<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.cy5.io/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.cy5.io/blog/cert-in-directive-70b-compliance/</loc>
		<lastmod>2024-11-20T12:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/06/cert-in-70b-regulation-v2-379x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-reinvent2022-security-services/</loc>
		<lastmod>2024-11-20T12:13:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/12/aws_security_at_reinvent_2022-379x303-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-logging-best-practices/</loc>
		<lastmod>2024-11-20T12:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/05/aws-logging-best-practices-3-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-s3-security-best-practices/</loc>
		<lastmod>2024-11-20T12:17:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/04/aws-s3-security-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-networking-101/</loc>
		<lastmod>2024-11-20T12:26:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/01/networking-375x303-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2021/12/Xnip2021-12-07_11-29-05-1024x523.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/why-you-cant-miss-aiss-2024/</loc>
		<lastmod>2024-11-28T07:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/11/WhatsApp-Image-2024-11-27-at-1.23.45-PM.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/11/WhatsApp-Image-2024-11-27-at-1.24.44-PM.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/sebis-blueprint-for-cloud-services/</loc>
		<lastmod>2024-12-23T02:44:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/07/WhatsApp-Image-2024-07-09-at-10.44.56-PM-768x461-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/07/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/07/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/anatomy-of-an-identity-cloud-attack-surface-cy5/</loc>
		<lastmod>2025-05-28T10:42:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Identity-Attack-Cy5-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Evolving-Cloud-Adoption-Needs-Cy5s-CSPM.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/glowing-blue-office-desk-with-modern-technology-generated-by-ai-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/misconfigurations-in-public-cloud-led-to-data-breach-exposing-16-billion-records/</loc>
		<lastmod>2025-06-20T10:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/16-Billion-Records-Exposed-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/06/CNB-Atttack-Chain.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/Dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/21-cloud-security-tools-for-2023/</loc>
		<lastmod>2025-07-02T05:28:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2023/02/cloud-security-tools-379x303-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/17-open-source-cloud-security-tools/</loc>
		<lastmod>2025-07-10T07:07:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/03/open-source-tools-374x303-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/03/Security-Monkey.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/03/Cloudmapper-Visualization.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/vulnerability-management-in-the-age-of-ai/</loc>
		<lastmod>2025-09-11T10:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/09/Vulnerability_Management_Header_Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/09/Market-Size-Chart.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/09/Reactive-Cost-to-Proactive-Enabler.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-posture-management-cspm-explained/</loc>
		<lastmod>2025-10-02T22:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/Blog-Image-CSPM-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/CSPM-DP.jpg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/security-7070879_1280.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/CSPM-Cloud-compliant-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/hacker-8018474_1280.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/Cloud-Compliance-Standards-and-Security-Frameworks-Source-RH-ISAC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-iam-best-practices/</loc>
		<lastmod>2025-10-06T02:18:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/08/IAM-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-threats-2025-2026/</loc>
		<lastmod>2025-10-06T02:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/06/WhatsApp-Image-2024-06-11-at-3.16.50-PM-768x461-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-networking-services-you-should-know/</loc>
		<lastmod>2025-10-06T09:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/03/cloud_networking-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/designing-a-secure-cloud-architecture-key-principles-and-best-practices/</loc>
		<lastmod>2025-10-06T11:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/02/1107897_1080p_4k_1920x1080-ezgif.com-optimize.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/02/Secure-Cloud-Architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/ueba-for-cloud-aws-azure-gcp/</loc>
		<lastmod>2025-10-07T11:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/20251007_1707_Insider-Threat-Detection_simple_compose_01k6z79n7ae6xb6001vwr9yy9q.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/announce-cloud-native-threat-detection/</loc>
		<lastmod>2025-10-09T10:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2021/11/fire-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/security-data-lake-vs-siem/</loc>
		<lastmod>2025-10-09T10:33:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/developer-identifying-server-issues.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/proactive-vs-reactive-the-critical-shift-towards-continuous-compliance/</loc>
		<lastmod>2025-10-09T10:34:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/06/WhatsApp-Image-2024-06-28-at-11.54.52-AM-768x461-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/context-based-prioritization-for-cspm/</loc>
		<lastmod>2025-10-09T10:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Context-Based-Prioritization-in-Cy5-CSPM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/astra-alerts/</loc>
		<lastmod>2025-10-09T11:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/11/astra-alerts-3-379x303-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-security-group-best-practices/</loc>
		<lastmod>2025-10-09T11:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/08/aws-security-group-379x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-security-services-part-1/</loc>
		<lastmod>2025-10-09T11:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2021/04/aws_security_tools-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/denonia-lambda-malware/</loc>
		<lastmod>2025-10-09T11:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2022/04/denonia_monero_mining-374x303-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/the-sebi-cyber-shield/</loc>
		<lastmod>2025-10-09T11:22:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/09/sebi-blog-cover-915x549-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/dpdp-draft-rules-2025-explained/</loc>
		<lastmod>2025-10-09T11:24:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/01/Blog-Creatives-1120-%C3%97-640px-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/data-security-cloud-computing/</loc>
		<lastmod>2025-10-13T07:53:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/digital-world-banner-background-remixed-from-public-domain-by-nasa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/defending-cloud-platforms/</loc>
		<lastmod>2025-10-13T11:37:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Defend-the-Cloud.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/09/Zero-Trust-by-Global-Adoption.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/07/The-Human-Firewall.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/07/Top-5-Indicators-of-Cloud-Misconfiguration-Risk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/vulnerability-management-cloud-security-guide/</loc>
		<lastmod>2025-10-13T11:51:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/07/Vulnerability-Management-Header-Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/07/Risk-Reduction-Workflow.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/07/VM-1-Dashboard-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/decoding-the-tj-actions-changed-files-supply-chain-attack/</loc>
		<lastmod>2025-10-13T13:25:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Part-1-tj-actions-changed-files-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/best-practices-and-techniques-to-secure-github/</loc>
		<lastmod>2025-10-13T13:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Part-2-tj-actions-changed-files-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/future-of-open-source-security-lessons-from-tj-actions-incident/</loc>
		<lastmod>2025-10-13T13:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Part-3-tj-actions-changed-files-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/identity-attack-surface-in-cloud-environments/</loc>
		<lastmod>2025-10-13T13:40:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/04/Identity-Attack-Cy5-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Source-Okta-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Source-Grip-Security-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/05/1732135661300.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/identity-attack-surface-management-cloud-security/</loc>
		<lastmod>2025-10-13T13:47:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Identity-Attack-Cy5-3-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/IASM.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/IASM-with-ion-Cloud-Security-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Components-of-Identity-Access-Management.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Detailed-Exploration-with-ion-Cloud-Security-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/IAM-Architecture-Source-Anilkumar-C.-Sumathy-S.-2018.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-security-group/</loc>
		<lastmod>2025-10-15T10:19:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/AWS-Security-Group.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/aws-s3-bucket-security-audit/</loc>
		<lastmod>2025-10-15T10:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Blog_Image_find_and_fix_aws_public_s3_bucket_by_Cy5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/AWS-S3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/what-is-cloud-detection-and-response/</loc>
		<lastmod>2025-10-15T20:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Untitled-design-7.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Common-identity-to-data-paths-CDR-must-detect-and-contain.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Pipeline-diagram-for-cloud-detection-and-response-highlighting-noise-reduction-stages-to-reach-actionable-signal.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Governed-Automation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Data-Egress.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/www.cy5_.io-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/wert.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/why-sbom-critical-cloud-vulnerability-management/</loc>
		<lastmod>2025-10-16T09:55:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Blog-Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Vex-first-Prioritization.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/MTTR-Reduction-from-SBOM-Vex.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/automating-sbom-generation-in-cloud-pipelines.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Component-Risk-Density-by-Stack-Layer.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Geo-Aware-bom-distribution.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cspm-tools-built-in-vs-third-party-vs-open-source/</loc>
		<lastmod>2025-10-16T16:23:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Cy5-CSPM-Tool-Blog-Image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/from-alerts-to-action-cspm-automated-remediation/</loc>
		<lastmod>2025-10-16T22:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/CSPm-in-CI-CD-Blog-Image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/ai-for-cspm-7-use-cases/</loc>
		<lastmod>2025-10-17T06:39:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/AI-for-CSPM-Blog-Image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/from-policy-to-proof-automated-compliance-cloud/</loc>
		<lastmod>2025-10-17T07:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Policy-to-Proof-AICSPM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cspm-metrics-azure-security-score-kpis/</loc>
		<lastmod>2025-10-17T08:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/CSPM-Metrics-Turn-Azure-Secure-Score.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/entity-driven-analytics-for-threat-detection-cy5-siem/</loc>
		<lastmod>2025-10-17T08:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/criminal-hacking-system-unsuccessfully-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/06/SSH-dictionary-bruteforce-attack-with-Hydra-Comparing-start-and-end-time-Hydra.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/Basic-Components-of-SIEM-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/SIEM-Architecture.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/06/Graph-based-Threat-Visualization-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/public-cloud-vs-private-cloud/</loc>
		<lastmod>2025-10-29T07:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Private-cloud-vs-public-cloud.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/new-cert-in-comprehensive-cyber-security-audit-policy-guidelines/</loc>
		<lastmod>2025-11-12T06:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Header_Image_CERT-In_Guideline.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/CLOUD-COMPLIANCE-ROADMAP-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-architecture/</loc>
		<lastmod>2025-11-12T06:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Cloud-Security-Architecture.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Cloudsec-Architecture-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Mapping-threats_enhanced-e1741587238758.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Component-of-Security-Architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cnapp-ultimate-guide-2025/</loc>
		<lastmod>2025-11-17T04:31:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/08/Cloud-Native-Application-Protection-Platforms-CNAPP-The-Ultimate-Guide-for-2025.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/08/Why-Traditional-Security-Models-Fail-in-Cloud-Native-Environments-Outdated-security-assumptions-that-no-longer-work-in-the-cloud-native-worid.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/08/The-Cloud-Native-Security-Problems-Nobody-Talks-About-Everything-looks-fine.-until-production-catches-fire.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cdr-vs-xdr/</loc>
		<lastmod>2025-11-20T08:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/CDR-vs-XDR-Blog-Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/20251120_1351_CDR-vs-XDR-Matrix_simple_compose_01kag5k7h4e0atb7wjad0aa4zv.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/20251120_1358_Cloud-Security-Workflow-Diagram_simple_compose_01kag602xxeyarchbtrvgrkxk1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/sha1-hulud-2-0-npm-supply-chain-attack/</loc>
		<lastmod>2025-12-10T12:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/Sha1%E2%80%91Hulud-2.0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/man-in-the-middle-attack-explained/</loc>
		<lastmod>2025-12-15T12:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/12/Man-in-the-Middle-Attack-Cy5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-detection-and-response-your-essential-armor-in-the-cyber-battleground/</loc>
		<lastmod>2025-12-18T04:45:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2024/07/WhatsApp-Image-2024-07-20-at-7.32.15-PM-768x461-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/indicators-of-compromise-iocs/</loc>
		<lastmod>2025-12-18T07:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/12/Indicators-of-Compromise-Blog-Image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-best-practices-for-2026/</loc>
		<lastmod>2026-01-14T07:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Cloud-Security-Best-Practices-Cy5-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Source-Tech2geek.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Cloud-Practices-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Best-Practices-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/03/Blog-Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/03/33044837358.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/top-5-strategies-to-minimize-cloud-attack-surface-in-2026/</loc>
		<lastmod>2026-01-14T08:32:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/04/Identity-Attack-Cy5-2-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/05/1-s2.0-S2542660520300056-gr1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://cy5.io/wp-content/uploads/2025/05/Changing-Attack-Surface.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/05/Source-Engineering-Science-and-Technology-an-International-Journal.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-for-banking-industry/</loc>
		<lastmod>2026-01-14T09:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/01/Cloud-Security-for-Banking-Industry.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/risk-based-alert-prioritization-for-siem-from-volume-to-mttr/</loc>
		<lastmod>2026-01-14T10:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/20251007_1642_High-Risk-Cyber-Alert_simple_compose_01k6z5vpt7fsv9xv0ze9gyjqj2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/graph-driven-visualization-for-threat-hunting-cy5-cspm-tool/</loc>
		<lastmod>2026-01-14T10:31:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Blog-Image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Ion-Cloud-Platform.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Kubernetes-%E2%86%92-Cloud-Attack-Path-Cy5-lon-Cloud-Platform.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/Trust-Tightening.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/08/www.cy5_.io-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/how-to-implement-secure-design-principles-in-cloud-computing/</loc>
		<lastmod>2026-01-14T10:32:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/Secure-Design-Architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/securing-cloud-native-serverless/</loc>
		<lastmod>2026-01-14T10:32:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/team-technicians-server-hub-alerted-by-hacker-passing-firewall.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cy5s-platforms-cloud-native-monitoring/</loc>
		<lastmod>2026-01-14T10:33:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/Cloud-Native-Monitoring.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/dpdp-act-2025-effective-date-phased-rollout/</loc>
		<lastmod>2026-01-14T10:33:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/10/DPDP-Act-2025.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/dpdp-rules-2025-complete-compliance-guide-cloud-security/</loc>
		<lastmod>2026-01-21T08:39:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2025/11/DPDP-Rules-Are-Here-Indias-1218-Month-Rollout-the-72-Hour-Breach-Clock-and-a-Cloud-First-Plan-Your-Board-Will-Actually-Use.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-for-banks-frequently-asked-questions/</loc>
		<lastmod>2026-01-23T09:21:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/01/Cloud-Security-in-Banking-Industry.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-misconfiguration-detection-aws-azure-gcp/</loc>
		<lastmod>2026-01-28T12:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/01/Cloud-misconfiguration.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-banking-financial-services-guide/</loc>
		<lastmod>2026-01-28T14:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/01/Cloud-Security-for-Banking-and-Financial-Services.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/how-attackers-exploit-cloud-storage-misconfigurations-real-breaches-attack-techniques-prevention-strategies/</loc>
		<lastmod>2026-02-05T06:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cloud-Security-in-Banking-Industry.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/entity-driven-cloud-security-architecture/</loc>
		<lastmod>2026-02-11T06:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Entity-Driven-Cloud-Security-Architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/ransomware-attacks-on-public-cloud-infrastructure/</loc>
		<lastmod>2026-02-11T07:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Ransomware-attack-on-public-cloud.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-monitoring-blueprint-indian-bfsi/</loc>
		<lastmod>2026-02-11T08:06:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cloud-threat-detection-in-banks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/misconfigured-aws-s3-buckets/</loc>
		<lastmod>2026-02-12T11:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Misconfigured-AWS-S3-Bucket.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/risk-based-cspm-the-complete-guide-to-contextual-cloud-risk-management/</loc>
		<lastmod>2026-02-12T20:43:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cloud-Security-in-Banking-Industry-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/implementing-cspm-multi-cloud-hybrid-environments/</loc>
		<lastmod>2026-02-14T10:30:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/CSPM-Implementation-Guide.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/implementing-cloud-security-posture-management-cspm-cy5-ion-platform/</loc>
		<lastmod>2026-02-14T11:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Implementing-ion-CSPM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/event-driven-cloud-security-architecture/</loc>
		<lastmod>2026-02-14T16:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Event-driven-cloud-security-architecture-implementation-guide.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/real-time-cloud-threat-detection-strategy/</loc>
		<lastmod>2026-02-15T16:52:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Event-driven-cloud-security-architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-visualization-attack-path-analysis/</loc>
		<lastmod>2026-02-16T18:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cloud-Security-in-Banking-Industry-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/multi-cloud-security-management-india-cspm-cwpp-siem/</loc>
		<lastmod>2026-02-18T16:07:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/How-Indian-Enterprises-Are-Finally-Solving-the-Multi-Cloud-Security-Complexity-Gap.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/hybrid-cloud-risk-management-unified-iam-india/</loc>
		<lastmod>2026-02-18T17:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/The-Identity-Crisis-at-the-Heart-of-Indian-Hybrid-Cloud-Security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-control-system-security-india-industrial-iot/</loc>
		<lastmod>2026-02-22T06:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cloud-Control-System.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/distributed-soc-planning-multi-cloud-india/</loc>
		<lastmod>2026-02-22T07:33:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Distributed-SOC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-storage-bucket-policies/</loc>
		<lastmod>2026-02-22T15:02:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/01/Cloud-Storage-Bucket-Policies.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cy5-cloud-security-framework.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-attack-path-analysis-graph-risk-modeling/</loc>
		<lastmod>2026-02-23T18:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Graph-based-Risk-Modelling.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Shantanu_Photo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/how-cnapp-works-in-multi-cloud/</loc>
		<lastmod>2026-02-23T21:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/How-CNAPP-Works-in-Multi-Cloud-Environment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Cy5-ion-Unified-Multi-Cloud-CNAPP-Architecture.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Shantanu_Photo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cnapp-correlation-engine/</loc>
		<lastmod>2026-02-26T05:20:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/CNAPP-Correlation-Engine.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Attack-Path-Intelligence-Model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Shantanu_Photo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-platform-thinking-indian-enterprises/</loc>
		<lastmod>2026-02-26T12:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/Why-Indian-Enterprises-Are-Abandoning-the-Security-Tool-Collection-Model.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/why-alert-volume-isnt-security-hidden-cost-traditional-cspm/</loc>
		<lastmod>2026-03-02T03:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/03/Why-Alert-volume-isnt-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/trivy-supply-chain-attack-github-actions-security/</loc>
		<lastmod>2026-03-28T00:51:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/03/Truvy-compromise-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-architecture-financial-services/</loc>
		<lastmod>2026-03-31T23:29:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/03/Secure-Cloud-Architecture-for-Financial-Services.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/cloud-security-human-factors-alert-fatigue-mindfulness/</loc>
		<lastmod>2026-04-07T13:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Blog_IMage.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Suffolk-County-Breach.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/what-is-cnapp/</loc>
		<lastmod>2026-04-18T21:59:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/What-is-CNAPP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/02/The-5-Layer-Cnapp-Architecture-Model.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.cy5.io/blog/contextual-entity-centric-threat-detection-cy5-ion-cloud-security/</loc>
		<lastmod>2026-04-26T20:35:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Contextual-and-entity-Detection.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.cy5.io/wp-content/uploads/2026/04/Cy5-logo-compact.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->