<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.vikingcloud.com</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/about-us/executive-team</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/security-testing/digital-forensics-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/search</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/about-us/why-us</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/wendys-managed-security-bundles</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/managed-security-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/risk-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/data-privacy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/security-testing/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/why-asgard</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/network-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/events</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/processors-acquirers-and-isos</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/secure-payment-solution</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/web-risk-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/pci-compliance-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/media-kit</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/about-us/join-our-team</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/contact</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/mellow-mushroom-change-order-form</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/culvers-managed-security-bundle</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/papa-murphys-managed-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/vc-mellowmushroom</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/vc-papa-murphys-change-of-ownership</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/vc-wendysnetworkupgrade</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/logos</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/terms-conditions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/quick-service-restaurants</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/distributed-enterprise</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cs-msa</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/pci-tc</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/qsr-case-study-landing-page</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/breach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cookie-notice</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/internal-upsell-opportunity-form</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/landing-page-new</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/ccs-advantage</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/pci-community-meeting</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/wendys-2024-convention</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/pci-dss-assessment-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/advanced-pci-assessment-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/smalls-sliders-managed-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cms-collection-load-test</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cvep</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/opensource</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/rich-text-edits</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity/digital-certificates/faq</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/accessibility-statement/vpat</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/cyber-risk-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/securecomplybundle</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/compliance-risk/hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/david-trachtenberg</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/gabe-moynagh</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/jim-burke</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/kevin-pierce</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/lisa-grassick</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/mark-brady</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/nevan-cahill</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/paul-meyers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/team/yaacova</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/events/pci-ssc-apac-community-meeting-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/events/pci-ssc-europe-community-meeting-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/events/pci-ssc-north-america-community-meeting-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/events/smoothie-king-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/alexander-norell</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/brian-odian</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/chesley-moodley</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/chris-brown</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/colette-oconnell</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/dave-burleigh</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/david-trachtenberg</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/fayyaz-makhani</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/gabe-moynagh</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/gabriel-mcdermott</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/james-bibles</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/jim-burke</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/johan-hagdahl</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/jon-marler</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/josh-gottlieb</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/kamran-chaudhary</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/kevin-pierce</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/mark-brady</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/mark-reedy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/michael-aminzade</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/michael-webster</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/natasja-bolton</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/rick-hutchinson</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/steven-rosenthal</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/thomas-patterson</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/tyler-owen</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/authors/vikingcloud-team</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/3-basic-ways-to-avoid-pci-paralysis</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/3-common-pitfalls-to-meeting-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-best-practices-for-securing-your-small-biz</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-buts-your-qsa-doesnt-want-to-hear</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-essential-cybersecurity-features-to-improve-your-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-reasons-your-customers-may-not-trust-you-with-their-personal-and-financial-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-security-tips-for-small-it-teams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/5-steps-to-more-effective-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/68-of-cyber-teams-cant-achieve-4-day-cyber-incident-disclosures</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/7-cybersecurity-trends-that-will-define-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/a-target-in-every-room-why-cybercriminals-are-hunting-small-hospitality-businesses-and-how-to-protect-yours</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/agentic-ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/ai-enabled-mdr-what-distributed-enterprises-need-to-know-before-buying-the-hype</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/ai-variance-the-real-threat-security-teams-are-not-built-to-handle</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/aligning-risk-based-security-with-business-goals-bridging-the-gap-between-it-and-leadership</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/api-penetration-testing-an-in-depth-overview</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/are-knuckle-busters-pci-compliant</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/are-your-external-asv-scans-effective</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/avoid-audit-fatigue</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/benefits-of-managed-security-services-providers-mssps</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/best-mdr-tools</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/best-vulnerability-scanning-tools</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/beyond-fingerprints-exploring-behavioral-biometrics-for-secure-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/beyond-passwords-why-multi-factor-authentication-mfa-is-your-best-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/beyond-silos-mastering-compliance-across-pci-iso-27001-and-soc-2</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/biggest-cyber-attacks-in-history</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/black-box-penetration-testing-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/business-uninterrupted-how-the-convergence-of-cyber-and-physical-security-can-make-your-company-safer-and-stronger</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/can-we-securely-store-card-data-for-recurring-billing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cloud-security-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/compliance-team-spotlight-brian-odian</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/consulting-team-spotlight-fayyaz-makhani</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/consulting-team-spotlight-keaton-lane</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/consulting-team-spotlight-michael-aminzade</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cryptography-in-the-face-of-quantum-computing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cyber-threat-unit-francisco-pahati</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cyber-threat-unit-michael-alcantara</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cyber-threat-unit-spotlight-brady-mclaughlin</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-2025-lessons-learned-expected-trends</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-awareness-month-7-tips-to-keep-your-organization-safe-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-awareness-month-closing-the-gaps-that-put-you-at-risk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-awareness-month-see-yourself-in-cyber</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-in-the-fast-lane-key-findings-from-vikingclouds-2025-auto-service-repair-and-parts-businesses-survey</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/cybersecurity-statistics</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/dast-vs-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/deepfake-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/defense-against-the-fastest-growing-threat-in-2024-ai-deepfakes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/demystifying-pci-dss-requirements-penetration-segmentation-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/disadvantages-of-ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/distributed-denial-of-service-ddos-attack-what-can-you-do</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/does-my-backup-services-business-need-to-be-pci-compliant</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/edr-or-siem-which-should-you-choose</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/endpoint-protection-a-vital-tool-in-the-battle-against-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/ensuring-penetration-testing-leads-to-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/final-countdown-to-compliance-preparing-for-pci-dss-v4-x</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/firewall-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/five-steps-before-using-a-mobile-device-to-accept-credit-cards</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/focus-where-it-matters-the-power-of-prioritization-for-risk-based-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/from-chaos-to-clarity-taming-the-cyber-storm</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/from-oil-changes-to-outages-why-auto-service-repair-and-parts-businesses-need-cybersecurity-now</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/from-security-spend-to-risk-reduction-measuring-the-business-value-of-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/future-proof-your-cybersecurity-leverage-ai-chatbots-for-superior-security-data-handling</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/generative-ai-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/geopolitics-and-cyber-activism-the-growing-impact-of-hacktivism</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/google-search---an-unexpected-ally-in-the-fight-to-close-the-cybersecurity-talent-gap</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/guest-blog--norse-mythology-meets-cybersecurity-aligning-mythical-characters-with-enterprise-security-roles</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/guest-blog-unconventional-ai-applications-in-cybersecurity-thinking-outside-the-box</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/guide-to-gray-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/guide-to-managed-sd-wan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/hardening-against-potential-attacks-from-elevated-geopolitical-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/hotels-are-on-hackers-summer-travel-itinerary-your-hotel-could-be-the-first-stop</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-can-your-pci-compliance-efforts-ultimately-save-your-business-money</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-do-i-report-a-pci-violation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-does-taking-credit-cards-by-phone-work-with-pci</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-is-cybersecurity-ai-improving</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-mdr-solves-the-cybersecurity-staffing-crisis</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-much-does-penetration-testing-cost</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-to-secure-your-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-to-select-a-pci-compliant-service-provider-advice-for-small-business-owners</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-to-spot-and-stop-e-skimming-before-it-hijacks-your-customers--and-your-credibility</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-women-in-payments-fintech-and-cybersecurity-are-breaking-the-glass-ceiling</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/how-you-can-use-tokenization-to-reduce-pci-scope</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/hr-4988-scam-farms-act</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/identifying-critical-vulnerabilities-5-steps-to-take-when-investing-resources-in-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/important-links</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/improving-canadas-cyber-defense-protect-your-business-from-the-rising-tide-of-online-threats-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/improving-security-awareness-best-practices</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/information-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/integrating-cvss-4-0-into-vikingcloud-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/internal-vs-external-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/internal-vs-external-vulnerability-scans-why-you-need-both</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/introducing-pci-dss-4-0-acda6</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/is-pci-compliance-a-law-should-it-be</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/iso-27000-family-standards</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/iso-27002-2022</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/iso27001-vs-iso27002</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mdr-benefits</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mdr-vs-edr</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mdr-vs-mssp</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mdr-vs-xdr</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/merchant-service-provider-or-both</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/merchants-know-your-service-providers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/microsoft-ending-support-for-windows-server-2003</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mitigating-security-risks-in-large-language-models</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/mobile-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/network-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/new-backoff-point-of-sale-malware-alert</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/new-more-a-first-look-at-the-pci-dss-3-0-saqs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/nist-cybersecurity-framework-2-0-a-deep-dive-into-the-new-governance-function</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/no-windows-xp-support-no-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/october-is-cybersecurity-awareness-month-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/on-path-attack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/p2pe-dont-lose-your-investment</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pa-dss-and-pci-dss-beware-the-critical-difference</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pa-dss-transformation-to-ssf</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pan-storage-and-the-pci-dss</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/part-1-the-space-between-controls---where-ai-driven-attacks-actually-win</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/payment-card-industry-data-security-standard-pci-dss-compliance-and-cybersecurity-program-merchant-compliance-levels-definition</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/paypal-and-the-pci-dss</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-4-0-authenticated-scanning----go-live</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-and-storage-of-pan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-compliance-and-the-service-provider</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-compliance-and-your-website-a-guide</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-compliance-in-a-post-pan-world-what-enterprise-merchants-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-compliance-isnt-optional-what-your-payment-provider-wont-tell-you</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-compliance-saq-a-policy-template-and-requirements</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-implementing-and-validating-requirements</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-risk-vs-requirement</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-self-assessment-questionnaires</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-summary-of-changes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-4-0-targeted-risk-analysis</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v3-1-and-ssl-what-you-should-do-now</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-0-and-the-evolution-of-the-self-assessment-questionnaire-saq-for-e-commerce-merchants</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-0-authenticated-scans</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-0-best-practices-for-automated-log-reviews</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-0-compliance-5-key-reasons-to-define-roles-and-responsibilities</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-0-removal-of-in-place-with-remediation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-are-you-using-disk-encryption</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-dss-v4-transformation-when-using-pci-dss-v3-2-1-validated-tpsps</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-myths</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-penetration-testing-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-saq-3-1-e-commerce-options-explained</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-security-standard-council-announces-new-sla-timelines-effective-september-27-2023</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pci-v4-impact-of-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/penetration-testing-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/penetration-testing-examples</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/penetration-testing-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/penetration-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/penetration-testing-vs-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/phishing-101-everything-you-need-to-know-to-protect-your-business</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/phishing-statistics</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/physical-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-chris-brown</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-jon-marler</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-natasja-bolton</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-steven-rosenthal</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-thomas-patterson</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/product-team-spotlight-tyler-owen</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/pts-poi-v3-device-expiration-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/quantum-computing-and-the-future-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/ransomware-in-2022-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/ransomware-statistics</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/retail-cybersecurity-stats-threats-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/risk-based-vs-compliance-based-security-why-one-size-doesnt-fit-all</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/risk-directed-security-building-on-pci-compliance-for-the-next-era-of-payment-protection</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/risks-of-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/saq-a-vs-a-ep-what-e-commerce-merchants-service-providers-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/sec-adopts-new-rules-on-cybersecurity-risk-management-incident-disclosure-and-ransomware-payments-by-public-companies</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/securing-the-holidays-prepare-for-rising-cyber-threats-in-retail</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/securing-the-seas-a-q-a-with-mxp-on-its-cybersecurity-partnership-with-vikingcloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-consultant-spotlight-dax-labrador</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-consultant-spotlight-howell-king-jr</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-consultant-spotlight-jolicia-pamintuan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-consultant-spotlight-robin-divino</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-incident-preparedness-tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-logging-and-monitoring-pci-dss-requirement-10-why-all-the-fuss</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-maturity-it-is-time-for-organizations-to-come-of-age</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/security-posture</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/signs-your-multi-location-business-has-outgrown-basic-firewall-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/sim-swapping-attacks-a-growing-danger-to-your-digital-life</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/small-business-and-pci-cost-vs-benefit</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/smb-cybersecurity-survey-statistics-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/smes-under-attack-leveraging-a-mssp-for-resilience</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/soc-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/social-engineering-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/software-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/spin-the-infosec-color-wheel-you-landed-on-red</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/stay-safe-stay-secure-stay-vigilant-top-online-security-tips-for-holiday-deals-on-computer-security-day-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/technology-team-spotlight-gabriel-mcdermott</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-2019-pci-compliance-annual-plan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-collapse-of-digital-trust-why-identity-alone-cant-secure-you-anymore</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-cyber-crisis-perception-gap-4-disconnects-between-frontline-and-c-suite-cyber-leaders</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-evolution-of-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-fragmented-pci-problem-how-service-providers-are-overpaying-without-knowing-it</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-future-of-risk-based-security-automation-ai-and-the-evolving-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-hidden-threat-why-your-supply-chain-is-your-weakest-link</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-hipaa-security-rule-is-about-to-change-what-healthcare-cisos-need-to-do-before-the-final-rule-drops</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-human-element-in-risk-based-security-building-a-culture-of-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-pci-basics-quick-guide-69238</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-pci-dss-chaining-and-the-franchise-relationship</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-pci-point-to-point-encryption-p2pe-program</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-real-cost-of-data-breach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-risk-of-doing-business---how-a-single-click-can-cost-you</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/the-robots-are-coming-for-your-burgers-qsrs-running-on-iot-and-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/think-ai-can-replace-your-security-team-think-again</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/thor-ai-reducing-cyber-risk-for-at-risk-businesses</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/top-5-penetration-testing-methodologies</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/travel-hospitality-solving-the-cyber-hiring-crisis-with-tech</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/types-of-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/u-s-election-security-and-deepfake-audio-fraud-heightened-risk-for-november-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/understanding-and-meeting-pci-compliance-policy-requirements</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/vikingcloud-2026-smb-threat-landscape-report-cyber-risk-rises-and-the-human-cost-grows</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/vulnerability-assessment-cost</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/vulnerability-scanning-best-practices</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/vulnerability-scanning-types</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/web-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-does-it-mean-to-mask-pan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-in-the-world-is-a-qualified-integrator-and-reseller</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-a-pci-compliance-scan</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-a-pci-qsa</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-an-endpoint-protection-platform</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-an-external-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-an-internal-penetration-test-and-how-is-it-done</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-automated-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-ci-cd-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-continuous-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-endpoint-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-firewall-as-a-service-fwaas</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-infrastructure-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-managed-detection-and-response-mdr</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-penetration-testing-execution-standard</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-white-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-is-wireless-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/what-to-look-for-in-a-pci-forensic-investigator</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/whats-new-in-pci-dss-3-2</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/whos-responsible-navigating-pci-compliance-for-third-party-service-providers-tpsps-and-merchants</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/why-businesses-are-unprepared-for-the-next-wave-of-ai-scams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/why-cyberattacks-are-more-than-an-inconvenience-for-convenience-stores-5-cybersecurity-myths-that-could-cost-you</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/why-penetration-testing-is-important</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/will-emv-make-you-pci-compliant</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/wins-by-cybersecurity-teams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/blog/working-with-multiple-compliance-standards</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/a</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/advanced-persistent-threat-apt</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/adversarial-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/attack-surface-management-asm</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/attack-vectors</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/b</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/brute-force-attack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/c</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cloud-application-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cloud-computing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cloud-native</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cloud-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cloud-security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cross-site-scripting-xss</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cyber-hygiene</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/d</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/dark-web-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/data-breach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/data-encryption</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/data-protection-vs-data-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/deep-web-vs-dark-web</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/digital-certificates-ssl</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/distributed-denial-of-service-ddos-attacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/e</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/endpoint-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/endpoint-protection-software</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/ethical-hacker</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/exploit</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/exposure-management-vs-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/extended-detection-and-response-xdr</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/f</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/file-integrity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/firewall</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/h</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/honeypot</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/i</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/incident-response</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/insider-threat</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/internet-of-things-iot-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/m</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/malware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/malware-detection</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/managed-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/managed-security-service-providers-mssp</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/managed-security-services-mss</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/n</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/network-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/network-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/p</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/phishing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/r</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/ransomware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/s</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/security-information-and-event-management-siem</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/session-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/smishing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/spyware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/t</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/threat-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/trojan-horse</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/v</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/z</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/zero-day-exploit</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cybersecurity-terms/zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/3-generative-ai-security-risks-retailers-should-beware-of</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/40-of-cyber-teams-have-not-reported-cyber-attacks-over-fear-of-losing-jobs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/40-of-cyber-teams-have-not-reported-cyber-attacks-over-fear-of-losing-jobs-according-to-new-vikingcloud-research</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/40-of-cyber-teams-have-not-reported-cyber-attacks-over-fear-of-losing-jobs-according-to-new-vikingcloud-research-3b58e</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/82-of-north-american-hotels-were-hit-with-a-cyberattack-last-summer-according-to-new-vikingcloud-research</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/accounting-today-2024-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/accounts-recovery-some-cyberattacks-not-being-reported-because-execs-fear-getting-fired-survey</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/advanced-manufacturing-ransomware-3-0-targeting-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/asking-around-what-will-the-boardroom-be-talking-about-in-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/automation-com-cybersecurity-strategies-for-industrial-automation-systems</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/automotive-technology-beyond-compliance-building-real-cyber-resilience-in-auto-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/axios-codebook-newsletter---1-big-thing-retailers-brace-for-looming-bot-attacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/beta-news-1-in-5-smbs-could-be-put-out-of-business-by-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/box-here-how-small-businesses-can-protect-their-inventory-data-from-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/built-in-iot-security-is-a-challenge-heres-how-to-tackle-it</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/c-suite-cyber-leaders-are-1-6x-more-likely-than-frontline-managers-to-rate-their-cyber-defense-as-mature-according-to-new-vikingcloud-research</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/canadian-metalworking-the-true-cost-of-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/canadian-retnal-staying-alert-how-to-protect-your-business-from-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cfo-dive-many-material-cybersecurity-breaches-go-unreported-vikingcloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cfo-dive-nearly-one-in-five-smbs-at-risk-of-shutting-down-after-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cfo-dive-vikingcloud-2025-smb-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/chain-store-age---survey-more-than-half-of-retailers-recognize-increased-cyberattack-risk-during-holidays</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/chief-healthcare-executive-ascension-cyberattack-some-hospitals-are-still-diverting-ambulances</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/chief-healthcare-executive-healthcare-lags-other-sectors-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/chief-healthcare-executive-some-cyberattacks-arent-being-reported-because-staff-say-they-are-worried-theyll-be-fired</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cisos-and-their-companies-struggle-to-comply-with-sec-disclosure-rules</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cisos-on-alert-following-sec-charges-against-solarwinds</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cloudtweaks-enhancing-cybersecurity-in-the-cloud-strategies-solutions-for-robust-data-protection</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cnbc-do-you-need-political-risk-insurance-how-to-insure-your-business-amid-uncertainty</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cnbc-resilience-in-a-changing-world-the-three-step-game-plan-small-businesses-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/commercial-integrator-an-integrators-guide-to-cybersecurity-for-networked-av-systems</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/commercial-risk-half-of-firms-unprepared-for-supply-chain-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/commercial-risk-retailers-braced-for-spike-in-cyberattack-risk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/corporate-compliance-insights-dei-immigration-top-employer-concerns-in-trumps-second-term</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/corporate-compliance-insights-gaps-emerge-between-frontline-cybersecurity-managers-c-suite</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/corporatecompliance-insights-ai-risk-management-consumes-37-more-time-as-governance-gaps-emerge</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cyber-attackers-and-defenders-are-racing-to-up-their-ai-game</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cyber-defense-magazine-smbs-know-the-risks-so-why-are-cybercriminals-still-winning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cyber-defense-magazine-the-retail-cybersecurity-crisis-three-steps-to-fight-back-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cyber-insurance-news-cyber-risk-escalates-as-48-of-breaches-go-unreported-new-2025-report-warns</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cyberattacks-overtake-inflation-and-recession-concerns-as-the-1-threat-to-smbs-in-2026-new-vikingcloud-research-finds</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cybernews-successful-cyberattack-would-force-20-of-businesses-to-shut-down</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cybernews-wild-pack-without-a-leader-pro-iranian-hackers-already-active-in-wake-of-us-israeli-strikes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cybersecurity-insiders-sovereign-hackers-confronting-the-rising-tide-of-nation-state-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/cybersecuritys-genai-hype-cycle-and-how-to-break-out</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/dark-reading-ciso-corner-what-cyber-labor-shortage-trouble-meeting-sec-disclosure-deadlines</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/dark-reading-jingle-thief-highlights-retail-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/datacenter-predictive-analytics-in-data-center-security-strengthening-cyber-defenses</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/digital-dealer-the-rise-of-automotive-cybercrime-how-hackers-target-dealerships-and-how-to-stop-them</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/digital-transactions-fiserv-taps-vikingcloud-and-other-digital-transactions-news-briefs-from-2-25-25</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/digital-transactions-news-briefs---checkbook-adds-visa-direct-and-other-digital-transactions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/employee-benefit-news-32-of-cybersecurity-teams-cant-hire-talent-putting-companies-at-risk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/engage-for-success-how-to-strengthen-cybersecurity-through-employee-engagement</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-ai-and-insider-threats-are-fueling-a-cybersecurity-crisis-new-vikingcloud-report-warns</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-cybersecurity-overtakes-inflation-as-the-top-threat-to-small-businesses-in-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-cybersecuritys-new-split-brain-frontline-teams-sound-the-alarm-while-the-c-suite-turns-down-the-volume</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-holiday-cyberattacks-threaten-retailers-as-seasonal-sales-surge</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-lockbit-unmasked-jon-marler-of-vikingcloud-delves-into-the-infamous-ransomware-group-and-how-organizations-can-defend-themselves</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-vikingcloud-and-mastercard-join-forces-to-fortify-smb-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-vikingcloud-partners-with-fiserv-to-bolster-smb-cybersecurity-amid-rising-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/enterprise-security-tech-vikingcloud-report-reveals-underreporting-of-cyber-incidents-and-growing-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-3-steps-to-stronger-cybersecurity-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-6-steps-for-mitigating-llm-security-concerns-amid-rapid-adoption</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-cyberattacks-are-targeting-the-automotive-industry</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-five-attacks-that-shattered-the-status-quo-of-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-seasonal-security-risks-leave-retailers-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-smb-survival-requires-cybersecurity-transformation-with-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-the-confidence-crisis-in-cybersecurity-departments</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-the-dangers-of-cyber-alert-fatigue-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-think-youre-secure-prove-it-why-penetration-testing-is-your-best-defense-against-a-breach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fast-company-why-cybersecurity-shouldnt-be-a-checkbox-exercise</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fatigue-and-shortages-cyber-teams-intentionally-underreporting-breaches</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes---deepfakes-are-the-new-frontier-of-cyberattacks-5-steps-to-fight-back</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-2024-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-4-strategies-to-elevate-cybersecurity-in-travel-and-hospitality</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-cyberattacks-could-shutter-one-in-five-small-businesses-report-finds</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-generative-ai-closing-the-tech-gap-between-cyber-teams-and-criminals</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-out-of-the-pan-into-the-fire-the-risk-based-future-of-digital-transactions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-risk-directed-security-will-define-cybersecurity-resilience-in-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-safeguarding-the-future-penetration-testing-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-six-cybersecurity-predictions-shaping-executive-decision-making-in-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-tech-council-cybercriminals-are-winning-with-ai--heres-how-theyre-using-it</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-the-summer-cyber-storm-is-fading--but-the-fallout-for-hospitality-may-just-be-starting</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-why-the-secs-four-day-disclosure-rule-raises-the-bar-for-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/forbes-your-biggest-cybersecurity-risk-isnt-technology--its-people</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/fortifying-small-businesses-against-the-rising-tide-of-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/global-trade-the-impact-of-emergingtechnologies-on-global-trade-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/government-fleet-third-party-risk-in-government-fleet-operations-whos-really-behind-your-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/heal-security-nearly-one-in-five-smbs-at-risk-of-shutting-down-after-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/heal-security-some-cyberattacks-arent-being-reported-because-staff-say-they-are-worried-theyll-be-fired</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/healthcare-it-today-best-cybersecurity-practices-for-patient-data-sharing-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/help-net-security-cybersecurity-leaders-underreport-cyber-incidents-to-executives</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/helpnetsecurity-worried-about-job-security-cyber-teams-hide-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/hospitality-technology-deepfakes-at-the-front-desk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/hotel-executive-beyond-the-back-office-making-cyber-resilience-a-core-hospitality-function</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/hotel-management-next-gen-cybersecurity-protecting-hotel-guests</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/how-to-prepare-for-heightened-board-involvement-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/hrdirector-how-predictive-analytics-can-enhance-talent-management-and-employee-retention</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/hydrocarbon-processing-digital-exclusive-how-to-build-cyber-resilience-in-the-oil-and-gas-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/inc-iranian-hackers-target-u-s-businesses-after-attacks--how-to-protect-your-company</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/industry-today-building-cyber-resilience-in-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/insurance-thought-leadership-cyber-risks-threaten-insurance-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/isaca-embracing-the-future-the-quantum-computing-revolution-begins-now</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-eight-it-terms-that-pros-want-to-see-go</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-hotels-continue-to-be-target-for-threat-actors-as-summer-ramps-up</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-nearly-half-of-cyber-leaders-claim-theyve-hidden-a-material-cybersecurity-incident-from-their-board</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-splatoverflow-aims-to-ease-hardware-troubleshooting</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-weve-been-expecting-you-cyberattackers-target-travelers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brew-whats-the-wildest-help-desk-ticket-youve-ever-seen</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-brief-australia-navigating-compliance-challenges-a-strategic-approach-for-it-decision-makers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/it-security-news-worried-about-job-security-cyber-teams-hide-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/jim-burke-leads-cybersecurity-initiatives-with-the-framework-of-threes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/jim-burke-new-ceo</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/jobillico-best-cybersecurity-practices-for-remote-workers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/key-executives-the-top-25-executives-of-arizona-for-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/llrx-48-of-cybersecurity-bosses-failed-to-report-a-breach-this-year</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/lockbit-down-but-far-from-out</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/lockbit-redux-ransomware-gang-demands-80m-leaks-cdw-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/masv-cybersecurity-for-virtual-production-protecting-digital-assets-and-virtual-sets</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/medical-economics---protecting-patient-data-cybersecurity-best-practices-for-primary-care-physicians</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/medical-product-outsourcing-managing-cyber-risks-in-the-medical-device-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/meet-cybersecuritys-2025-wake-up-call-ai-insider-threats-and-a-new-era-of-risk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/modern-restaurant-management-protecting-yourpatrons-and-profits-the-importance-of-mfa-in-restaurant-operations</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/mssp-alert---mssp-market-news-firescam-malware-targets-android-devices</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/mssp-market-news-palo-alto-networks-ibm-agileblue-arkose-labs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/nearly-80-of-cybersecurity-leaders-fear-they-could-be-the-target-of-a-nation-state-cyberattack-in-the-next-12-months-according-to-vikingcloud-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/new-hope-network-cybersecurity-essentials-for-small-retailers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/nmi-how-isvs-can-boost-cybersecurity-and-meet-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/pakcaging-labeling-smart-labels-smart-risks-cybersecurity-tips-for-connected-packaging</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/payspace-magazine-mastercard-and-vikingcloud-develop-cybersecurity-solutions-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/paystrax-selects-vikingclouds-patented-web-risk-monitoring-to-mitigate-merchant-fraud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/pharmaceutical-tech-cyber-threats-in-pharmaceutical-manufacturing-how-to-secure-critical-operations</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/plant-automation-closing-the-it-ot-gap-cybersecurity-tips-for-plant-teams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/plastics-technology-how-the-plastics-industry-can-strengthen-cybersecurity-in-smart-packaging</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/politico-vikingcloud-smb-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/powr-best-practices-for-ensuring-data-integrity-in-web-forms</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/putting-ai-in-your-corner-in-the-fight-against-a-resurgent-lockbit</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/pymnts-Mastercard-Turns-Cyber-Threats-Into-Teachable-Moments</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/pymnts-mastercard-and-vikingcloud-co-develop-cybersecurity-solutions-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/pymnts-why-cfos-and-cisos-should-care-about-b2b-cyber-audits</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/qsr-web-building-secure-payment-systems-for-quick-service-restaurants</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/ransomware-actors-tighten-the-screws-with-legal-and-financial-pressures</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/restoration-remediation-protecting-customer-data-cybersecurity-tips-for-restoration-pros</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/rt-insights-how-real-time-cyber-risk-intelligence-is-transforming-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/sc-media-survey-finds-half-of-cyber-leaders-withhold-breach-reports</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/sec-disclosure-standards-navigating-compliance-and-cybersecurity-in-the-boardroom</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-info-watch-navigating-cybersecurity-regulations-a-practical-guide-for-security-integrators</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-info-watch-vikingcloud-extends-fiserv-partnership-to-defend-smbs-against-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-info-watch-vikingcloud-files-patent-for-universal-merchant-identification-system</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-journal-americas-data-center-compliance-in-a-complex-regulatory-landscape</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-magazine-cybersecurity-is-the-second-highest-business-concern-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-sales-integration-cybersecurity-best-practices-for-protecting-commercial-security-systems</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/security-today-new-report-says-1-in-5-smbs-would-be-forced-to-shutter-after-successful-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/ssl-com-acquires-vikingclouds-digital-certificate-business</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/staples-23andme-respond-to-holiday-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/steel-technology-how-to-protect-digital-twin-systems-and-critical-infrastructure-in-steel-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/successful-cyberattacks-would-force-1-in-5-smbs-out-of-business-according-to-new-vikingcloud-research</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/supply-chain-world-michael-aminzade-on-mitigating-digital-risk-across-every-link-of-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/sysnet-global-solutions-announces-rebrand-to-vikingcloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/tech-co-48-of-cybersecurity-bosses-have-failed-to-report-a-cyberattack-this-year</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/techradarpro-the-alarming-gap-between-perception-and-reality-in-the-corner-office</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/telecom-reseller-how-to-spot-and-fix-cyber-risks-in-your-telecom-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-ai-journal-why-cyber-leaders-are-losing-confidence-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-channel-pro-network-a-guide-for-msps-to-navigate-compliance-and-data-privacy-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-top-generative-a-i-security-threats-facing-the-restaurant-industry</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-wall-street-journal-risk-compliance-the-morning-risk-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-wall-street-journal-vikingcloud-2024-holiday-cyber-threat-survey</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-wall-street-journal-vikingcloud-2025-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-wall-street-journal-vikingcloud-2025-smb-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/the-wall-street-journal-vikingcloud-2026-smb-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/training-industry-5-human-skills-ai-cannot-replicate-in-cybersecurity-efforts</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/updated-u-s-cyber-guidelines-place-emphasis-on-risk-governance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vf-corp-discloses-cyberattack-on-first-day-of-new-sec-rule</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-and-mxp-join-forces-to-strengthen-maritime-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-announces-collaboration-with-fiserv-on-mastercard-designed-c-vep-solution</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-announces-industrys-first-generative-ai-powered-chatbot-combining-real-time-cybersecurity-and-pci-compliance-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-announces-industrys-first-pci-l4-compliance-program-with-integrated-cyber-risk-score</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-announces-that-the-industrys-first-pci-dss-l4-compliance-program-with-an-integrated-cyber-risk-score-is-now-available</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-assessed-c-side-platform-against-key-pci-dss-4-0-1-requirements</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-files-patent-for-industry-first-universal-merchant-identification-system</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-named-a-trusted-cloud-consultant-by-cloud-security-alliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-named-finalist-for-best-security-compliance-solution-at-teissawards2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-research-highlights-google-searchs-unexpected-role-in-closing-the-cybersecurity-talent-gap</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-selected-to-join-global-executive-assessor-roundtable-for-fourth-consecutive-term</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-to-take-seat-at-pci-ssc-global-executive-assessor-roundtable</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-welcomes-gabe-moynagh-as-new-board-advisor</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-wins-2026-global-infosec-compliance-award-for-ccs-advantage</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vikingcloud-wins-best-security-compliance-solution-at-teissawards-2026</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vmblog-cyberattacks-overtake-inflation-and-recession-concerns-as-the-1-threat-to-smbs-in-2026-new-vikingcloud-research-finds</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/vmblog-successful-cyberattacks-would-force-1-in-5-smbs-out-of-business-according-to-new-vikingcloud-research</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/water-power-magazine-cybersecurity-in-the-age-of-digital-dams</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/whats-so-scary-about-ai-besides-human-extinction</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/why-theres-no-one-size-fits-all-solution-to-security-maturity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/press-news/world-of-software-48-of-cybersecurity-bosses-failed-to-report-a-breach-this-year</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/apis-and-improper-inventory-management</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/artificial-intelligence-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/artificial-intelligence-sanity-check</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/assessment-findings</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/asset-identification</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/attacks-with-geopolitical-motives-rise</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/badspace</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/business-continuity-planning-and-real-risk-scenarios</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/business-uninterrupted-episode-1-how-ai-is-changing-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/can-you-be-pci-dss-v3-2-1-compliant-without-4-passing-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cis-controls-version-8</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/creating-a-cohesive-compliance-program</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cyberattacks-damaging-confidence</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cybercrime-evasion-tactics</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cyberinsurance-and-war-exclusions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cyberintel-s5e1-moon-shot-cybersecurity-goals</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cybersecurity-disclosures</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cybersecurity-isnt-immune-to-pressures</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/cyberwarfare</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/data-breaches-and-the-health-sector</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/demonstrating-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/dont-rest-on-your-laurels</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/ethical-hacking-and-transhumanism</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/fbis-internet-crime-report---what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/fido-and-quantum-computing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/find-synergies-between-your-compliance-standards</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/gartner-predictions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/gartner-top-cybersecurity-trends-for-2023</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/gartner-top-cybersecurity-trends-for-2023-part-2</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/gartner-top-trends-in-cybersecurity-for-2024-emerging-skills</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/geopolitical-tensions-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/harvest-now-decrypt-later----the-quantum-time-bomb</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/having-an-ai-usage-policy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/how-much-data-is-on-your-credit-card-and-what-can-be-done-with-it</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/ibm-cost-of-data-breach-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/ibm-x-force-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/indirect-prompt-injections</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/internal-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/is-a-home-office-a-sensitive-area-for-pci-dss-v3-2-1</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/iso27002-2022-released</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/labhost</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/loose-lips-sink-ships</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/mitre-att-ck-framework</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/myanmars-industrial-scale-scam-operation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/nist-releases-first-3-finalized-post-quantum-encryption-standards</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/nist-sp-800-53-revision-5</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/nistir-8374-ransomware-risk-management-a-cybersecurity-framework-profile</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/north-korean-and-chinese-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/notifiable-data-breaches-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/ownership-in-cybersecurity-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-and-certificates-of-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-and-telephony-environments</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-gap-analysis</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-network-segmentation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v3-2-1-and-compensating-controls</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-2-approaches-for-validation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-arrives</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-changes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-compensating-controls-vs-customized-approach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-in-place-with-remediation-removed</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-items-noted-for-improvement-process</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-0-self-assessment-questionnaires</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-v4-and-what-weve-seen-so-far</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-dss-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/pci-sscs-position-of-storage-of-post-authorization-sad</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/risk-management-with-ai-assisted-tools</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/scams-as-old-as-time</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/sharing-credit-card-data-over-the-phone</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/small-vendors-in-the-supply-chain-of-larger-firms</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/state-sponsored-attacks-and-geopolitical-instability</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/strong-physical-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-ai-black-box-problem</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-difference-between-iso27001-and-iso27002</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-hidden-risk-of-public-wi-fi</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-history-and-future-of-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-next-y2k-problem</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-nist-phish-scale</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-pandemic-opening-up-gaps</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-quality-of-assessments</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-risk-of-the-home-router-to-your-business</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/the-surge-in-regulatory-compliance-through-legislation</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/threat-modelling</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/tls-and-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/unsafe-consumption-of-apis</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/us-executive-order-number-14028</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/vikingclouds-2024-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/vikingclouds-2025-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/voice-over-ip-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/what-is-considered-a-significant-change-in-pci-dss-v4-0</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/when-do-you-raise-your-hand-for-help</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/world-economic-forum-2023-cybersecurity-outlook-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/world-economic-forum-2023-cybersecurity-report-findings</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/cyberintel-podcast/world-economic-forum-global-cybersecurity-outlook-2022-insight-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/2024-cyber-threat-landscape-report-infographic</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/2024-cyber-threat-landscape-report-united-kingdom-ireland-and-the-united-states</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/5-ways-penetration-testing-exposes-risks-makes-your-business-more-secure</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/7-strategies-to-prevent-clickable-cyber-attacks-in-your-modern-sme</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/a-talent-solutions-company-swaps-spreadsheets-for-proactive-testing-processes</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/a-taste-of-how-we-delivered-for-the-qsr-market-dec23</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/achieving-pci-dss-v4-0-compliance-and-security-assurance-for-a-major-european-bank</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/axfood-dec23</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/beyond-compliance-how-to-build-a-risk-based-cybersecurity-program-that-actually-works</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/c-vep-pci-dss-compliance-validation-exemption-program</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/closing-the-talent-gap-a-visual-analytics-impact-study-of-cybersecurity-professionals-online-imagery-in-google-search</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cloud-compliance-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/compliance-risk-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/compliance-without-chaos-a-better-way-to-manage-pci-iso-soc</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-1</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-10</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-2</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-3</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-4</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-5</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-6</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-7</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-8</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cyber-myths-episode-9</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cybercriminals-are-stealing-more-than-holiday-cheer</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cybersecurity-awareness-month-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/cybersecurity-awareness-month-the-ultimate-cyber-scare</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/digital-briefing-2024-cyber-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/ebook-pci-dss-updates-from-v4-0-to-v4-0-1</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/exploring-the-new-pci-dss-requirements-effective-april-1-2025</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/finding-the-cure-for-swelling-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/five-essential-cybersecurity-features-to-improve-your-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/from-optional-to-required---the-2025-pci-dss-v4-x-changes-you-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/fueling-a-healthy-diet</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/full-service-cybersecurity-approach-is-helping-build-a-burger-empire</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/future-proof-your-security-maturity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/good-vs-bad-actors-in-ai-deepfake-voice-technology-for-fun-and-fraud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/hackers-arent-just-browsing-retailers-are-prime-target-for-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/helping-rely-it-achieve-pci-pin-and-ssf-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/how-a-global-hotel-brand-found-a-true-cybersecurity-partner-to-manage-disparate-time-zones-laws-and-compliance-statuses</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/how-a-major-airline-stays-pci-compliant-even-at-35-000-feet</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/how-do-cybercriminals-profit-from-my-stolen-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/how-pci-dss-v4-0-will-influence-the-future-of-payment-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/how-vikingcloud-helps-a-constantly-expanding-healthcare-company-keep-its-network-safe-and-streamlined</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/insights-from-the-global-travel-industry</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/insights-into-pci-dss-v4-0-free-download</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/latin-american-based-payment-solutions-provider</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/lloyds-bank-cardnet-partners-with-vikingcloud-to-help-customers-secure-their-payment-card-data</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/major-travel-site-partners-with-vikingcloud-to-take-the-pain-out-of-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/managed-connectivity-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/managed-detection-response</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/managed-security-services</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/managed-security-services---5g-internet</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/managed-security-services-bundles</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/msp-vs-mssp</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/mss-backup-internet-continuity</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/pci-dss-solution-suite</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/pci-dss-v4-0---lessons-learned-and-pitfalls-to-avoid</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/pci-dss-v4-0-lecciones-aprendidas-y-trampas-a-evitar</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/pci-dss-v4-0-self-assessment-questionnaires-saqs-whats-changed</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/pci-dss-v4-0-whats-changed-free-download</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/peak-season-peak-risk---inside-the-2025-state-of-hospitality-cyber-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/peak-season-peak-risk-the-2025-state-of-hospitality-cyber-report</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/perception-gap-frontline-managers-vs-c-suite-leaders</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/point-to-point-encryption-p2pe-assessment</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/preparing-for-your-first-pci-dss-v4-0-assessment</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/proactive-data-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/programs-for-acquirers-isos-and-processors</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/protecting-your-business-from-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/retail-cyber-threats-in-2025---what-you-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/risk-assessment-framework-for-cybersecurity-professionals</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/risk-assessment-framework-for-cybersecurity-professionals-7c454</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/risk-directed-security-from-enforcers-of-pci-dss-to-enablers-of-a-secure-payment-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/room-for-trouble-hackers-are-booking-stays-at-your-hotel-this-summer</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/securing-the-end-zone-achieving-pci-compliance-excellence-for-an-nfl-franchise</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/security-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/services-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/serving-up-reliable-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/smb-cyberrisk-open-for-business-or-for-breach</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/smes-under-attack-a-new-approach-to-cyber-defense-with-an-mssp</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/staying-pci-dss-compliant-as-the-global-payment-landscape-evolves</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/strategies-to-prevent-clickable-cyber-attacks-in-your-modern-small-or-mid-sized-enterprise</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/streamlining-pci-compliance-for-an-airline-holding-company</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-2024-threat-landscape-report-cyber-risks-opportunities-resilience</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-2025-cyber-threat-landscape-report-cyber-risks-opportunities-resilience</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-2025-cyber-threat-landscape-report-cyber-risks-opportunities-resilience-infographic</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-2026-smb-threat-landscape-report-the-year-cybersecurity-risks-surpass-economic-concerns</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-benefits-of-vikingclouds-combined-assessment-model</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-hidden-cost-of-fragmented-pci-programs</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-hidden-threat-unraveling-e-skimming-script-security-and-pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-high-risk-cybersecurity-disconnect-c-suite-cyber-leaders-vs-frontline-managers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-pci-compliance-story-behind-a-global-telecom-organizations-successful-expansion-into-mexico</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-power-of-proactive-cybersecurity-using-ethical-hackers-to-uncover-and-fix-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-risk-based-revolution-your-cheat-sheet-for-future-proofed-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-threat-of-e-skimming-helping-level-3-and-4-merchants-protect-their-e-commerce-websites-by-leveraging-e-skim-monitoring-for-pci-dss-6-4-3-11-6-1-compliance</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-travel-and-hospitality-industry-a-growing-destination-for-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-travel-and-hospitality-industry-a-growing-destination-for-cyberattacks-infographic</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-value-of-powerful-predictive-and-cohesive-cybersecurity-solutions-for-a-quick-service-restaurant-chain</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/the-year-cyber-threats-topped-economic-pressures</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/threat-hunt-that-uncovered-novel-malware</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/under-attack-how-smes-should-rethink-their-approach-to-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/video-bic-noir-pen-testing</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/vikingcloud-cyber-threat-landscape-report-canadian-edition-2024</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/vikingcloud-cyber-threat-landscape-report-what-your-2026-security-strategy-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/vikingcloud-global-customer-feedback</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/vikingclouds-2025-smb-threat-landscape-report-small--and-medium-sized-businesses-big-cybersecurity-risks</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/web-risk-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/welcome-to-vikingcloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/welcome-to-vikingcloud-global-full-version-irish-accent</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/welcome-to-vikingcloud-global-quick-version-irish-accent</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/welcome-to-vikingcloud-north-american-full-version-us-accent</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/what-a-solid-wulnerability-program-should-look-like</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/what-acquirers-need-to-know-about-ecommerce-security</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/whats-really-threatening-auto-service-repair-and-parts-businesses-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/when-the-internet-goes-out-this-quick-service-restaurant-relies-on-a-seamless-and-secure-backup</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/resources/worldline-looks-to-the-future-of-pci-compliance-to-build-on-successful-partnership-with-vikingcloud</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/auto-service-centers</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/fuel-and-convenience-stores</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/hospitality</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/pharmacy</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/restaurants</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/retail</loc>
    </url>
    <url>
        <loc>https://www.vikingcloud.com/industries/travel</loc>
    </url>
</urlset>