<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.tuskira.ai</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/request-a-demo</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/about-us</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/platform</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/for-engineers</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/case-studies</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/in-the-news</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/data-sheets</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/event/black-hat</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/ai-security-council</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/data-processing-addendum</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/subprocessors</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/legal</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/integrations</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/terms-of-service/v1-1</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/terms-of-service/v1-0</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/event/rsac</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/demo-videos</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/event/gartner</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/2025-cybersecurity-executive-order</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/accountability-for-autonomous-ai-actions</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/agentic-ai-doesnt-need-perfect-data</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/agentic-orchestration-is-the-answer</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ai-agents-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ai-driven-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ai-just-learned-to-hack-and-defenders-should-be-excited</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/apache-tomcat-rce-vulnerability-cve-2025-24813-exploited-within-24-hours</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/are-your-cybersecurity-tools-secure</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/are-your-security-tools-pulling-their-weight</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/attackers-using-ai-against-your-soc</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/battling-cyberattacks-in-2025</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/beyond-patching-to-defense-validation</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ciso-hired-ai-into-his-team</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ciso-soc-analyst-app-owner-risk</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/crawl-walk-run-the-only-safe-path-to-autonomous-ai</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/crisis-in-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ctem-isnt-vm-moneyballing-breach-prevention</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/ctem-wont-save-security-stack</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/cutting-through-vulnerabilities-with-5-policy-changes</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/detecting-and-responding-to-mongobleed-cve-2025-14847</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/does-the-reported-iran-linked-stryker-attack</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/does-your-vuln-score-tell-you-where-attacks-will-hit</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/fix-the-vulnerability-or-protect-against-the-exploit</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/from-playbooks-to-intelligence-in-your-soc</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/from-risk-mitigation-to-cyber-resiliency</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/gartner-cites-tuskira-data-in-new-report-on-reasoning-driven-security</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/gartners-report-intelligent-simulation-for-threat-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/genghis-khan-and-modern-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/if-the-attack-path-still-exists-you-havent-solved-the-incident</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/is-aspm-dead</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/jpmorgan-just-made-the-case-for-a-new-security-operating-model</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/lessons-from-the-2026-ctem-study</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/managing-threat-exposures-ai-defenses</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/march-madness-static-defenses-lose</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/power-of-a-security-mesh</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/preempting-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/preemptive-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/sec-cyber-accountability</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/security-data-meshes-and-threat-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/story-about-ai-security</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-amnesia-problem-in-ai-socs-what-learning-actually-means</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-debate-between-platform-bloat-and-tool-sprawl</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-future-soc-understands-behavior</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-growing-challenge-of-security-tool-sprawl-how-to-consolidate-and-optimize-your-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-immune-system-was-the-first-soc</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-moment-ai-walked-into-the-soc</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-patching-problem-in-cybersecurity-why-preemptive-defense-must-be-the-new-standard</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-real-ai-guardrail-is-reversibility</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/the-real-test-for-ai-in-security-operations</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/think-about-security-roi</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/turning-security-data-into-a-smarter-diet-for-ai</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-and-accorian-partnership</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-in-gartners-preemptive-exposure-management-report</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-in-the-cybersecurity-mesh-architecture-3-0-gartner-report</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-launch-press-release</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-launches-ai-security-council-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-launches-virtual-ai-analysts-workforce</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-partners-with-servicenow</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/tuskira-recognized-in-lastest-gartner-report-on-preemptive-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/understanding-the-exploitation-window-how-ai-can-narrow-the-gap-between-detection-and-remediation</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/vulnerability-prioritization-in-2025</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/what-is-a-digital-twin-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/where-gigaom-says-soc-is-going</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/why-ctem-needs-a-mindset-shift</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/why-orchestration-beats-more-tools</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/why-traditional-vulnerability-management-is-failing-the-need-for-continuous-behavior-based-analysis</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/why-we-launched-federated-detection-at-rsa-2026</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/your-siem-is-costing-you-the-fight</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/blog/zero-day-netflix</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/aspm-application-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/autonomous-response</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/caasm-cyber-asset-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/ctem-continuous-threat-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/improving-security-controls</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/minimizing-attackable-surface</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/preemptive-risk-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/reducing-defense-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/use-case/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/a-new-way-to-thinking-about-security-roi</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/ai-and-the-future-of-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/guardrails-for-autonomous-ai-in-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/inside-the-rebuild-of-security-programs-for-an-ai-first-world</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/the-evolution-of-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/the-siem-tax</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/unifying-defenses</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/why-you-cant-outpatch-attackers</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/white-papers/your-next-security-hire-should-be-ai</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/new-use-cases/agentic-threat-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/new-use-cases/autonomous-alert-triage-soc-noise-reduction</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/new-use-cases/breach-path-detection-disruption</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/new-use-cases/security-context-consolidation-investigation</loc>
    </url>
    <url>
        <loc>https://www.tuskira.ai/new-use-cases/zero-day-emerging-threat-response</loc>
    </url>
</urlset>