<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://brittany-holmes.com/2025/01/01/scalable-cybersecurity-for-maschoff-brennans-merger-acquisition/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2025/01/legal-case-study-for-cybersecurity.png</image:loc><image:title>legal-case-study-for-cybersecurity</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-01T20:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/20/three-critical-elements-for-the-perfect-security-operations-mix/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/a-cybersecurity-white-paper-about-security-operations.png</image:loc><image:title>a-cybersecurity-white-paper-about-security-operations</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/three-critical-elements-white-paper_feature-image.jpg</image:loc><image:title>three-critical-elements-white-paper_feature-image</image:title></image:image><lastmod>2024-12-20T21:08:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/20/edr-vs-xdr-vs-mdr-the-cybersecurity-abcs-explained/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/a-picture-with-cybersecurity-building-blocks.png</image:loc><image:title>a-picture-with-cybersecurity-building-blocks</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/full_width_abc_ebook_background_3.jpg</image:loc><image:title>full_width_abc_ebook_background_3</image:title></image:image><lastmod>2024-12-20T21:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/20/ultimate-buyers-guide-to-managed-detection-and-response/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/the-ultimate-guide-to-managed-detection-and-response-1.png</image:loc><image:title>the-ultimate-guide-to-managed-detection-and-response</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/the-ultimate-guide-to-managed-detection-and-response.png</image:loc><image:title>the-ultimate-guide-to-managed-detection-and-response</image:title></image:image><lastmod>2024-12-20T21:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/19/adaptive-advantage/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/nist-2-0.png</image:loc><image:title>nist-2-0</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/e714c-pexels-tetyana-kovyrina-1439087.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-12-20T17:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/19/teamwork-triumphs/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/endpoint-security.png</image:loc><image:title>endpoint-security</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/76863-pexels-karolina-grabowska-4476376.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-12-20T17:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/19/collaboration-magic/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/ransomware-1.png</image:loc><image:title>ransomware</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/ransomware.png</image:loc><image:title>ransomware</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/c1890-pexels-rdne-stock-project-7551734.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-12-20T17:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/19/growth-unlocked/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/moving-beyond-siem-cybersecurity.png</image:loc><image:title>moving-beyond-siem-cybersecurity</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/37557-pexels-ketut-subiyanto-4473602.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2024-12-20T17:18:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/2024/12/20/how-to-optimize-your-vulnerability-management-program/</loc><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/cybersecurity.png</image:loc><image:title>cybersecurity</image:title></image:image><image:image><image:loc>https://brittany-holmes.com/wp-content/uploads/2024/12/1722535200890.jpeg</image:loc><image:title>1722535200890</image:title></image:image><lastmod>2024-12-20T17:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brittany-holmes.com/blogs/</loc><lastmod>2024-12-20T15:39:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brittany-holmes.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-01-01T20:03:24+00:00</lastmod></url></urlset>
