<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
    <url>
      <loc>https://www.cybersec-automation.com/</loc>
      <lastmod>2026-02-02</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/blog-posts</loc>
      <lastmod>2025-10-03</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/recommendations</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/subscribe</loc>
      <lastmod>2026-02-02</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/tags</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/upgrade</loc>
      <lastmod>2026-02-02</lastmod>
    </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors</loc>
        <lastmod>2026-04-03</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/cristian-miron</loc>
        <lastmod>2024-11-25</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/dylan-williams</loc>
        <lastmod>2024-11-25</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/andrei-cotaie</loc>
        <lastmod>2024-11-25</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/filip-stojkovski</loc>
        <lastmod>2026-02-13</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/srinivas-mantripragada</loc>
        <lastmod>2025-01-24</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/yossi-barishev</loc>
        <lastmod>2024-04-01</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/andrei-cotaie</loc>
        <lastmod>2024-04-01</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/cristian-miron</loc>
        <lastmod>2024-04-01</lastmod>
      </url>
      <url>
        <loc>https://www.cybersec-automation.com/authors/alex-diner</loc>
        <lastmod>2024-06-24</lastmod>
      </url>
    <url>
      <loc>https://www.cybersec-automation.com/forms/73fcc5b1-b2ee-48e7-93d9-2887d512151b</loc>
      <lastmod>2025-09-12</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/navigating-the-cybersecurity-landscape</loc>
      <lastmod>2025-11-11</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/reactive-vs-proactive-approach-of</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/evaluating-ai-agents-for-soc-3bb845c1d5d63f8c</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/navigating-cybersecurity-enterprise-automation-rpa</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/bridging-detection-engineering-sops</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/cyber-copilot-vs-ai-soc</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/is-your-ai-soc-optimistic-or-pessimistic-14264e1a9be330ff</loc>
      <lastmod>2025-08-21</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-response-maturity-model</loc>
      <lastmod>2026-02-19</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/detection-engineering-automation-incident-response</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/soc-ai-agents</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/automate-smarter-not-louder-using-interactive-ai-feedback-loops</loc>
      <lastmod>2025-06-25</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/how-ai-transforms-detection-engineering</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/lead-and-beyond</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-soc-shift-left-and-shift-right</loc>
      <lastmod>2025-09-11</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/blueprint-for-ai-agents-in-cybersecurity</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/integrating-ai-agents-into-existing-soc-workflows-best-practices-61391cdca6acf83b</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/edr-alerts-automation</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/beyond-the-tiered-soc</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops-c12d22215aa28244</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/navigating-grc-automation</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/build-security-automations</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/the-last-human-in-the-room</loc>
      <lastmod>2026-03-17</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/rebranding-announcement</loc>
      <lastmod>2025-10-10</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/autonomous-soc-vs-traditional-soc</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/how-i-d-use-ai-agents-in-a-security-automation-platform-36e1743f79f2363a</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/orchestrating-the-fight-against-malware</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/rsac-2026-secops-summery</loc>
      <lastmod>2026-03-30</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/security-automation-development-lifecycle</loc>
      <lastmod>2025-04-14</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/soc-reality-check</loc>
      <lastmod>2025-11-10</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/the-soc-autonomy-trap</loc>
      <lastmod>2026-01-19</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-soc-nextgen-mdr</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/lowcode-automation-detection-code</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/the-fear-of-not-doing-enough</loc>
      <lastmod>2026-02-13</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/the-monthly-debrief-cybersec-automation-podcast-roundup-ed181766ffb4c951</loc>
      <lastmod>2025-08-13</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/why-ai-won-t-replace-the-human-who-owns-the-risk-in-security-operations</loc>
      <lastmod>2026-04-02</lastmod>
      <news:news>
        <news:publication>
          <news:name>SecOps Unpacked</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T15:23:41Z</news:publication_date>
        <news:title>Why AI Won&#39;t Replace the Human Who Owns the Risk in Security Operations</news:title>
      </news:news>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/stop-chasing-the-single-pane-of-glass-1555d42f940d3642</loc>
      <lastmod>2025-07-23</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/a-strategic-blueprint-for-leveraging</loc>
      <lastmod>2025-04-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/security-automation-types</loc>
      <lastmod>2025-04-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/security-automation-shopping</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/blueprint-for-effective-security</loc>
      <lastmod>2025-11-11</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/rise-agentic-process-automation-cybersecurity</loc>
      <lastmod>2025-04-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-soc-core-component</loc>
      <lastmod>2025-10-03</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/can-ai-drive-response</loc>
      <lastmod>2025-11-11</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/secops-process-blueprint</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/understanding-semantic-layers-in-security-operations</loc>
      <lastmod>2026-01-17</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/measuring-roi-of-ai-agents-in-security-operations-9a67fdab64192ed0</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-agents-vs-automation-playbooks-4f807401ef07472b</loc>
      <lastmod>2025-06-22</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/ai-socs-you-can-actually-control-and-customize</loc>
      <lastmod>2025-09-17</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/responding-to-cyber-threats-with-flexible-roadmaps</loc>
      <lastmod>2025-04-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/dora-rpa-security-automation</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/opensource-soar-uncovered</loc>
      <lastmod>2025-05-29</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/from-pdf-playbooks-to-machine-executable-logic</loc>
      <lastmod>2025-10-27</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/soar-and-hyperautomation-full-list-2024</loc>
      <lastmod>2025-10-15</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/why-faster-detection-created-a-bigger-problem</loc>
      <lastmod>2026-03-12</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/p/why-soc-analysts-ignore-your-playbooks-72e6ec0f57d03b15</loc>
      <lastmod>2025-07-31</lastmod>
    </url>
    <url>
      <loc>https://www.cybersec-automation.com/t/automation-framework</loc>
      <lastmod>2025-09-18</lastmod>
    </url>
</urlset>
