<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.digitalhands.com/minimize-your-cyber-risk-exposure</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/CCES%20(1).png</image:loc><image:caption>CCES1</image:caption><image:title>CCES1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/simplify-cybersecurity-digital-hands.png</image:loc><image:caption>simplifycybersecuritydigitalhands</image:caption><image:title>simplifycybersecuritydigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/college-student-technology.jpeg</image:loc><image:caption>collegestudenttechnology</image:caption><image:title>collegestudenttechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Compliance.jpeg</image:loc><image:caption>Compliance</image:caption><image:title>Compliance</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cyber-tech-lines.png</image:loc><image:caption>cybertechlines</image:caption><image:title>cybertechlines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20(4).png</image:loc><image:caption>EDR4</image:caption><image:title>EDR4</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/how-can-soar-give-your-soc-wings</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/soc-image.jpeg</image:loc><image:caption>socimage</image:caption><image:title>socimage</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/ransomware-in-the-healthcare-industry</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Healthcare%20Page%20Banner.jpeg</image:loc><image:caption>HealthcarePageBanner</image:caption><image:title>HealthcarePageBanner</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://blog.digitalhands.com/the-rise-of-ransomware</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/rise-of-ransomware.jpeg</image:loc><image:caption>riseofransomware</image:caption><image:title>riseofransomware</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/custom-data-ingestion</loc><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_default-configurations-1.mp4/medium.jpg</video:thumbnail_loc><video:title>SIEM Effectiveness | Default Configuration</video:title><video:description>Jonathan Ferrigno, our Director of Cyber Response, explains what happens when you rely on default SIEM configurations.</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_default-configurations-1.mp4</video:content_loc><video:duration>37</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_garbage-in-garbage-out-1.mp4/medium.jpg</video:thumbnail_loc><video:title>SIEM Effectiveness | Garbage In, Garbage Out</video:title><video:description>Jonathan Ferrigno, our Director of Cyber Response explains why ingesting too much of the wrong data creates a dangerous cascade of security failures.</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_garbage-in-garbage-out-1.mp4</video:content_loc><video:duration>24</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness-out-of-box-detections.png</image:loc><image:caption>siemeffectivenessoutofboxdetections</image:caption><image:title>siemeffectivenessoutofboxdetections</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/next-gen-siem-digital-hands.jpeg</image:loc><image:caption>nextgensiemdigitalhands</image:caption><image:title>nextgensiemdigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/soc-image.jpeg</image:loc><image:caption>socimage</image:caption><image:title>socimage</image:title></image:image><lastmod>2025-04-09</lastmod></url><url><loc>https://blog.digitalhands.com/how-to-navigate-the-virtual-ciso-vciso-market-strategically</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Blog-1250x830.png</image:loc><image:caption>Blog1250x830</image:caption><image:title>Blog1250x830</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_234092554.jpeg</image:loc><image:caption>AdobeStock234092554</image:caption><image:title>AdobeStock234092554</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CSA%20Security%20Bulletin-1.png</image:loc><image:caption>CSASecurityBulletin1</image:caption><image:title>CSASecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Hero%20Graphics/navigating-vciso-market-strategically_blog-featured-image_1200x628px.webp</image:loc><image:caption>navigatingthevirtualcisovcisomarketstrategically</image:caption><image:title>navigatingvcisomarketstrategicallyblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/6-ways-to-modernize-your-endpoint-detection</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/medical-tablet.jpeg</image:loc><image:caption>medicaltablet</image:caption><image:title>medicaltablet</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_322783454.jpeg</image:loc><image:caption>AdobeStock322783454</image:caption><image:title>AdobeStock322783454</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Healthcare%20Page%20Banner.jpeg</image:loc><image:caption>HealthcarePageBanner</image:caption><image:title>HealthcarePageBanner</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20(4).png</image:loc><image:caption>EDR4</image:caption><image:title>EDR4</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><lastmod>2026-01-13</lastmod></url><url><loc>https://blog.digitalhands.com/so-many-web-based-applications-so-little-security</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/hacker.jpeg</image:loc><image:caption>hacker</image:caption><image:title>hacker</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/cyber-risks-in-the-manufacturing-industry</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/manufacturing-worker-using-technology.jpeg</image:loc><image:caption>manufacturingworkerusingtechnology</image:caption><image:title>manufacturingworkerusingtechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/simplifying-cybersecurity-strategies-for-effective-security-programs</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cloud-application-shielding.jpeg</image:loc><image:caption>cloudapplicationshielding</image:caption><image:title>cloudapplicationshielding</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/hacker.jpeg</image:loc><image:caption>hacker</image:caption><image:title>hacker</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cybersecurity-in-retail.jpeg</image:loc><image:caption>cybersecurityinretail</image:caption><image:title>cybersecurityinretail</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/simplify-cybersecurity-digital-hands.png</image:loc><image:caption>simplifycybersecuritydigitalhands</image:caption><image:title>simplifycybersecuritydigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/MDR_SocialPost.jpg</image:loc><image:caption>MDRSocialPost</image:caption><image:title>MDRSocialPost</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/white-house-warns-russia-preparing-cyberattacks</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CCES%20(1).png</image:loc><image:caption>CCES1</image:caption><image:title>CCES1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC-as-a-Service%20(1).png</image:loc><image:caption>SOCasaService1</image:caption><image:title>SOCasaService1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cybercrime%20magazine-1.jpg</image:loc><image:caption>cybercrimemagazine1</image:caption><image:title>cybercrimemagazine1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_322783454.jpeg</image:loc><image:caption>AdobeStock322783454</image:caption><image:title>AdobeStock322783454</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/maestro-the-powerhouse-behind-digital-hands-soc</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/automotive-technology.jpeg</image:loc><image:caption>automotivetechnology</image:caption><image:title>automotivetechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CyGuard%20Maestro%E2%84%A2%20Integrations%20Page-1.png</image:loc><image:caption>CyGuardMaestroIntegrationsPage1</image:caption><image:title>CyGuardMaestroIntegrationsPage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_369489653.jpeg</image:loc><image:caption>AdobeStock369489653</image:caption><image:title>AdobeStock369489653</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_164586542.jpeg</image:loc><image:caption>AdobeStock164586542</image:caption><image:title>AdobeStock164586542</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Confluence%20Attack.png</image:loc><image:caption>ConfluenceAttack</image:caption><image:title>ConfluenceAttack</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/cloud-application-shielding-and-intelligent-threat-assessment</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cloud-application-shielding.jpeg</image:loc><image:caption>cloudapplicationshielding</image:caption><image:title>cloudapplicationshielding</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/mdr-mssp-or-something-else-how-to-choose-the-right-solution-for-your-security-operations</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/woman-working-on-laptop-at-desk.jpeg</image:loc><image:caption>womanworkingonlaptopatdesk</image:caption><image:title>womanworkingonlaptopatdesk</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/medical-tablet.jpeg</image:loc><image:caption>medicaltablet</image:caption><image:title>medicaltablet</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/checklist-your-first-90-days-as-a-ciso</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/waves-of-data.jpeg</image:loc><image:caption>wavesofdata</image:caption><image:title>wavesofdata</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Rocket.jpeg</image:loc><image:caption>Rocket</image:caption><image:title>Rocket</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cybercrime%20magazine-1.jpg</image:loc><image:caption>cybercrimemagazine1</image:caption><image:title>cybercrimemagazine1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/automotive-technology.jpeg</image:loc><image:caption>automotivetechnology</image:caption><image:title>automotivetechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cyber-tech-lines.png</image:loc><image:caption>cybertechlines</image:caption><image:title>cybertechlines</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/siem-out-of-the-box-detections</loc><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_default-configurations-1.mp4/medium.jpg</video:thumbnail_loc><video:title>SIEM Effectiveness | Default Configuration</video:title><video:description>Jonathan Ferrigno, our Director of Cyber Response, explains what happens when you rely on default SIEM configurations.</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_default-configurations-1.mp4</video:content_loc><video:duration>37</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/woman-working-on-laptop-at-desk.jpeg</image:loc><image:caption>womanworkingonlaptopatdesk</image:caption><image:title>womanworkingonlaptopatdesk</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness-out-of-box-detections.png</image:loc><image:caption>siemeffectivenessoutofboxdetections</image:caption><image:title>siemeffectivenessoutofboxdetections</image:title></image:image><lastmod>2025-04-15</lastmod></url><url><loc>https://blog.digitalhands.com/the-human-element-in-mdr-why-you-will-always-need-human-expertise-for-advanced-threat-detection-and-response</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_234092554.jpeg</image:loc><image:caption>AdobeStock234092554</image:caption><image:title>AdobeStock234092554</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cybercrime%20magazine-1.jpg</image:loc><image:caption>cybercrimemagazine1</image:caption><image:title>cybercrimemagazine1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Confluence%20Attack.png</image:loc><image:caption>ConfluenceAttack</image:caption><image:title>ConfluenceAttack</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/optimizing-security-investments-vs-looking-for-silver-bullet</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-working-across-silos.jpeg</image:loc><image:caption>digitalhandsworkingacrosssilos</image:caption><image:title>digitalhandsworkingacrosssilos</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/simplify-cybersecurity-digital-hands.png</image:loc><image:caption>simplifycybersecuritydigitalhands</image:caption><image:title>simplifycybersecuritydigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2024-digital-hands_optimizing-security-investments_blog-featured-image_1200x628px.webp</image:loc><image:caption>optimizingsecurityinvestmentswithsecurityoperations</image:caption><image:title>2024digitalhandsoptimizingsecurityinvestmentsblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/the-advanced-persistent-threat-apt</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/data-lines.jpeg</image:loc><image:caption>datalines</image:caption><image:title>datalines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/keeping-your-medical-practice-safe-from-cyber-attacks</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/medical-tablet.jpeg</image:loc><image:caption>medicaltablet</image:caption><image:title>medicaltablet</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/prevent-phishing</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_358339014.jpeg</image:loc><image:caption>AdobeStock358339014</image:caption><image:title>AdobeStock358339014</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2022-02-16</lastmod></url><url><loc>https://blog.digitalhands.com/evolving-cybersecurity-landscape-brings-shift-to-protection-strategies</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/hunt-team-set-up-buy-in.jpeg</image:loc><image:caption>huntteamsetupbuyin</image:caption><image:title>huntteamsetupbuyin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/manufacturing-worker-using-technology.jpeg</image:loc><image:caption>manufacturingworkerusingtechnology</image:caption><image:title>manufacturingworkerusingtechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/mdr-services</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/next-gen-siem-digital-hands.jpeg</image:loc><image:caption>nextgensiemdigitalhands</image:caption><image:title>nextgensiemdigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/MDR_SocialPost.jpg</image:loc><image:caption>MDRSocialPost</image:caption><image:title>MDRSocialPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/risk-profiles-siem.jpeg</image:loc><image:caption>riskprofilessiem</image:caption><image:title>riskprofilessiem</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-in-the-retail-sector</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cybersecurity-in-retail.jpeg</image:loc><image:caption>cybersecurityinretail</image:caption><image:title>cybersecurityinretail</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-and-the-automotive-industry</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/automotive-technology.jpeg</image:loc><image:caption>automotivetechnology</image:caption><image:title>automotivetechnology</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/2020-verizon-dbir-brings-a-nice-surprise</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/Fig_45.png</image:loc><image:caption>Fig45</image:caption><image:title>Fig45</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/Fig_44.png</image:loc><image:caption>Fig44</image:caption><image:title>Fig44</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/2020-verizon-DBIR.jpeg</image:loc><image:caption>2020verizonDBIR</image:caption><image:title>2020verizonDBIR</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/want-to-ensure-a-cyber-insurance-payout-heres-why-working-with-an-mssp-can-help</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/team-collaborating.png</image:loc><image:caption>teamcollaborating</image:caption><image:title>teamcollaborating</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://blog.digitalhands.com/security-automation-walking-the-line-between-triumph-and-turmoil</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_369489653.jpeg</image:loc><image:caption>AdobeStock369489653</image:caption><image:title>AdobeStock369489653</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/manufacturing-worker-using-technology.jpeg</image:loc><image:caption>manufacturingworkerusingtechnology</image:caption><image:title>manufacturingworkerusingtechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Automation%20Evolution%20Graphic.png</image:loc><image:caption>AutomationEvolutionGraphic</image:caption><image:title>AutomationEvolutionGraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/securing-the-supply-chain</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/waves-of-data.jpeg</image:loc><image:caption>wavesofdata</image:caption><image:title>wavesofdata</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/how-to-strategically-leverage-an-mssp</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/How%20to%20Strategically%20Leverage%20an%20MSSP.png</image:loc><image:caption>HowtoStrategicallyLeverageanMSSP</image:caption><image:title>HowtoStrategicallyLeverageanMSSP</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2022-04-25</lastmod></url><url><loc>https://blog.digitalhands.com/shadow-it-in-the-cloud-mitigating-the-risks</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/person-working-on-computer.jpeg</image:loc><image:caption>personworkingoncomputer</image:caption><image:title>personworkingoncomputer</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/cisco-adaptive-security-appliance-and-firepower-threat-defense-vulnerabilities</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cybersecurity-in-retail.jpeg</image:loc><image:caption>cybersecurityinretail</image:caption><image:title>cybersecurityinretail</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CSA%20Security%20Bulletin-1.png</image:loc><image:caption>CSASecurityBulletin1</image:caption><image:title>CSASecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/medical-tablet.jpeg</image:loc><image:caption>medicaltablet</image:caption><image:title>medicaltablet</image:title></image:image><lastmod>2024-09-30</lastmod></url><url><loc>https://blog.digitalhands.com/tackle-security-gaps-cybersecurity-risk-management</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/manufacturing-worker-using-technology.jpeg</image:loc><image:caption>manufacturingworkerusingtechnology</image:caption><image:title>manufacturingworkerusingtechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/waves-of-data.jpeg</image:loc><image:caption>wavesofdata</image:caption><image:title>wavesofdata</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Confluence%20Attack.png</image:loc><image:caption>ConfluenceAttack</image:caption><image:title>ConfluenceAttack</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technology-in-hospitality-setting.jpeg</image:loc><image:caption>technologyinhospitalitysetting</image:caption><image:title>technologyinhospitalitysetting</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CCES%20(1).png</image:loc><image:caption>CCES1</image:caption><image:title>CCES1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20(4).png</image:loc><image:caption>EDR4</image:caption><image:title>EDR4</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/automotive-technology.jpeg</image:loc><image:caption>automotivetechnology</image:caption><image:title>automotivetechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/so-you-want-to-build-a-hunt-team-part-2</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Hunt_Team2.jpeg</image:loc><image:caption>HuntTeam2</image:caption><image:title>HuntTeam2</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2021-08-24</lastmod></url><url><loc>https://blog.digitalhands.com/6-things-to-look-for-in-a-managed-detection-response-provider</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/risk-profiles-siem.jpeg</image:loc><image:caption>riskprofilessiem</image:caption><image:title>riskprofilessiem</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/soc-of-the-future</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/cuguard-maestro-with-dots-logo.png</image:loc><image:caption>cuguardmaestrowithdotslogo</image:caption><image:title>cuguardmaestrowithdotslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Compliance.jpeg</image:loc><image:caption>Compliance</image:caption><image:title>Compliance</image:title></image:image><lastmod>2023-06-06</lastmod></url><url><loc>https://blog.digitalhands.com/what-is-a-cybersecurity-compliance-program</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Compliance.jpeg</image:loc><image:caption>Compliance</image:caption><image:title>Compliance</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CyGuard%C2%AE%20Cloud%20SIEM%20Blog%20Post.png</image:loc><image:caption>CyGuardCloudSIEMBlogPost</image:caption><image:title>CyGuardCloudSIEMBlogPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20(4).png</image:loc><image:caption>EDR4</image:caption><image:title>EDR4</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2022-09-13</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-threats-to-insurance-companies</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/insurance-worker-on-computer.jpeg</image:loc><image:caption>insuranceworkeroncomputer</image:caption><image:title>insuranceworkeroncomputer</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/what-makes-a-next-gen-siem-effective</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/next-gen-siem-digital-hands.jpeg</image:loc><image:caption>nextgensiemdigitalhands</image:caption><image:title>nextgensiemdigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-in-higher-education</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/college-student-technology.jpeg</image:loc><image:caption>collegestudenttechnology</image:caption><image:title>collegestudenttechnology</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/operationalized-threat-intelligence</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness-out-of-box-detections.png</image:loc><image:caption>siemeffectivenessoutofboxdetections</image:caption><image:title>siemeffectivenessoutofboxdetections</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CSA%20Security%20Bulletin-1.png</image:loc><image:caption>CSASecurityBulletin1</image:caption><image:title>CSASecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/AI-Generated%20Media/Images/operationalized%20threat%20intelligence%20cyber%20with%20blue%20and%20mint%20green%20colors-1.jpeg</image:loc><image:caption>operationalizedthreatintelligencecyberwithblueandmintgreencolors1</image:caption><image:title>operationalizedthreatintelligencecyberwithblueandmintgreencolors1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><lastmod>2024-11-08</lastmod></url><url><loc>https://blog.digitalhands.com/why-your-organization-needs-dark-web-monitoring</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Digital%20Risk%20Dark%20Web%20Blog%20Post.png</image:loc><image:caption>DigitalRiskDarkWebBlogPost</image:caption><image:title>DigitalRiskDarkWebBlogPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_164586542.jpeg</image:loc><image:caption>AdobeStock164586542</image:caption><image:title>AdobeStock164586542</image:title></image:image><lastmod>2022-06-07</lastmod></url><url><loc>https://blog.digitalhands.com/5-characteristics-to-look-for-in-a-good-endpoint-security-system</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20menu%20button-1%20(1).png</image:loc><image:caption>EDRmenubutton11</image:caption><image:title>EDRmenubutton11</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_500592051.jpeg</image:loc><image:caption>AdobeStock500592051</image:caption><image:title>AdobeStock500592051</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://blog.digitalhands.com/the-new-standard-of-security-monitoring</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/CyGuard%C2%AE%20Cloud%20SIEM%20Blog%20Post.png</image:loc><image:caption>CyGuardCloudSIEMBlogPost</image:caption><image:title>CyGuardCloudSIEMBlogPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Google%20Cloud%20Blog%20Post%20Quote.png</image:loc><image:caption>GoogleCloudBlogPostQuote</image:caption><image:title>GoogleCloudBlogPostQuote</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CyGuard%20Cloud%20SIEM.png</image:loc><image:caption>CyGuardCloudSIEM</image:caption><image:title>CyGuardCloudSIEM</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2022-07-26</lastmod></url><url><loc>https://blog.digitalhands.com/guide-to-vpn-providers</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/vpn-guide.jpeg</image:loc><image:caption>vpnguide</image:caption><image:title>vpnguide</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/cve-2024-3400-palo-alto-networks-command-injection-vulnerability</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_322783454.jpeg</image:loc><image:caption>AdobeStock322783454</image:caption><image:title>AdobeStock322783454</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Security%20Challenges%202025.png</image:loc><image:caption>SecurityChallenges2025</image:caption><image:title>SecurityChallenges2025</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technology-in-hospitality-setting.jpeg</image:loc><image:caption>technologyinhospitalitysetting</image:caption><image:title>technologyinhospitalitysetting</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CSA%20Security%20Bulletin-1.png</image:loc><image:caption>CSASecurityBulletin1</image:caption><image:title>CSASecurityBulletin1</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/why-companies-need-endpoint-detection-and-response</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/MicrosoftTeams-image%20(38).png</image:loc><image:caption>MicrosoftTeamsimage38</image:caption><image:title>MicrosoftTeamsimage38</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/MicrosoftTeams-image%20(41).png</image:loc><image:caption>MicrosoftTeamsimage41</image:caption><image:title>MicrosoftTeamsimage41</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2022-01-11</lastmod></url><url><loc>https://blog.digitalhands.com/email-should-enable-your-productivity-not-put-it-at-risk</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cyber-tech-lines.png</image:loc><image:caption>cybertechlines</image:caption><image:title>cybertechlines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technological-connection-in-cloud-computer-blue-dot-network-abstract-picture-id698054834__1_.jpeg</image:loc><image:caption>technologicalconnectionincloudcomputerbluedotnetworkabstractpictureid6980548341</image:caption><image:title>technologicalconnectionincloudcomputerbluedotnetworkabstractpictureid6980548341</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/data-lines.jpeg</image:loc><image:caption>datalines</image:caption><image:title>datalines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/time-for-new-email-security-solution</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Hero%20Graphics/navigating-vciso-market-strategically_blog-featured-image_1200x628px.webp</image:loc><image:caption>navigatingthevirtualcisovcisomarketstrategically</image:caption><image:title>navigatingvcisomarketstrategicallyblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/risk-profiles-siem.jpeg</image:loc><image:caption>riskprofilessiem</image:caption><image:title>riskprofilessiem</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/why-do-you-need-managed-detection-response</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/woman-working-on-laptop-at-desk.jpeg</image:loc><image:caption>womanworkingonlaptopatdesk</image:caption><image:title>womanworkingonlaptopatdesk</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2024-digital-hands_optimizing-security-investments_blog-featured-image_1200x628px.webp</image:loc><image:caption>optimizingsecurityinvestmentswithsecurityoperations</image:caption><image:title>2024digitalhandsoptimizingsecurityinvestmentsblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/AI-Generated%20Media/Images/operationalized%20threat%20intelligence%20cyber%20with%20blue%20and%20mint%20green%20colors-1.jpeg</image:loc><image:caption>operationalizedthreatintelligencecyberwithblueandmintgreencolors1</image:caption><image:title>operationalizedthreatintelligencecyberwithblueandmintgreencolors1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><lastmod>2025-09-02</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-risks-for-the-hotel-industry</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technology-in-hotels.jpeg</image:loc><image:caption>technologyinhotels</image:caption><image:title>technologyinhotels</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/white-house-urges-united-states-governors-tighten-oversight-critical-infrastructure</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/EDR%20(4).png</image:loc><image:caption>EDR4</image:caption><image:title>EDR4</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_290518651.jpeg</image:loc><image:caption>AdobeStock290518651</image:caption><image:title>AdobeStock290518651</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/July%20Security%20Bulletin-1.png</image:loc><image:caption>JulySecurityBulletin1</image:caption><image:title>JulySecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/CCES%20(1).png</image:loc><image:caption>CCES1</image:caption><image:title>CCES1</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/security-challenges</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technology-in-hotels.jpeg</image:loc><image:caption>technologyinhotels</image:caption><image:title>technologyinhotels</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Security%20Challenges%202025.png</image:loc><image:caption>SecurityChallenges2025</image:caption><image:title>SecurityChallenges2025</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/insurance-worker-on-computer.jpeg</image:loc><image:caption>insuranceworkeroncomputer</image:caption><image:title>insuranceworkeroncomputer</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2024-digital-hands_optimizing-security-investments_blog-featured-image_1200x628px.webp</image:loc><image:caption>optimizingsecurityinvestmentswithsecurityoperations</image:caption><image:title>2024digitalhandsoptimizingsecurityinvestmentsblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Healthcare%20Page%20Banner.jpeg</image:loc><image:caption>HealthcarePageBanner</image:caption><image:title>HealthcarePageBanner</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/cve-2023-45590-forticlient-linux-remote-code-execution</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/hacker.jpeg</image:loc><image:caption>hacker</image:caption><image:title>hacker</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/July%20Security%20Bulletin-1.png</image:loc><image:caption>JulySecurityBulletin1</image:caption><image:title>JulySecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><lastmod>2024-09-19</lastmod></url><url><loc>https://blog.digitalhands.com/working-across-silos-key-to-success</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cyber-tech-lines.png</image:loc><image:caption>cybertechlines</image:caption><image:title>cybertechlines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cybersecurity-in-retail.jpeg</image:loc><image:caption>cybersecurityinretail</image:caption><image:title>cybersecurityinretail</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-working-across-silos.jpeg</image:loc><image:caption>digitalhandsworkingacrosssilos</image:caption><image:title>digitalhandsworkingacrosssilos</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/How%20to%20Strategically%20Leverage%20an%20MSSP.png</image:loc><image:caption>HowtoStrategicallyLeverageanMSSP</image:caption><image:title>HowtoStrategicallyLeverageanMSSP</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/ransomware-email-security</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/iStock-888100386.jpg</image:loc><image:caption>iStock888100386</image:caption><image:title>iStock888100386</image:title></image:image><lastmod>2021-09-15</lastmod></url><url><loc>https://blog.digitalhands.com/black-hat-guide-the-social-engineer</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/phishing-phone.jpeg</image:loc><image:caption>phishingphone</image:caption><image:title>phishingphone</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/ransomware-notice-from-the-treasury-department</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/federal-government-building.jpeg</image:loc><image:caption>federalgovernmentbuilding</image:caption><image:title>federalgovernmentbuilding</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-awareness-training-what-works</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/group-cybersecurity-training.jpeg</image:loc><image:caption>groupcybersecuritytraining</image:caption><image:title>groupcybersecuritytraining</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/5-signs-your-vm-solution-isnt-working</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Blog-1250x830.png</image:loc><image:caption>Blog1250x830</image:caption><image:title>Blog1250x830</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/4-reasons-your-organization-needs-managed-firewall-protection</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Managed%20Firewall%20Blog%20Post.png</image:loc><image:caption>ManagedFirewallBlogPost</image:caption><image:title>ManagedFirewallBlogPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_322783454.jpeg</image:loc><image:caption>AdobeStock322783454</image:caption><image:title>AdobeStock322783454</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/risk-profiles-siem.jpeg</image:loc><image:caption>riskprofilessiem</image:caption><image:title>riskprofilessiem</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/hidden-costs-of-poor-siem-service</loc><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/ensuring-siem-effectiveness_hidden-investigation-costs-final.mp4/medium.jpg</video:thumbnail_loc><video:title>ensuring-siem-effectiveness_hidden-investigation-costs-final</video:title><video:description>ensuring-siem-effectiveness_hidden-investigation-costs-final</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/ensuring-siem-effectiveness_hidden-investigation-costs-final.mp4</video:content_loc><video:duration>41</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/SS/ensuring-siem-effectiveness_evolving-security-changes.mp4/medium.jpg</video:thumbnail_loc><video:title>ensuring-siem-effectiveness_evolving-security-changes</video:title><video:description>ensuring-siem-effectiveness_evolving-security-changes</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/SS/ensuring-siem-effectiveness_evolving-security-changes.mp4</video:content_loc><video:duration>52</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/SS/ensuring-siem-effectiveness_failed-logins.mp4/medium.jpg</video:thumbnail_loc><video:title>Contextless Alerts that Create Noise Instead of Signal</video:title><video:description>ensuring-siem-effectiveness_failed-logins</video:description><video:content_loc>https://resources.digitalhands.com/hubfs/SME%20Blog/SS/ensuring-siem-effectiveness_failed-logins.mp4</video:content_loc><video:duration>110</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_369489653.jpeg</image:loc><image:caption>AdobeStock369489653</image:caption><image:title>AdobeStock369489653</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2024-digital-hands_optimizing-security-investments_blog-featured-image_1200x628px.webp</image:loc><image:caption>optimizingsecurityinvestmentswithsecurityoperations</image:caption><image:title>2024digitalhandsoptimizingsecurityinvestmentsblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/waves-of-data.jpeg</image:loc><image:caption>wavesofdata</image:caption><image:title>wavesofdata</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><lastmod>2025-04-03</lastmod></url><url><loc>https://blog.digitalhands.com/cybersecurity-in-the-hospitality-industry</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technology-in-hospitality-setting.jpeg</image:loc><image:caption>technologyinhospitalitysetting</image:caption><image:title>technologyinhospitalitysetting</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/5-vm-best-practices-against-ransomware</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_234092554.jpeg</image:loc><image:caption>AdobeStock234092554</image:caption><image:title>AdobeStock234092554</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/simplify-cybersecurity-digital-hands.png</image:loc><image:caption>simplifycybersecuritydigitalhands</image:caption><image:title>simplifycybersecuritydigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.digitalhands.com/a-guide-to-avoiding-phishing-attacks</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/technological-connection-in-cloud-computer-blue-dot-network-abstract-picture-id698054834__1_.jpeg</image:loc><image:caption>technologicalconnectionincloudcomputerbluedotnetworkabstractpictureid6980548341</image:caption><image:title>technologicalconnectionincloudcomputerbluedotnetworkabstractpictureid6980548341</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://blog.digitalhands.com/so-you-want-to-build-a-hunt-team-part-1-set-up-and-buy-in</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/digital-hands-logo.svg</image:loc><image:caption>digitalhandswhitehorizontallogo</image:caption><image:title>digitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/hunt-team-set-up-buy-in.jpeg</image:loc><image:caption>huntteamsetupbuyin</image:caption><image:title>huntteamsetupbuyin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Logos/z_archive%20-%20Logos/all-white-gtf-digital-hands-logo.svg</image:loc><image:caption>allwhitegtfdigitalhandslogo</image:caption><image:title>allwhitegtfdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2018_digital-hands_tsia-star-award.png</image:loc><image:caption>2018digitalhandstsiastaraward</image:caption><image:title>2018digitalhandstsiastaraward</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Icons/linkedin-icon.svg</image:loc><image:caption>linkedinicon</image:caption><image:title>linkedinicon</image:title></image:image><lastmod>2021-08-24</lastmod></url><url><loc>https://blog.digitalhands.com</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/CSA%20Security%20Bulletin-1.png</image:loc><image:caption>CSASecurityBulletin1</image:caption><image:title>CSASecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/human-element-in-mdr_blog_featured-image_1200x628px.png</image:loc><image:caption>humanelementinmdrblogfeaturedimage1200x628px</image:caption><image:title>humanelementinmdrblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-working-across-silos.jpeg</image:loc><image:caption>digitalhandsworkingacrosssilos</image:caption><image:title>digitalhandsworkingacrosssilos</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/2024-digital-hands_optimizing-security-investments_blog-featured-image_1200x628px.webp</image:loc><image:caption>optimizingsecurityinvestmentswithsecurityoperations</image:caption><image:title>2024digitalhandsoptimizingsecurityinvestmentsblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/July%20Security%20Bulletin-1.png</image:loc><image:caption>JulySecurityBulletin1</image:caption><image:title>JulySecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/simplify-cybersecurity-digital-hands.png</image:loc><image:caption>simplifycybersecuritydigitalhands</image:caption><image:title>simplifycybersecuritydigitalhands</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/June%20Security%20Bulletin.png</image:loc><image:caption>JuneSecurityBulletin</image:caption><image:title>JuneSecurityBulletin</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/digital-hands_logo_featured-image_1200x675.png</image:loc><image:caption>digitalhandsmanagedsecurityservicesproviderfeaturedimage</image:caption><image:title>digitalhandslogofeaturedimage1200x675</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Hero%20Graphics/navigating-vciso-market-strategically_blog-featured-image_1200x628px.webp</image:loc><image:caption>navigatingthevirtualcisovcisomarketstrategically</image:caption><image:title>navigatingvcisomarketstrategicallyblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/MDR_SocialPost.jpg</image:loc><image:caption>MDRSocialPost</image:caption><image:title>MDRSocialPost</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/GRC.jpg</image:loc><image:caption>GRC</image:caption><image:title>GRC</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness_data-ingestion.png</image:loc><image:caption>siemeffectivenessdataingestion</image:caption><image:title>siemeffectivenessdataingestion</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/mdr-mssp-or-something-else_blog_featured-image_1200x628px.jpg</image:loc><image:caption>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:caption><image:title>mdrmssporsomethingelseblogfeaturedimage1200x628px</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/hidden%20cost%20of%20poor%20siem%20blog%20image-1.png</image:loc><image:caption>hiddencostofpoorsiemblogimage1</image:caption><image:title>hiddencostofpoorsiemblogimage1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Security%20Challenges%202025.png</image:loc><image:caption>SecurityChallenges2025</image:caption><image:title>SecurityChallenges2025</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SME%20Blog/JF/siem-effectiveness-out-of-box-detections.png</image:loc><image:caption>siemeffectivenessoutofboxdetections</image:caption><image:title>siemeffectivenessoutofboxdetections</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><lastmod>2024-09-23</lastmod></url><url><loc>https://blog.digitalhands.com/staying-ahead-of-ip-protection-in-the-face-of-emerging-cybersecurity-threats</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/Website%20Assets/Blog%20Graphics/cybersecurity-in-retail.jpeg</image:loc><image:caption>cybersecurityinretail</image:caption><image:title>cybersecurityinretail</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/SOC%20analyst.jpeg</image:loc><image:caption>SOCanalyst</image:caption><image:title>SOCanalyst</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_458627076.jpeg</image:loc><image:caption>AdobeStock458627076</image:caption><image:title>AdobeStock458627076</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/GRC.jpg</image:loc><image:caption>GRC</image:caption><image:title>GRC</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/cyber-tech-lines.png</image:loc><image:caption>cybertechlines</image:caption><image:title>cybertechlines</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.digitalhands.com/blackhat-interview-shira-rubinoff-with-techstrong-and-charlotte-baker-ceo-at-digital-hands</loc><image:image><image:loc>https://resources.digitalhands.com/hubfs/featured-solutions-navigation-graphic.png</image:loc><image:caption>featuredsolutionsgraphicwithtechintegrations</image:caption><image:title>featuredsolutionsnavigationgraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/linkedin-logo.svg</image:loc><image:caption>linkedinlogo</image:caption><image:title>linkedinlogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/digital-hands-logo-white.svg</image:loc><image:caption>digitalhandslogowhite</image:caption><image:title>digitalhandslogowhite</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/footer-digital-hands-logo.svg</image:loc><image:caption>footerdigitalhandslogo</image:caption><image:title>footerdigitalhandslogo</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Automation%20Evolution%20Graphic.png</image:loc><image:caption>AutomationEvolutionGraphic</image:caption><image:title>AutomationEvolutionGraphic</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/Adobe%20Stock/AdobeStock_369489653.jpeg</image:loc><image:caption>AdobeStock369489653</image:caption><image:title>AdobeStock369489653</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/July%20Security%20Bulletin-1.png</image:loc><image:caption>JulySecurityBulletin1</image:caption><image:title>JulySecurityBulletin1</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/blackhat-social.jpg</image:loc><image:caption>blackhatsocial</image:caption><image:title>blackhatsocial</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/state-of-cybersecurity-report_cover.png</image:loc><image:caption>stateofcybersecurityreportcover</image:caption><image:title>stateofcybersecurityreportcover</image:title></image:image><image:image><image:loc>https://resources.digitalhands.com/hubfs/proactive-protection.jpeg</image:loc><image:caption>proactiveprotection</image:caption><image:title>proactiveprotection</image:title></image:image><lastmod>2024-09-19</lastmod></url></urlset>