<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//research.classifiedintel.co/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://research.classifiedintel.co/research/privacy-enforcement-2026/</loc><lastmod>2026-02-12T18:12:03.000Z</lastmod></url><url><loc>https://research.classifiedintel.co/research/shadow-ai-governance-gap/</loc><lastmod>2026-02-12T18:11:07.000Z</lastmod></url><url><loc>https://research.classifiedintel.co/research/supply-chain-detection-gap/</loc><lastmod>2026-02-12T18:10:54.000Z</lastmod></url><url><loc>https://research.classifiedintel.co/research/privacy-control-plane-multi-jurisdiction/</loc><lastmod>2026-02-12T18:10:41.000Z</lastmod></url><url><loc>https://research.classifiedintel.co/research/iso-42001-multi-jurisdiction-evidence-pack/</loc><lastmod>2026-02-04T05:10:36.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2026/02/tmp4n7fhfjq.jpg</image:loc><image:caption>tmp4n7fhfjq.jpg</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/accountability-paradox-ai-crisis-decisions/</loc><lastmod>2026-02-04T05:03:25.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2026/02/out-0--1-.jpeg</image:loc><image:caption>out-0--1-.jpeg</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/healthcare-data-breaches-is-google-exposure-a-growing-risk/</loc><lastmod>2026-01-20T06:37:32.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1451187580459-43490279c0fa?w=1600&amp;q=80</image:loc><image:caption>photo-1451187580459-43490279c0fa?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-scribes-in-healthcare-balancing-efficiency-and-cybersecurity/</loc><lastmod>2026-01-20T06:25:44.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1576091160550-2173dba999ef?w=1600&amp;q=80</image:loc><image:caption>photo-1576091160550-2173dba999ef?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-genai-behavioral-cybersecurity-imperative/</loc><lastmod>2026-01-20T05:04:29.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1558494949-ef010cbdcc31?q=80&amp;w=2000</image:loc><image:caption>photo-1558494949-ef010cbdcc31?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/combating-deepfake-scams-protecting-your-business/</loc><lastmod>2026-01-20T04:54:36.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1593642532973-d31b6557fa68?w=1600&amp;q=80</image:loc><image:caption>photo-1593642532973-d31b6557fa68?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/agentic-ai-revolutionizing-security-operations/</loc><lastmod>2026-01-20T04:02:16.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1516321318423-f06f85e504b3?w=1600&amp;q=80</image:loc><image:caption>photo-1516321318423-f06f85e504b3?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-agentic-ai-the-imperative-of-integrated-api-management/</loc><lastmod>2026-01-20T04:01:15.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=1600&amp;q=80</image:loc><image:caption>photo-1504639725590-34d0984388bd?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-security-agents-consolidating-cybersecurity-ops/</loc><lastmod>2026-01-20T03:11:05.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1560732488-6b0df240254a?q=80&amp;w=2000</image:loc><image:caption>photo-1560732488-6b0df240254a?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/agentic-ai-redefining-trust-with-crypto-proof/</loc><lastmod>2026-01-20T02:36:26.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1563986768711-b3bde3dc821e?q=80&amp;w=2000</image:loc><image:caption>photo-1563986768711-b3bde3dc821e?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-cybersecurity-defending-against-evolving-threats/</loc><lastmod>2026-01-20T02:29:01.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1550745165-9bc0b252726f?q=80&amp;w=2000</image:loc><image:caption>photo-1550745165-9bc0b252726f?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-exposure-remediation-a-2025-guide/</loc><lastmod>2026-01-20T02:28:39.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1518432031352-d6fc5c10da5a?q=80&amp;w=2000</image:loc><image:caption>photo-1518432031352-d6fc5c10da5a?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-cybersecurity-proactive-threat-hunting/</loc><lastmod>2026-01-20T02:24:35.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1504384308090-c894fdcc538d?q=80&amp;w=2000</image:loc><image:caption>photo-1504384308090-c894fdcc538d?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-powered-browser-agents-protect-your-data-now/</loc><lastmod>2026-01-20T02:23:13.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?q=80&amp;w=2000</image:loc><image:caption>photo-1488590528505-98d2b5aba04b?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-agents-prevention-is-key/</loc><lastmod>2026-01-20T02:22:31.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1509395062183-67c5ad6faff9?q=80&amp;w=2000</image:loc><image:caption>photo-1509395062183-67c5ad6faff9?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-prompt-injection-gitlab-duo-vulnerability/</loc><lastmod>2026-01-20T02:05:04.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1461749280684-dccba630e2f6?w=1600&amp;q=80</image:loc><image:caption>photo-1461749280684-dccba630e2f6?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-bridging-the-gap-between-deployment-and-protection/</loc><lastmod>2026-01-20T02:04:57.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1516245834210-c4c142787335?w=1600&amp;q=80</image:loc><image:caption>photo-1516245834210-c4c142787335?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/genai-attack-chains-telemetry-lag-a-2025-roadmap/</loc><lastmod>2026-01-20T02:04:49.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1510915228340-29c85a43dcfe?w=1600&amp;q=80</image:loc><image:caption>photo-1510915228340-29c85a43dcfe?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-protecting-against-new-cybercrime-in-2025/</loc><lastmod>2026-01-20T02:04:40.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1504868584819-f8e8b4b6d7e3?w=1600&amp;q=80</image:loc><image:caption>photo-1504868584819-f8e8b4b6d7e3?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-cybersecurity-performance-management-demonstrating-roi-in-the-age-of-intelligent-threats/</loc><lastmod>2026-01-20T01:36:30.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1551288049-bebda4e38f71?w=1600&amp;q=80</image:loc><image:caption>photo-1551288049-bebda4e38f71?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/combating-deepfake-attacks-ai-driven-defense-strategies/</loc><lastmod>2026-01-20T01:31:43.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=1600&amp;q=80</image:loc><image:caption>photo-1614064641938-3bbee52942c7?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-scam-detection-protecting-your-business/</loc><lastmod>2026-01-20T01:27:44.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1563013544-824ae1b704d3?w=1600&amp;q=80</image:loc><image:caption>photo-1563013544-824ae1b704d3?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/zero-trust-for-healthcare-safeguarding-patient-data-in-2025/</loc><lastmod>2026-01-20T01:23:48.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1576091160399-112ba8d25d1d?w=1600&amp;q=80</image:loc><image:caption>photo-1576091160399-112ba8d25d1d?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-powered-code-editors-lessons-from-the-cursor-backdoor/</loc><lastmod>2026-01-20T01:23:48.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1555066931-4365d14bab8c?w=1600&amp;q=80</image:loc><image:caption>photo-1555066931-4365d14bab8c?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-phishing-defending-against-evolving-threats/</loc><lastmod>2026-01-19T23:50:05.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=1600&amp;q=80</image:loc><image:caption>photo-1614064641938-3bbee52942c7?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-phishing-how-to-protect-your-business/</loc><lastmod>2026-01-19T22:03:25.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1560179707-f14e90ef3623?w=1600&amp;q=80</image:loc><image:caption>photo-1560179707-f14e90ef3623?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-phishing-how-to-spot-evolving-threats/</loc><lastmod>2026-01-19T22:03:18.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1555421689-d68471e189f2?w=1600&amp;q=80</image:loc><image:caption>photo-1555421689-d68471e189f2?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-social-engineering-the-new-threat/</loc><lastmod>2026-01-19T22:03:11.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1552664730-d307ca884978?w=1600&amp;q=80</image:loc><image:caption>photo-1552664730-d307ca884978?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-enhanced-phishing-how-dmarc-can-shield-your-organization-now/</loc><lastmod>2026-01-19T21:48:45.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1563013544-824ae1b704d3?w=1600&amp;q=80</image:loc><image:caption>photo-1563013544-824ae1b704d3?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-defending-the-indefensible/</loc><lastmod>2026-01-19T21:42:39.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1635070041078-e363dbe005cb?w=1600&amp;q=80</image:loc><image:caption>photo-1635070041078-e363dbe005cb?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-defend-your-business/</loc><lastmod>2026-01-19T21:42:32.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1551836022-d5d88e9218df?w=1600&amp;q=80</image:loc><image:caption>photo-1551836022-d5d88e9218df?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-the-next-cyber-threat/</loc><lastmod>2026-01-19T21:42:25.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1563986768609-322da13575f3?w=1600&amp;q=80</image:loc><image:caption>photo-1563986768609-322da13575f3?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-a-new-era-of-cyber-threats/</loc><lastmod>2026-01-19T21:42:18.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1454165804606-c3d57bc86b40?w=1600&amp;q=80</image:loc><image:caption>photo-1454165804606-c3d57bc86b40?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-the-new-cyber-threat-demanding-innovative-defenses/</loc><lastmod>2026-01-19T21:39:43.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=1600&amp;q=80</image:loc><image:caption>photo-1526374965328-7f61d4dc18c5?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-ransomware-defending-the-future/</loc><lastmod>2026-01-19T21:39:28.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1563986768494-4dee2763ff3f?w=1600&amp;q=80</image:loc><image:caption>photo-1563986768494-4dee2763ff3f?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-generated-ransomware-the-new-cyber-threat-landscape/</loc><lastmod>2026-01-19T21:39:13.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=1600&amp;q=80</image:loc><image:caption>photo-1550751827-4bd374c3f58b?w=1600&amp;q=80</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/weaponized-ai-combating-ai-driven-cyberattacks/</loc><lastmod>2026-01-19T14:42:31.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2025/04/ChatGPT-Image-Apr-22--2025--11_19_21-AM.png</image:loc><image:caption>ChatGPT-Image-Apr-22--2025--11_19_21-AM.png</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-agentic-ai-the-critical-role-of-api-management-in-enterprise-cybersecurity/</loc><lastmod>2026-01-19T07:07:38.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2025/05/20250529_0933_Bot-Defends-Against-Threats_remix_01jwe3wamvfmss2jx6nfy5f4wa.png</image:loc><image:caption>20250529_0933_Bot-Defends-Against-Threats_remix_01jwe3wamvfmss2jx6nfy5f4wa.png</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-social-engineering-a-new-era-of-phishing/</loc><lastmod>2026-01-19T05:12:23.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1557821552-17105176677c?q=80&amp;w=2000</image:loc><image:caption>photo-1557821552-17105176677c?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-agent-security-why-rag-is-dying-whats-next/</loc><lastmod>2026-01-19T04:58:05.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1677442136019-21780ecad995?q=80&amp;w=2000</image:loc><image:caption>photo-1677442136019-21780ecad995?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/securing-ai-agents-protecting-your-smartest-employee/</loc><lastmod>2026-01-19T04:57:39.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1531746790731-6c087fecd65a?q=80&amp;w=2000</image:loc><image:caption>photo-1531746790731-6c087fecd65a?q=80&amp;w=2000</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/the-jpmorgan-wake-up-call-why-saas-security-just-became-everyones-problem/</loc><lastmod>2025-05-30T13:14:53.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2025/05/ChatGPT-Image-May-30--2025--09_11_24-AM.png</image:loc><image:caption>ChatGPT-Image-May-30--2025--09_11_24-AM.png</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/ai-powered-financial-fraud-how-criminals-are-weaponizing-machine-learning-against-your-money/</loc><lastmod>2025-05-30T13:00:21.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2025/05/ChatGPT-Image-May-30--2025--08_58_55-AM.png</image:loc><image:caption>ChatGPT-Image-May-30--2025--08_58_55-AM.png</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/tiktoks-deepfake-malware-crisis-when-ai-turns-your-favorite-creator-into-a-cyberthreat/</loc><lastmod>2025-05-29T16:04:30.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2025/05/20250529_0937_Deepfake-Malware-Crisis_simple_compose_01jwe44462f7va5ypxa1keahs2.png</image:loc><image:caption>20250529_0937_Deepfake-Malware-Crisis_simple_compose_01jwe44462f7va5ypxa1keahs2.png</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/managing-uncertainty-in-ai-projects-a-practical-guide/</loc><lastmod>2024-12-18T19:46:20.000Z</lastmod><image:image><image:loc>https://research.classifiedintel.co/content/images/2024/12/Group-Meeting-in-Modern-Conference-Room-1.jpeg</image:loc><image:caption>Group-Meeting-in-Modern-Conference-Room-1.jpeg</image:caption></image:image></url><url><loc>https://research.classifiedintel.co/research/bridging-the-skills-gap-empowering-canadian-companies-in-ai-and-cybersecurity/</loc><lastmod>2024-12-18T17:51:16.000Z</lastmod><image:image><image:loc>https://images.unsplash.com/photo-1528144970445-ce8fe2893296?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDJ8fGNhbGdhcnl8ZW58MHx8fHwxNzM0NTAwMjgwfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000</image:loc><image:caption>photo-1528144970445-ce8fe2893296?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDJ8fGNhbGdhcnl8ZW58MHx8fHwxNzM0NTAwMjgwfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000</image:caption></image:image></url></urlset>