>
    <lastmod>2026-05-07</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-program-maturity-model</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-for-executives</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-ROI-2026</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/whaling-phishing-detection-prevention-response</loc>
    <lastmod>2026-05-06</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-best-practices-2026</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-attack-through-amazon-and-microsoft</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-autoplay-training-content</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-udemy-data-breach-what-your-security-team-must-do</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-email-guide</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-branded-training</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-enterprise-guide-to-phishing-attacks-20-types-risk-indicators-and-defense-frameworks</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/a-hacker-hired-ai-as-a-full-time-employee-900-companies-found-out-the-hard-way</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/when-it-calls-through-teams-how-attackers-are-weaponizing-microsoft-s-own-platform</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-adaptive-ai-governance-beta</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-adaptive-email-security-beta</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/medusa-ransomware-groups-and-actors</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-ultimate-guide-to-ai-voice-cloning-scams-how-to-detect-prevent-and-protect-against-them</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ransomware-the-ultimate-2026-guide-for-cybersecurity-teams</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-deepfake-in-2026-a-detection-and-protection-guide-for-security-teams</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/what-is-a-phishing-test</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/what-is-a-security-awareness-training-program</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/what-is-security-awareness-training</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-awareness-training-strategies-for-real-world-defense-against-phishing-attacks</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/spear-phishing-in-2026-the-complete-guide-to-detection-training-and-prevention</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/free-phishing-simulation-tools-the-2026-handbook-for-email-sms-voice-ransomware-simulations</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-what-security-teams-need-to-know</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-awareness-training-for-employees-everything-your-organization-needs-to-know</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-executive-report-boards</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/claude-mythos-preview-what-the-most-capable-ai-model-anthropic-has-ever-built-means-for-security-teams</loc>
    <lastmod>2026-05-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/eu-ai-act-compliant</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-ai-content-studio</loc>
    <lastmod>2026-03-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-save-and-customize-report-views</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-updated-phish-remediation-training</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-protection</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-engineering-training-dddd9</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/insider-threat-awareness</loc>
    <lastmod>2026-02-20</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-to-prevent-privilege-escalation</loc>
    <lastmod>2026-02-19</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-to-build-an-insider-threat-program-that-actually-reduces-risk</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-real-goal-of-an-insider-threat-program-and-why-it-matters</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/6-real-world-social-engineering-attacks-and-how-they-work</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-platform-buyer-s-guide-5-leading-tools-compared</loc>
    <lastmod>2026-02-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/spear-phishing-explained-how-targeted-attacks-bypass-defenses</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cybersecurity-solutions-a-risk-based-selection-guide</loc>
    <lastmod>2026-02-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/why-most-phishing-campaigns-fail-and-how-to-fix-them</loc>
    <lastmod>2026-02-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-feature-preview</loc>
    <lastmod>2026-02-02</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-employment-identity-theft-puts-hr-security-teams-at-risk</loc>
    <lastmod>2026-01-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/synthetic-identity-fraud-how-fake-employees-bypass-onboarding</loc>
    <lastmod>2026-01-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-executive-risk-vectors</loc>
    <lastmod>2026-01-25</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/hoxhunt-vs-knowbe4-which-is-best-for-2026</loc>
    <lastmod>2026-02-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/end-user-security-awareness-practical-strategies-for-2026</loc>
    <lastmod>2026-01-21</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-powered-social-engineering-rising-threats-defenses</loc>
    <lastmod>2026-01-21</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/healthcare-security-awareness-training-a-practical-guide-for-modern-threats</loc>
    <lastmod>2026-01-19</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-complete-guide-to-cyber-security-simulation-training</loc>
    <lastmod>2026-01-19</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/the-rising-corporate-threat-of-deepfakes-what-your-team-must-know</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-ai-powered-attack-simulations-strengthen-human-cyber-defense</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/building-security-awareness-programs-that-actually-reduce-risk</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/quishing-explained-how-cybercriminals-exploit-qr-codes-and-human-behavior</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/breach-and-attack-simulation-full-spectrum-threat-testing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/knowbe4-vs-proofpoint-a-2025-comparison-of-security-awareness-platforms</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/top-8-proofpoint-alternatives-for-2025-smarter-security-training</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-policy-template-2025-guide</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/a-smarter-way-to-deliver-security-awareness-training-for-employees</loc>
    <lastmod>2026-01-15</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/building-a-lasting-security-awareness-culture-that-reduces-human-risk</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/top-bas-platforms-to-strengthen-security-in-2025</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-phish-triage-2-0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/adaptive-raises-series-b</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-custom-ai-deepfake-personas</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-customized-phish-fail-page</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-attachment-simulations</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-global-phishing-scenarios</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/vishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cyber-hygiene</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cyber-resilience</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/barrel-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-scams</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/announcing-leaderboards</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/clone-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-to-run-phishing-simulations</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/spam-vs-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/spear-phishing-vs-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-kit</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/human-risk-management</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-programmatic-access-to-training-phishing-data</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/advanced-group-builder-a-new-way-to-segment-and-train-employees</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-topics</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfakes</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ransomware-training-for-employees</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/impersonation-attacks</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-engineering-training</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-awareness-training-platforms</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/invoice-fraud</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-media-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/credential-phishing</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/report-drilldowns</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-simulation-tools</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/huntress-alternatives</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/human-centric-security</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/trap-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/fresh-content-updates</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-simulation</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/how-to-spot-a-phishing-email</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/openai-increases-investment</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ceo-fraud</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-feature-editing-training-notifications</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-release-content-library-refreshed</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-safety-tools</loc>
    <lastmod>2026-01-20</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-skill-gap-training-blueprint</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-phishing</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/new-reports-tab</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/role-based-ai-threat-training</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-executive-impersonation-attacks</loc>
    <lastmod>2026-01-20</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/introducing-rbac</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-video-call-security-guide</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-training-reduce-breach-risk</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-risk-assessment-framework</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-security-training-platform-buying-guide</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/voice-clone-scam-defense</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-engineering-risk-playbook</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-engineering-defense-enterprise-tools</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/spear-phishing-osint-detection</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-training-program-roi</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/mcdonalds-password-data-breach</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-protection-risk-management-guide</loc>
    <lastmod>2026-01-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/measure-phishing-simulation-program</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-phishing-simulations-security-awareness-training</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/proofpoint-alternatives-competitors</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/knowbe4-alternatives-competitors</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/hoxhunt-alternatives-competitors</loc>
    <lastmod>2026-02-11</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-security-awareness-training</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-platforms</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfake-examples-ai-videos-images</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/adaptive-security</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/firewall-cybersecurity-defense</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/types-phishing-attacks</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-vishing-voice-spoofing-dangerous-threat</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/tips-to-enhance-security-posture</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-content-creation-guide</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/warren-buffett-ai-scamming-growth-industry</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/lastpass-ai-voice-phishing-attack-karim-toubba</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/road-toll-scam</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/arup-deepfake-scam-attack</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/north-korean-hackers-defence</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/social-security-numbers-data-breach</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/american-express-gbt-deepfake-attack-explained</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/security-awareness-training-tips</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/smishing-sms-phishing-cybersecurity</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/43-million-funding-announcement</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/phishing-training-employees</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/red-teaming-ai-security</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/qr-code-phishing-prevention-tips</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/medusa-ransomware-fbi-warning</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/gmail-phishing-google-sites-scam</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/cyber-security-human-error-trends</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/gdpr-data-privacy-security-awareness-training</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/deepfakes-security-awareness-training-tips</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/announcing</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-phishing-detection</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/blog/ai-copilot-phishing-risks-explained</loc>
    <lastmod>2025-11-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/guides/phishing-training-10-practical-tips-to-counter-ai-driven-phishing-risk</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/guides/the-rise-of-sms-and-voice-phishing</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/guides/deepfake-protecting-your-workforce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/dental-depot</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/tinuiti</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/attentive</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/shasta-community-health-center</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/nerdwallet</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/plaid</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/lennar</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/ramp</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/mt-san-rafael-hospital</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/integrated-power-company</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/whittemore-dowen-ricciardelli</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/first-round</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/core-health-fitness</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/xenon-health</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/podium</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/mohonk-mountain-house</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/nectar</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/first-state-bank</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/lucchese</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/case-studies/dallas-mavericks</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-orchestration-automation-response</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/tactics-techniques-procedures</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/threat-intelligence-platform</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/extended-detection-response</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/user-entity-behavior-analytics</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/adaptive-security</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/watering-hole-attack</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/evil-twin-attack</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/pharming</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/search-engine-phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/angler-phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/clone-phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/email-phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/deepfake</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/zero-trust-architecture</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/zero-day-vulnerability</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/worm</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/whaling</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/vulnerability-assessment</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/vulnerability</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/vishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/virtual-private-network</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/urgency-tactics</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/url-obfuscation</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/trojan-horse</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/training-modules</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/threat-landscape</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/threat-vector</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/threat-intelligence</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/threat-actor</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/teachable-moment</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/tailgating</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/spyware</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/spear-phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/social-engineering</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/smishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/single-sign-on</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/sentiment-analysis</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-posture</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-information-event-management</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-culture</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-champion</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/security-awareness-training</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/role-based-training</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/risk-scoring</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/risk-management</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/risk-assessment</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/report-rate</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/remediation</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/ransomware</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/quishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/privacy</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/pretexting</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/predictive-analysis</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/policy-awareness</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/phishing-simulation</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/phishing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/personalized-learning-path</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/penetration-testing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/patch-management</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/open-source-intelligence</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/network-security</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/multi-factor-authentication</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/microlearning</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/man-in-the-middle-attack</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/malware</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/malicious-payload</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/machine-learning</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/learning-management-system</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/least-privilege</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/large-language-model</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/knowledge-assessment</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/just-in-time-training</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/intrusion-detection-system</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/incident-response-plan</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/incident-response</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/impersonation</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/human-firewall</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/homograph-attack</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/generative-ai</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/generative-adversarial-network</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/firewall</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/exploit</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/endpoint-security</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/encryption</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/domain-spoofing</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/denial-of-service-distributed-denial-of-service</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/data-loss-prevention</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/data-breach</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/cybersecurity</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/cyber-hygiene</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/cybercriminal</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/credential-harvesting</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/compliance</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/command-control-server</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/cloud-security</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/click-rate</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/business-email-compromise</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/baiting</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/authentication</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/attack-surface</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/artificial-intelligence</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/anomaly-detection</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/algorithm</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/adaptive-training</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/glossary/access-control</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-titanhq</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-mirage-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-defendify</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-infosec-institute</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-living-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-huntress</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-guardey</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-terranova-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-sans</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-traliant</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-jericho-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-riot-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-ironscales</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-dune-security</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-phished</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-cofense</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-mimecast</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-ninjio</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-hoxhunt</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-proofpoint</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/compare/adaptive-vs-knowbe4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/education</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/hospitality</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/services</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/healthcare</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/government</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/sports</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/technology</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-industry/finance</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-size/enterprise</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-size/mid-market</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/solution-by-size/small-business</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/ai-content-studio</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/phish-triage</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/reporting</loc>
    <lastmod>2025-11-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/osint-spearphishing</loc>
    <lastmod>2025-11-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/compliance</loc>
    <lastmod>2025-11-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/phishing-simulations</loc>
    <lastmod>2025-11-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/tours/security-awareness-training</loc>
    <lastmod>2025-11-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/marshall-bennett</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/elena-boal</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/james-almeida</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/eitan-fischer</loc>
    <lastmod>2026-03-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/adaptive-security-team</loc>
    <lastmod>2025-10-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/brian-long</loc>
    <lastmod>2025-12-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/author/justin-herrick</loc>
    <lastmod>2025-08-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/triage</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/product-updates</loc>
    <lastmod>2026-01-14</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/adaptive-updates</loc>
    <lastmod>2025-08-13</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/ai</loc>
    <lastmod>2026-01-16</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/phishing</loc>
    <lastmod>2025-06-25</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/resource-categories/security-awareness</loc>
    <lastmod>2025-06-25</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.adaptivesecurity.com/webinars/adaptive-what-s-new-what-s-next</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
</urlset>