<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.vectra.ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/careers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/cdr-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/cdr-for-m365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/cognito</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/contact</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/competitive/darktrace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/dell</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/demo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/events-webinars</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/competitive/extrahop</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/jobs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/kpmg</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/leadership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/managed-service-partners</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/mdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-room</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/microsoft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/overview</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/platform-demo-videos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/recognition</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/search</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/channel-partners-and-distributors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/servicenow</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/splunk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/integrations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/integrations/third-party</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/integrations/response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/integrations/workflow</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/itdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/meet/maad-af</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/itdr/itdr-for-active-directory</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/itdr/itdr-for-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/attack-labs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/calculators/mxdr-value-calculator</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/gartner-srm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/calculators/identity-exposure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/showme</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/experience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/find</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/join</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/it-sa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/tours</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/detect</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/discover</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/hunt</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/investigate</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/respond</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/m365copilot</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/gartner-srm-london</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/demo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/competitive/cisco</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/cloud/azure-coverage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/ai-scholars</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/vectra-ai-cyber-cinema</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/research/security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/research/ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/research/threat-briefings</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/premium-support</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/email-preferences</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/privacy/products</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/2025-gartner-magic-quadrant-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/security-gap-analysis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-anatomy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/our-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/lp/darktrace-variation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legends-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/black-hat-mea</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/security-gap-analysis-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/cloud-control-plane-protection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/cloud-identity-protection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/cloud-posture-improvement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/critical-infrastructure-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/ids-replacement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/ot-environment-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/pcap-replacement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/remote-workforce-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/siem-optimization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/signature-ai-driven-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/edr-gap-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/telecommunications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/real-estate</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/retail</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/nhs-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/pharmaceuticals-and-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/industrial-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/higher-education</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/financial-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/energy-and-utilities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/critical-national-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/federal</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/industries/healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/products/competitive/ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/success-center</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/respond-360</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/customers/training</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/vectra-fusion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/gartner-srm-sydney</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/rsa2026-networking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/gisec-global-2026</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/identity-based-attack-detection-and-containment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/lateral-movement-detection-and-containment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/optimize-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/assure-mitre-attack-kill-chain-coverage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/continuous-compliance-validation-and-assurance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/stop-insider-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/use-cases/asset-and-identity-visibility</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/ai-cybersecurity-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/threat-detection-investigation-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/platform/network-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detection-gaps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/aakash-gupta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/aaron-bean</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/aaron-turner</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ada-tirelli</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/agustinus-dwijoko</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ahmad-abulhouf</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/alessio-mercuri</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/alex-groyz</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/alexander-huber</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/alywin-lam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/anan-haj-mohammed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/andreas-muller</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/andreas-riepen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/angela-heindl-schober</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/anna-baron-garcia</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/antonio-huertas</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/arpan-sarkar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/battista-cagnoni</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ben-bailey</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ben-wiener</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/bhargav-pandya</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/bonnie-simmons</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/brad-woodberg</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/brandon-pace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/brian-dunlap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/brian-neuhaus</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/brian-osullivan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/bruce-armstrong</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/caren-havelock</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chad-reese</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/charlie-giancarlo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chelsea-farbolin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chloe-cross</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chris-doman</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chris-fisher</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chris-hofmann</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chris-howard</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/chris-long</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/christian-borst</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/christoph-riese</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/christophe-jolly</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/christopher-thissen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/claire-loffler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/connor-peoples</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/cyrille-franchet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/dain-perkins-senior-system-engineer-vectra-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/dale-o-grady</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/daniel-crossley</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/daniel-torrefranca</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/dave-kofflin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/david-brooks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/david-meltzer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/david-pegna</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/david-reilly</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/david-sajoto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/derek-phillips</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/dirk-eberhard</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/dmitriy-beryoza</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/don-dixon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eduardo-ortiz-romeu</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eleni-papapostolou</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eric-hanselman</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eric-larcher</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eric-ogren-451-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eric-wolford</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/erik-evangelista</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/erika-villa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ethan-durand</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eugene-eng</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/eutimio-fernandez</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/fabian-gentinetta-parpan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/fabien-guillot</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/faris-saadeh</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/firas-el-charif</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/francis-ia</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/francois-chen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/francois-hocher</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/fuad-enaya</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gage-cowger</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gareth-bradshaw</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/garry-veale</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gary-ruiz</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gearoid-o-fearghail</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gerard-bauer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gokul-rajagopalan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/grace-durkin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/greg-murphy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gregory-cardiet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/gunter-ollmann</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/hamad-altaf</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/henrik-davidsson</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/henrik-smit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/himanshu-mhatre</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/hitesh-sheth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/hsin-chen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jacob-sendowski</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jan-zeilinga</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jasdeep-singh-arneja</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jason-tesarz-system-engineer-vectra-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jay-campbell</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jennifer-geisler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jeremy-haltom</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jerish-parapurath</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jesse-kimbrel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jessica-couto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jim-gianelos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jim-messina</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jitin-dhanani</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/joe-malenfant</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/john-mancini</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/john-o-callaghan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/john-smith</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jonathan-barrett</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jose-badia</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/jose-malacara</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/joshua-st-hilaire</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/juan-de-dios-murillo-castellano</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/julian-kraus</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/justin-beard</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/justin-howe</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/karolina-glachant</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kat-traxler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/katherine-toh</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ken-smith</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kevin-kennedy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kevin-moore</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kevin-sheu</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kim-rehage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/kishore-yerramreddy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/laura-mayeux</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/luca-boselli</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/luca-settino</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/lucie-cardiet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/luke-chell</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/luke-richards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marc-gemassmer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marcel-leitel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marcus-hartwig</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marijn-joosten</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/mario-quintana</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/mark-verbloot</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/mark-wojtasiak</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/martin-baker</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/martin-kinda</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/martin-roesch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marty-roesch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/marwan-maayeh</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/massimiliano-galvagna</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/matt-walmsley</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/matthew-pieklik</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/matthew-silver</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/matthias-schmauch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/mauro-paredes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/max-friedrich</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/michael-lesueur</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/michael-tapken</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/mike-banic-vp-of-marketing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/monty-gill</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/myrna-soto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nagi-sriranga</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nathan-einwechter</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/navid-molavi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/niall-errity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nick-beauchesne</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nicolas-berdugo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nicole-drake</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/nidal-abu-ghali</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ofir-ronen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/oliver-brdiczka</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/oliver-tavakoli</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/omar-yousef</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/padraig-mannion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/pankaj-kumar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/paul-shinn</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/paul-tel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/pier-lombardi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/pieter-dockx</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/pieter-van-goethem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/quentin-olagne</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rabih-itani</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rami-dweik</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/randy-schirman</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/renaud-leroy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rene-adam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/ricardo-hernandez</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rob-rosiello</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/robert-marcoux</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rohan-chitradurga</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/romain-fasquel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/rudi-jager</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sam-martin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sebastian-koza</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/shan-zhou</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sharat-nautiyal</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/shaun-kane</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/shawn-terrell</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/snehal-patel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sohrob-kazerounian</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sophia-lin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/sridevi-sheth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/stephen-malone</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/steve-carlin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/steve-cottrell</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/steven-van-loo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/stijn-rommens</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/strahinja-janjusevic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/taj-elkhayat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tejas-pargaonkar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/teppo-halonen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/the-masked-ciso</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/thomas-mulligan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/thomas-patterson</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tiffany-nip</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tim-mcadam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tim-wade</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tobias-grond</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tom-bilen</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tom-canty-vectra-marketing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tom-daquino</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tom-mani</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tommaso-severini</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tommy-jenkins</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/tony-martinez</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/vectra-ai-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/vectra-ai-product-team</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/vectra-threat-labs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/wade-williamson</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/willem-hendrickx</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/wim-vandebroeck</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/yann-fareau</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/yazan-hammoudah</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/yazeed-almaso</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/yusri-mohd-yusop</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/zach-arrambide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/zach-vaughn</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/zack-abzug</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/zaid-al-omari</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/author/zoey-chu</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/10-signs-youre-asking-too-much-from-your-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/2023-cybersecurity-predictions-battle-of-the-cyber-capabilities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/2024-predictions-generative-ais-role-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/2025-predictions-genai-loses-steam-as-defenders-and-attackers-see-the-rise-of-autonomous-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/3-guideposts-for-organizational-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/4-real-world-attacks-that-show-why-socs-need-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/4-ways-to-give-your-soc-valuable-time-back-with-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/5-minute-hunt-detecting-risky-multi-tenant-apps-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/5-minute-hunt-six-queries-to-detect-iranian-apt-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/5-ways-security-teams-can-start-driving-outcomes-with-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/8-questions-security-pros-ask-vectra-ai-about-midnight-blizzard-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/a-durable-method-for-dealing-with-zero-days</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/a-newly-discovered-zero-day-exposes-ntlm-credentials-to-theft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/abusing-the-replicator-silently-exfiltrating-data-with-the-aws-s3-replication-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/account-lockdown</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/achieve-zero-trust-access-visibility-with-zscaler-and-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/adaptive-network-adversaries-in-a-restructured-federal-landscape</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-agent-assisted-bug-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-agents-the-new-workforce-and-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-agents-what-do-they-mean-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-and-the-future-of-cybersecurity-work</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-helps-detect-evasive-cyberattackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-in-cybersecurity-will-big-adoption-trends-deliver-big-outcomes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-is-now-the-attack-surface-why-your-security-stack-must-adapt-fast</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-powered-attacks-are-here-but-so-is-ai-powered-ndr-to-stop-them</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ai-vs-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/alan-turing-and-the-birth-of-machine-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/alert-fatigue-and-bad-signatures-leads-to-missed-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/are-iranian-apts-already-inside-your-hybrid-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/are-you-putting-critical-infrastructure-at-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/are-you-transforming-your-soc-yet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/assume-compromise-its-time-to-change-your-security-mentality</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/attackers-can-use-your-admin-tools-to-spy-spread-and-steal</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/attackers-dont-hack-in-they-log-in-the-mfa-blind-spot</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/automate-response-and-speed-remediation-with-swimlane-and-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/aws-compromised-by-ai-agents-in-minutes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/azure-ad-attackers-beware-vectra-sees-you</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/azure-ad-users-are-bypassing-your-mfa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/azure-logging-just-changed-your-detections-may-be-missing-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/behind-the-hunt-real-world-threat-hunting-practices-and-how-vectra-ai-makes-the-difference</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/best-ndr-for-hybrid-environments-visibility-control-and-threat-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/beware-of-malicious-websites-and-using-identical-passwords-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/beyond-configuration-perfection-redefining-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/beyond-endpoints-how-brickstorm-exposed-security-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/black-hat-takeaway-everyone-talks-prevention-but-who-detects-compromise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/black-hat-usa-2025-what-it-told-me-about-protecting-the-modern-network-from-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/black-hat-usa-2025-what-security-teams-asked-us-in-las-vegas</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/blocking-shodan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/breaking-down-the-axios-supply-chain-incident</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/breaking-ground-understanding-and-identifying-hidden-tunnels</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/breaking-through-alert-noise-to-stop-cyberattacks-before-they-become-breaches</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/build-a-proactive-security-program-with-vectra-mxdrs-latest-capabilities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/c2-evasion-techniques</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/can-your-socs-ai-actually-think-evaluating-llms-with-the-vectra-ai-mcp-server</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/canary-in-the-ransomware-mine</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/challenges-in-azure-log-monitoring-insights-for-your-soc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/charting-a-new-era-of-network-security-vectra-ai-at-the-forefront</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/choosing-an-optimal-algorithm-for-ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/choosing-the-right-ndr-gartners-5-questions-every-security-buyer-should-be-asking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/choosing-to-challenge-2021-women-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cisa-flags-fast-flux-as-a-national-threat-are-you-covered</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cisa-reveals-the-need-for-continuous-offensive-security-testing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cisas-august-advisory-why-you-need-post-compromise-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cl0p-is-back-exploiting-supply-chains-again</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/clawdbot-to-moltbot-to-openclaw-when-automation-becomes-a-digital-backdoor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cloud-security-grey-zone-who-owns-the-risk-of-managed-identities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cloud-security-insights</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/command-and-control-c2-evasion-techniques-part-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/comparing-vectra-and-verizon-threat-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/conduct-faster-context-driven-investigations-into-active-cyberattacks-with-vectra-and-chronicle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/confronting-risk-and-exposure-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/considerations-when-selecting-your-managed-security-services-provider</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/controlling-cyber-risk-in-mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/controlling-cyberattacks-with-powershell-shouldnt-mean-moving-on-without-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/could-the-f5-breach-expose-a-new-edge-security-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cpacket-networks-integration-deliver-ndr-with-fast-forensics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/crowdstrike-and-vectra-ai-bring-the-power-of-modern-security-to-fal-con-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/csv-injection-in-azure-logs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/customer-advisory-bulletin-mitigating-detecting-and-responding-to-russian-cyberactivity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cve-2025-14847-mongobleed-in-the-wild-identifying-mongodb-exposure-and-exploitation-with-network-metadata</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cve-2025-53770-a-critical-exploit-targeting-sharepoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cyberattack-detections-from-more-than-250-vectra-customers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cybereason-integration-obtain-full-visibility-and-faster-responses</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cybersecurity-2022-these-four-areas-will-evolve</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/cybersecurity-pros-share-insights-around-their-top-concerns-today</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/darkside-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/defending-against-codefinger-ransomware-in-aws-s3</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detect-and-hunt-living-off-the-land-techniques-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detect-known-and-unknown-cyberattacks-better-together-with-vectra-ndr-and-vectra-match</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detecting-cyberattacks-before-they-succeed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detecting-sliver-c2-when-advanced-beaconing-tries-to-hide-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detecting-the-out-of-the-ordinary-in-your-microsoft-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/detecting-when-ransomware-moves-into-your-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/dhs-cyber-agency-releases-advisory-on-iranian-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/do-soc-professionals-know-theyre-spending-almost-two-hours-a-day-investigating-false-positives</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/do-you-know-who-is-using-ai-as-a-service-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/does-decryption-help-you-find-advanced-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/doing-your-part-to-secure-your-microsoft-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/dridex-resurfaces-to-open-the-door-to-credential-theft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/dynamic-groups-taking-the-manual-management-out-of-group-management-on-the-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/easily-track-expiring-certificates-in-cognito-recall</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/edr-isnt-enough-why-forward-thinking-cisos-are-turning-to-network-identity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/encrypted-command-and-control-can-you-really-cover-your-tracks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/erase-the-unknowns-transform-the-soc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/evaluating-ndr-alternatives-why-every-modern-soc-needs-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/expanding-the-r-in-ndr-account-lockdown</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/expanding-vectra-lockdown-capabilities-with-defender-atp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/expertise-that-unlocks-the-potential-within-your-security-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/extend-vectra-threat-detection-to-xen-based-ec2-workloads</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/fal-con-2024-recap-enforcing-cyber-resiliency-through-proactive-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/fast-growth-requires-even-faster-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/fighting-the-ransomware-pandemic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/finding-clarity-in-the-noise-visibility-and-ai-in-an-age-plagued-by-security-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/fireeye-breach-attack-details-how-fireeye-rapidly-responded</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/five-things-every-soc-should-know-about-todays-hybrid-cyber-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/five-ways-hybrid-attackers-find-exposure-beyond-the-endpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/five-ways-the-best-socs-stay-ahead-of-the-threat-detection-curve</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/forrester-got-it-wrong-the-flaws-of-the-network-analysis-and-visibility-nav-wave</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/forticlient-ems-zero-day-when-the-control-plane-becomes-initial-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/from-conti-to-black-basta-to-devman-the-endless-ransomware-rebrand</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/gartner-redefinition-of-ndr-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/gartner-security-and-risk-conference-chaos-meets-opportunity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/generals-without-uniforms-a-transformational-hour-for-cios-and-cisos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/get-to-know-our-mxdr-analysts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/getting-into-the-mind-of-an-attacker</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ghost-ransomware-striking-before-you-even-know-its-there</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/giving-incident-responders-deeper-context-about-what-happened</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/global-raas-dissecting-a-modern-ransomware-franchise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/gone-in-a-flash-how-vectra-tracks-and-flags-flash-usage-in-your-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/grasp-the-nist-framework-see-more-value-in-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/hacker-raises-hand-claims-t-mobile-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/have-some-empathy-for-the-defenders-dilemma-a-spiral-of-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/heartbleed-on-the-inside</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/help-over-hype-claude-mythos-project-glasswing-and-the-real-questions-cisos-want-answered</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/high-growth-with-a-human-face</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/host-id-vectra-ai-take-the-guesswork-out-of-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-ai-is-fueling-cybercrime-and-why-security-gaps-are-growing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-algorithms-learn-and-adapt</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-establish-persistence-in-hybrid-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-gain-initial-access-in-hybrid-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-move-through-hybrid-networks-after-the-initial-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-target-your-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-use-brute-ratel-brc4</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-attackers-use-shodan-fofa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-black-basta-turned-public-data-into-a-breach-playbook</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-security-experts-are-surviving-cloud-transformation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-signal-clarity-changes-everything-for-hybrid-enterprise-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-threat-actors-weaponize-ev-certificates</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-to-apply-threat-intelligence-models-to-cyber-investigations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-to-track-attackers-as-they-move-to-your-network-from-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-to-win-the-cybersecurity-battle-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-typhoon-apts-infiltrate-infrastructure-without-leaving-a-trace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-ai-and-crowdstrike-deliver-complete-context-across-endpoint-and-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-ai-connects-network-detections-to-endpoint-processes-automatically</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-ai-hybrid-ndr-enables-proactive-threat-hunting-and-outcome-driven-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-ai-scoring-helps-security-teams-focus-on-what-matters-first</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-ai-secures-the-ai-enterprise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/how-vectra-protects-users-and-data-with-expanded-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/hype-doesnt-last-great-cybersecurity-does</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/identifying-cyber-enemies</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/identity-centric-attacks-the-new-reality-for-uk-retail</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/if-a-threat-detection-catches-an-attacker-and-no-one-is-around-to-see-it-is-it-really-detected</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/if-an-identity-was-compromised-would-we-know</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/improve-siem-soar-workflows</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/improving-threat-hunting-efficiency-with-the-multi-homed-attribute</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/incident-response-and-the-need-for-speed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ineffective-security-ai-confusion-and-identity-attacks-three-themes-from-gartner-security-and-risk-summit-2023</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/insider-attacks-pose-a-serious-threat-to-critical-u-s-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/insider-threats-detection-common-indicators-prevention-strategies</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/insider-threats-from-external-events</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/insider-threats-how-security-tools-miss-them-and-why-behavioral-ai-closes-the-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/insider-threats-what-to-look-for-and-how-to-respond</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/integrating-with-microsoft-to-detect-cyberattacks-in-azure-hybrid-clouds</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-ai-assisted-search-clarity-at-the-speed-of-a-question</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-global-view-unified-soc-visibility-for-global-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-the-derf-detection-replay-framework-in-github</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-the-vectra-ai-mcp-server</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-the-vectra-ai-mcp-server-for-on-premises-qux</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/introducing-vectra-ai-threat-detection-and-response-for-azure-to-stop-hybrid-multi-cloud-attacks-fast</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/is-a-focus-on-tech-skills-for-cisos-holding-us-back-in-the-boardroom</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/is-ai-the-right-tool-to-defend-against-modern-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/kpmg-how-to-comply-to-the-digital-operational-resilience-act-dora</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/kpmg-nis2-in-a-nutshell-quickly-navigating-the-complexity-of-compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/lastpass-breach-the-pyramid-of-pain-perspective</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/lockbit-is-back-whats-new-in-version-5-0</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/lurking-in-the-shadows-top-5-lateral-spread-threat-behaviors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/machine-learning-the-cornerstone-of-network-traffic-analytics-nta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/meet-vectras-new-attack-signal-intelligence-tm-engine-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/microsoft-and-vectra-join-forces</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/microsoft-cross-tenant-synchronization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/microsoft-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/modern-attacks-better-network-protection-3-must-haves-for-finance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/molt-road-and-the-automation-of-underground-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/moltbook-and-the-illusion-of-harmless-ai-agent-communities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/more-or-less-of-the-same-at-the-gartner-security-and-risk-summit-2022</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/most-attacks-against-energy-and-utilities-occur-in-the-enterprise-it-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/mounting-pressure-in-cybersecurity-shouldnt-discourage-those-who-wear-capes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/move-fast-break-security-why-cisos-must-push-back-against-agile-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/moving-from-prevention-to-detection-with-the-soc-triad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/near-and-long-term-directions-for-adversarial-ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/needed-700-000-innovators-wanted-a-safer-and-fairer-world</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/neural-networks-and-deep-learning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/new-data-suggest-its-time-to-change-the-way-organizations-deal-with-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/new-extended-detection-and-response-xdr-capabilities-recently-added-to-the-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/new-nist-guidelines-on-zero-trust-architecture-calls-for-deeper-visibility-into-the-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/new-technologies-bring-new-risks-mcp-powered-swarm-c2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/news-alert-sentinelone-leverages-vectra-attack-signal-intelligence-to-compliment-xdr-offering</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/nine-questions-to-ask-your-ai-vendor-and-why</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/notable-insights-from-the-gartner-market-guide-for-intrusion-detection-and-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/now-playing-2024-state-of-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/office-365-threats-and-inversion-of-the-corporate-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/one-sensor-to-rule-them-all</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/one-week-after-the-colonial-pipeline-attack-more-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/openssl-security-advisory</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/operation-endgame-and-the-battle-for-initial-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/opsec-failures-how-threat-actor-mistakes-help-defenders</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/own-a-printer-own-a-network-with-point-and-print-drive-by</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/parting-the-clouds-in-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/phishing-attacks-2-0-new-kits-new-risks-new-defenses</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/plain-and-simple-you-need-detection-coverage-for-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/platform-blog</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/plays-new-tactics-bypass-traditional-defenses-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/presenting-the-2025-vectra-ai-scholars</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/pro-russia-hacktivists-are-targeting-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/prompt-control-how-context-becomes-the-command-and-control-layer-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/putting-cve-2021-1675-printnightmare-to-rest</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/qilins-2025-playbook-and-the-security-gap-it-exposes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ransomware-doesnt-discriminate-it-only-cares-about-money</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/ransomware-protection-how-to-identify-attacks-with-ndr-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/rapid-response-in-action-how-vectra-ai-thwarted-a-zero-day-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/rdp-attacks-and-the-organizations-they-target</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/red-hat-gitlab-breach-shows-why-consulting-data-is-a-goldmine-for-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/redefining-cyber-threat-detection-with-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/redefining-identity-security-for-the-expanding-identity-and-genai-threat-environment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/remediation-to-mitigation-addressing-insecure-by-design-flaws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/rethinking-your-threat-models-for-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/sanofi-uses-vectra-to-stop-cyberattack-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/scattered-lapsus-hunters-announce-they-are-going-dark-but-the-threat-remains</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/securing-cloud-deployments-with-mitre-atlas-and-cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/securing-the-ai-enterprise-how-im-thinking-about-it-as-a-ceo</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/security-automation-isnt-ai-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/security-predictions-for-2026-when-ai-scales-the-offense-defense-must-evolve</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/seeing-beneath-the-surface-what-crimson-collective-reveals-about-cloud-detection-depth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/shai-hulud-when-a-supply-chain-incident-turns-into-a-worm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/should-security-teams-be-giving-service-with-a-smile</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/simplify-threat-investigation-and-hunting-with-pre-built-queries-in-vectra-investigate</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/soc-maturity-reactive-proactive-and-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/soc-teams-address-hybrid-attacks-with-vectra-cdr-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/soc-teams-address-modern-network-attacks-globally-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/splunk-integration-a-deep-dive-into-the-adaptive-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/state-of-security-how-pros-address-daily-cloud-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/stealthy-ransomware-extortion-evolves</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/sunburst-highlights-how-current-user-access-models-allowed-worlds-largest-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/survival-guide-being-secure-at-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/tackling-todays-cybersecurity-challenges-with-vectra-mxdr-a-holistic-approach-for-hybrid-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/take-it-from-gartner-the-time-for-the-right-ndr-is-now</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/take-the-first-step-to-an-open-xdr-solution-with-vectra-ai-platform-integrations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/takeaways-from-the-xz-utils-backdoor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/taking-a-proactive-approach-evolving-from-data-protection-to-data-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/taking-down-cloud-threats-for-the-win</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/tcp-reset-does-not-stop-modern-attacks---heres-why</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/technical-analysis-barracuda-email-security-gateway</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-2025-gartner-r-magic-quadrant-tm-for-network-detection-and-response-ndr---why-vectra-ai-stands-tall</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-9-cs-of-cybersecurity-value</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-alarming-surge-in-cryptocurrency-mining-on-college-campuses</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-business-of-ransomware-is-changing-detection-and-response-needs-to-change-too</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-cutting-edge-ai-s-inevitable-rise-in-offensive-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-defenders-dilemma-a-conversation-with-sans-on-the-spiral-of-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-defenders-dilemma-the-need-for-time-tools-that-build-skills-and-expertise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-defenders-dilemma-the-need-to-be-heard</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-hidden-risk-of-not-detecting-bitcoin-mining</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-hidden-risks-of-sms-based-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-importance-of-workflow-integration-for-effective-incident-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-new-vulnerability-that-creates-a-dangerous-watering-hole-in-your-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-npm-exploit-is-the-entry-point-what-follows-is-just-as-critical</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-rise-of-machine-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-rise-of-supply-chain-driven-data-theft-in-saas-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-science-behind-visualizing-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-silent-storm-inside-salt-typhoons-massive-telco-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-sizable-risk-of-cyber-well-being-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-supply-chains-broken-link</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-truth-about-ai-in-cybersecurity-to-reveal-real-value-ask-four-questions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-two-control-points-that-will-define-the-future-of-cybersecurity-network-and-identity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-ux-of-cybersecurity-ai-designing-for-behavior-at-machine-speed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-value-of-ai-driven-network-detection-and-response-for-mssps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-value-of-ndr-use-cases-for-your-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/the-year-in-review-and-the-year-to-come</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/think-your-microsoft-environment-is-resilient-to-attacks-think-again</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/threat-investigation-the-need-for-speed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/todays-security-forecast-cloudy-with-a-chance-of-account-takeovers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/top-3-most-common-threats-accelerated-by-hybrid-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/top-5-situational-risks-for-identity-based-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/top-questions-security-teams-ask-about-copilot-for-m365-and-how-to-stop-copilot-based-attacks-dead-in-their-tracks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/tracking-passwordless-sign-in-failures-in-azure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/transitive-access-abuse-data-exfiltration-via-document-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/turning-a-webcam-into-a-backdoor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/types-of-learning-that-cybersecurity-ai-should-leverage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/uncovering-security-blind-spots-in-iaas-and-paas-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/undermining-microsoft-teams-security-by-mining-tokens</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/understand-your-environment-better-with-security-insights-from-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/unlocking-operational-efficiency-how-vectra-ai-drives-40-gains-in-soc-performance-and-391-roi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/untitled-goose-tool-takes-flight-azure-ad-and-m365-account-compromises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/using-vectra-to-detect-and-stop-maze-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-and-google-security-operations-breaking-down-security-silos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-announces-vectra-match-for-signature-based-detections</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-at-crowdstrikes-fal-con-bringing-a-true-xdr-solution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-leader-in-the-2025-gigaom-radar-report-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-named-a-leader-and-outperformer-in-the-2025-gigaom-radar-report-for-itdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-named-a-leader-in-idc-marketscape-for-worldwide-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-named-leader-in-ndr-by-soc-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-on-the-gartner-hype-cycle-for-security-operations-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-platform-and-auto-lockdown-automated-response-controls-to-shut-down-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-platform-extends-detection-and-response-capabilities-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-platform-helps-microsoft-customers-strengthen-hybrid-and-multi-cloud-defense-to-combat-non-stop-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-platform-syslog-connector-integrated-signal-to-any-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-platform-visualizes-multi-domain-modern-attacks-with-attack-graphs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-recognized-in-the-forbes-ai-50</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-scattered-spider</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-vs-darktrace-top-reasons-security-teams-prefer-vectra-ai-over-darktrace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ai-with-netography-redefining-the-soc-platform-around-modern-attack-resilience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-ais-user-centric-approach-to-delivering-advanced-attack-signal-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-and-crowdstrike-turn-the-tables-on-cyberattackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-and-nozomi-networks-safely-secure-the-it-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-and-splunk-partner-on-mission-control-for-an-out-of-this-world-launch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-detection-and-response-to-wannacry-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-fusion-extending-the-vectra-ai-platform-to-build-resilience-both-pre-and-post-compromise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-honored-with-crns-prestigious-5-star-partner-program-rating</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-is-positioned-as-the-sole-visionary-in-the-2018-gartner-magic-quadrant-for-idps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-itdr-finds-identity-attacks-that-other-tools-cant-protect-all-of-your-accounts-with-less-effort</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-offers-game-changing-amazon-security-lake-integration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-publishes-automated-response-integrations-framework-on-github</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-saas-detections-office-365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-sentinel-one</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-threat-intelligence-the-icing-on-the-cake</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-vs-darktrace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectra-will-keep-working-to-secure-the-cloud-with-the-just-announced-100-million-in-funding</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vectras-commitment-to-the-channel-is-validated-with-the-launch-of-our-new-partner-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/vendor-collaboration-in-the-cybersecurity-industry-is-essential-and-our-customers-deserve-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/volt-typhoon-lolbins-get-serious</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/we-just-made-the-vectra-ai-platform-even-better</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-400-ndr-power-users-taught-us-about-network-visibility</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-ai-can-tell-you-about-m-a-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-are-the-types-of-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-do-customers-want-from-xdr-spoiler-alert-its-not-tech</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-if-there-was-a-supply-chain-compromise-of-an-idp-like-okta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-is-a-hybrid-attack-todays-biggest-cyber-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-is-an-adaptive-security-architecture-and-why-do-you-need-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-is-hiding-in-ai-traffic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-is-network-metadata-and-why-do-i-need-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-the-stryker-incident-reveals-about-handalas-attack-playbook</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-to-know-before-reading-the-2020-gartner-market-guide-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-we-learned-from-analyzing-millions-of-alerts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/what-we-saw-in-90-days-from-4-million-microsoft-office-365-accounts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/whats-next-for-the-enterprise-after-two-genai-tidal-waves</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/when-goanywhere-lets-attackers-go-everywhere</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/when-the-defender-becomes-the-door-bluehammer-redsun-and-undefend-in-the-wild</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/when-youre-on-the-clock-vectras-got-your-lock</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/who-dares-predict-the-future-vectra-a-2023-survey</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/who-holds-accountability-for-cyberattacks-on-retail</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/whos-doing-what-on-your-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/whos-on-the-hook-when-cybersecurity-awareness-fails-the-defenders-dilemma</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-a-cdr-solution-is-non-negotiable-to-hinder-sophisticated-cloud-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-accelerated-cloud-adoption-exposes-organisations-to-security-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-cyber-resilience-is-lagging-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-did-vectra-make-the-deloitte-fast-500-for-third-year-in-a-row</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-idps-is-cumbersome-and-hampers-security-personnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-idps-lacks-the-capability-to-detect-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-its-okay-to-be-underwhelmed-by-cisco-eta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-microsegmentation-alone-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-the-nist-zero-trust-architecture-no-longer-requires-decryption</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-triage-alerts-when-ai-can-do-it-for-you</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/why-you-need-an-ndr-to-protect-your-modern-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/will-ids-ever-be-able-to-detect-intrusions-again</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/working-as-intended-the-unauditable-unmanageable-keys-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/xdr-erase-the-unknowns-with-eco-system-solutions-that-deliver-coverage-clarity-and-control</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/xz-utils-lessons-for-enterprise-security-risk-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/you-have-the-right-tools-so-why-are-attackers-still-getting-in</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/you-should-get-maad-af-about-emulating-attacks-it-goes-a-long-way</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/your-aws-has-been-breached-now-what</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/blog/zero-day-attacks-on-network-edge-devices-why-ndr-matters</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/account-takeover</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/advanced-persistent-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-governance-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-phishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-scams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ai-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/attack-surface</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/attacker-behavior</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/aws-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/backdoor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/behavioral-analytics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/behavioral-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/botnet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cobalt-strike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/command-and-control</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/credential-theft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cross-site-request-forgery</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ctem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cve</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cyber-kill-chain</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cyberattack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cyberattack-techniques</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cybersecurity-metrics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cybersecurity-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/cyberthreat-actor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/diamond-model-of-intrusion-analysis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/double-extortion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/edr-evasion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/edr-vs-xdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/endpoint-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/exfiltration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/exploit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/fileless-malware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/financial-services-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/genai-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/healthcare-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/hybrid-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/hybrid-cloud-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/identity-analytics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/identity-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/incident-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/incident-response-automation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/indicator-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/insider-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/intrusion-detection-prevention-system</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/iot-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/kerberoasting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/living-off-the-land</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/malware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/managed-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/metadata</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/metasploit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/mimikatz</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/mishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/mitre-atlas</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/mitre-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/mitre-d3fend</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/modern-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ndr-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ndr-vs-edr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ndr-vs-xdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/network-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/network-traffic-analysis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/opsec</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/phishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/pyramid-of-pain</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ransomware-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/ransomware-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/reconnaissance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/security-hacker</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/seo-poisoning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/server-side-request-forgery</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/siem-vs-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/smishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/soc-analyst</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/soc-automation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/soc-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/soc-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/soc-triad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/spoofing-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/sql-injection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/threat-detection-investigation-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/user-and-entity-behavior-analytics-ueba</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vectra-detect</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vectra-recall</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/whaling-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/zero-day</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/topics/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/carbon-black</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/check-point</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/cpacket</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/crowdstrike-falcon-nextgensiem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/cybereason</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/demisto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/elastic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/endace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/fireeye</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/fortinet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/fortinet-nac</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/gigamon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/google-secops-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/ibm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/juniper-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/keysight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/kvm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/micro-focus-arcsight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/microsoft-azure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/microsoft-azure-sentinel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/microsoft-defender-for-endpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/microsoft-hyper-v</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/nutanix</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/palo-alto-networks-cortex-xsoar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/sentinel-one</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/servicenow</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/splunk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/splunk-phantom</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/superna</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/swimlane</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/vmware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/vmware-carbon-black</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/partners/technology-partners/zscaler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/learning/ai-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/learning/control-plane</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/learning/power-automate</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-best-ai-cybersecurity-tools-october-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-best-ai-security-tools-for-2024-next-gen-cyber-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-companies-powering-fintech-with-artificial-intelligence-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-cybersecurity-companies-making-moves-at-rsac-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-cybersecurity-companies-making-moves-january-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-hot-security-tools-unveiled-at-black-hat-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/10-tips-for-better-security-data-management</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/100-top-ai-companies-trendsetting-in-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/140-cybersecurity-predictions-from-industry-experts-for-2026</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/150-top-ai-companies-of-2024-visionaries-driving-the-ai-revolution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/2024s-top-chief-revenue-officers-to-follow</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/2025-cybersecurity-predictions-ai-in-the-spotlight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/2025-sc-awards-finalists-best-threat-detection-technology</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/237---fwd-cloudsec-videos-llm-bugfinders-burp-suite-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/43-identity-access-management-and-security-predictions-from-industry-experts-for-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/5-certifications-that-can-boost-a-cybersecurity-leaders-career</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/7-things-that-need-to-happen-to-make-genai-useful-to-business</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/a-new-identity-iam-firms-double-down-on-agentic-risk-and-cost</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/agentic-ai-a-deep-dive-into-the-future-of-automation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/agentic-ais-scary-security-risks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-and-cyber-security-tug-of-war-between-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-can-handle-tasks-twice-as-complex-every-few-months-what-does-this-exponential-growth-mean-for-how-we-use-it</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-companies-with-a-winning-hand-the-2024-crn-ai-100</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-drives-cloud-growth-and-cloud-growth-drives-earnings-upside----for-some</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-powered-cybersecurity-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-security-map-linking-ai-vulnerabilities-to-real-world-impact</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-the-future-belongs-to-professionals-who-master-technical-and-business-skills</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-use-cases-are-going-to-get-even-bigger-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ai-vs-blockchain-how-ai-is-undermining-blockchain-security-and-investment-value</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ais-effect-on-threat-detection-and-response-live-panel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ais-role-in-cybersecurity-from-edr-evolution-to-generative-ai-threats-and-supply-chain-risks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ais-role-in-cybersecurity-opportunity-or-emerging-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/aitech-interview-with-mark-wojtasiak-vp-of-product-research-and-strategy-at-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/aitech-interview-with-snehal-patel-chief-product-officer-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/an-ally-for-organizations-navigating-the-complex-cyber-terrain</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/as-regulators-escalate-oversight-who-are-the-ai-heroes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/behavioral-analytics-in-cybersecurity-who-benefits-most</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/best-ai-security-tools-top-solutions-features-comparisons</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/black-hat-2024-hybrid-enterprise-means-a-large-single-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/black-hat-2024-why-knowing-your-users-is-the-ultimate-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/black-hat-usa-2024---summary-of-vendor-announcements</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/black-hat-usa-2025-summary-of-vendor-announcements-part-4</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/black-hat-usa-check-point-contrast-security-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/buried-in-alerts-three-reasons-legacy-threat-detection-and-response-tools-are-failing-soc-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/celebrating-identity-management-day-2024-experts-weigh-in</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/chief-ai-officer-a-necessity-for-companies-or-an-expensive-impediment-94yt2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cio-interview-featuring-arpan-sarkar-senior-security-engineer-at-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/closing-the-gaps-vectra-ai-and-zscaler-team-up-to-see-what-sase-misses</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/collaboration-needed-to-fight-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cryptographic-ransomware-encryption-detection-survey-detection-of-encryption</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cyber-insights-2025-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cybersecurity-awareness-month-2024-listen-to-the-industry-experts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cybersecurity-m-a-roundup-45-deals-announced-in-october-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cybersecurity-professionals-are-turning-to-ai-as-more-lose-control-of-detection-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cybersecurity-s-next-chapter-how-attackers-defenders-and-ai-will-evolve</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/cybersecurity-trends-and-predictions-2025-from-industry-insiders-part-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-compromise-likely-with-google-cloud-document-ai-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-compromise-likely-with-google-cloud-document-ai-vulnerability-c6f51</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-privacy-day-2024-the-definitive-roundup-of-expert-quotes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-privacy-week-2024-cybersecurity-experts-share-security-tips</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-privacy-week-2024-the-definitive-roundup-of-expert-quotes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/data-privacy-week-2026-key-insights-from-40-experts-in-the-field</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/empowering-the-soc-stop-detecting-potential-threats-start-signaling-real-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/enterprise-strategy-group-and-vectra-ai-report-reveals-hybrid-network-visibility-as-the-key-to-modern-attack-resilience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-and-vectra-ai-announce-partnership-and-platform-integration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-and-vectra-ai-collaborate-to-spur-threat-detection-and-refine-security-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-and-vectra-ai-integrate-platforms-to-boost-threat-detection-and-unify-security-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-and-vectra-ai-partner-on-threat-detection-secops</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-and-vectra-ai-partner-to-improve-threat-detection-and-cloud-visibility</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-partners-with-vectra-ai-for-enhanced-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-vectra-ai-partner-to-tackle-cloud-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exabeam-vectra-ai-unite-to-boost-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/exclusive-networks-teams-up-with-mimecast-for-au-expansion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/former-google-cloud-leader-joins-ai-security-startup</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/getting-ai-right-for-security-5-principles</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/global-ai-treaty-sparks-debate-on-innovation-vs-regulation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/google-cloud-document-ai-flaw-still-allows-data-theft-despite-bounty-payout</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/google-clouds-cybersecurity-vp-leaves-for-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/hacker-heroes-aaron-turner-psw-vault</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/heard-on-the-street-3-14-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/hitesh-sheth-builds-vectra-ai-to-detect-network-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/hitesh-sheth-of-vectra-ai-on-pushing-the-boundaries-of-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/hitesh-sheth-on-ai-driven-cybersecurity-and-the-road-ahead</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/how-adobe-and-others-defend-credibility-amidst-misinformation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/how-autonomous-ai-cyberattacks-will-transform-security-experts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/how-black-basta-turned-osint-data-into-a-breach-playbook</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/how-ceos-can-build-a-healthy-relationship-with-their-board</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/how-to-choose-the-right-network-security-monitoring-product</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/identity-management-and-information-security-news-for-the-week-of-february-16-vectra-ai-directdefense-bigid-and-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/identity-management-day-2025-security-experts-share-insights-on-evolving-digital-identity-landscape</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/identity-management-day-quotes-from-industry-experts-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/in-the-wake-of-breaches-how-and-why-cloud-security-must-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/infosec-products-of-the-month-november-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/inside-the-mind-of-a-cybersecurity-maestro-oliver-tavakolis-journey-from-mainframes-to-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/is-genai-leaving-two-thirds-of-security-teams-behind</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-ndr-topshare-it-trend-expo-spring-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-new-cro-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-vectra-ai-acquires-netography-to-expand-its-ai-driven-cybersecurity-platform-with-pioneering-cloud-native-network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-vectra-ai-amazon-amazon-bedrock-gen-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-vectra-ai-apj-svp-gm-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-vectra-ai-gartner-ndr-mq-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/jp-vectra-ai-google-security-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/key-takeaways-gartner-magic-quadrant-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/lw-roundtable----how-2024s-cyber-threats-will-transform-the-security-landscape-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/lw-roundtable-compliance-pressures-intensify-as-new-cybersecurity-standards-take-hold</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/lw-roundtable-lessons-learned-from-the-headline-grabbing-cybersecurity-incidents-of-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/lw-roundtable-predictive-analytics-full-stack-visualization-to-solidify-cyber-defenses-in-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mckinsey-nextrend-report-5-cybersecurity-startups-that-cfos-love</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mechanics-of-the-future-meet-the-specialists-assembling-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/meta-google-and-other-social-media-companies-brace-for-heightened-deepfake-perils-ahead-of-2024-elections</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/microsoft-injects-ai-agents-into-security-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/microsoft-is-taking-the-load-off-of-cybersecurity-teams-with-the-help-of-new-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mssp-market-news-kyndryl-veeam-searchlight-cyber-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mssp-market-news-nuharbor-directdefense-skyhigh</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mssp-market-news-survey-shows-62-of-soc-alerts-are-ignored</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/mssp-market-news-vectra-ai-unveils-clarity-program-for-mssps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/new-infosec-products-of-the-month-january-2026</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/new-infosec-products-of-the-week-january-23-2026</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/new-infosec-products-of-the-week-november-15-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/new-platform-guards-against-the-risks-of-enterprise-ai-adoption</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/newsweek-excellence-index-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/only-49-of-companies-to-increase-cyber-budget-after-a-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/people-moves</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/people-moves-67b1a</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/people-on-the-move</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/people-on-the-move-week-of-july-1-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/ransomware-evolution-codefinger-targets-amazon-s3-buckets-in-groundbreaking-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/research-reveals-growing-distrust-for-threat-detection-tools-as-soc-teams-struggle-to-identify-real-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/research-reveals-growing-distrust-for-threat-detection-tools-as-soc-teams-struggle-to-identify-real-attacks-e37d5</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/restoring-soc-team-confidence-amid-waves-of-false-positives</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rise-of-compromised-llms-sohrob-kazerounian-asw-340</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsa-conference-2024---announcements-summary-day-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsa-conference-2025-announcement-summary-day-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsa-conference-playbook-smart-strategies-from-seasoned-attendees</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsac-2024-how-ai-is-changing-extended-detection-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsac-2024-how-ai-is-changing-extended-detection-response-0b83c</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsac-2025-why-the-ai-agent-era-means-more-demand-for-ciso</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/rsac-2025-why-the-ai-agent-era-means-more-demand-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/sc-awards-2026-finalist</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/scary-security-stats-roundup-from-2024-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/security-flaw-in-google-cloud-document-ai-could-expose-sensitive-data-experts-warn</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/security-teams-keen-to-adopt-ai-but-still-struggling-to-prioritize-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/smarter-detection-fewer-gaps-rethinking-security-at-the-edge</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/smbs-know-theyre-at-risk-but-most-arent-embracing-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/soc-teams-are-frustrated-with-their-security-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/soc-teams-overwhelmed-ignore-most-alerts</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/soc-teams-threat-detection-tools-are-stifling-us</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/stopping-modern-attacks-with-behavioral-analytics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/study-socs-struggle-with-tool-overload-and-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-20-coolest-network-security-companies-of-2025-the-security-100</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-20-hottest-ai-cybersecurity-companies-the-2024-crn-ai-100</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-launch-of-the-vectra-ai-clarity-program-for-mssps-meets-demand-for-top-tier-comprehensive-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-path-to-better-cybersecurity-isnt-more-data-its-less-noise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-rise-of-compromised-llm-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-rise-of-deepfakes-means-ceos-need-to-rethink-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-top-25-cybersecurity-executives-for-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/the-top-7-network-detection-and-response-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/thn-cybersecurity-recap-last-weeks-top-threats-and-trends</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-10-cybersecurity-companies-to-watch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-5-cybersecurity-companies-making-waves-at-rsac-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-6-cybersecurity-and-ai-predictions-for-2026</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-6-ids-ips-tools----plus-4-open-source-alternatives</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-ai-companies-in-2025-visionaries-driving-the-ai-revolution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-cybersecurity-ai-tools-revolutionizing-digital-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-cybersecurity-product-news-of-the-week</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/top-edr-xdr-tools-to-know-in-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/transforming-cybersecurity-with-ai-innovations-with-vectra-ais-jeff-reed</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/understanding-the-intersection-of-observability-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/unpacking-xdr-business-applications---chris-thomas-oliver-tavakoli---asw-286</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/unpacking-xdr-coverage-stitching-aggregation---and-the-genai-wildcard---oliver-tavakoli---rsa24-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-2025-predictions-ai-and-cybersecurity-in-the-new-year---the-evolving-role-of-ai-in-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-acquires-netography-to-boost-cloud-native-network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-acquires-netography-to-expand-its-ai-driven-cybersecurity-platform-with-pioneering-cloud-native-network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-adds-ai-powered-detections-to-help-secure-microsoft-customers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-analyst-assists-alert-fatigued-security-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-analyst-now-key-resource-in-aws-marketplace-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-gigamon-announce-new-oem-partnership-to-reduce-cybersecurity-risk-for-large-enterprise-organizations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-gigamon-announce-partnership-to-enhance-hybrid-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-gigamon-forge-oem-partnership-to-enhance-cybersecurity-for-large-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-lumifi-collaborate-to-strengthen-premium-security-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-lumifi-forge-strategic-mssp-partnership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-and-lumifi-forge-strategic-mssp-partnership-to-strengthen-premium-security-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-announced-findings-from-its-new-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-announced-the-expansion-of-its-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-announces-agentic-solutions-crowdstrike-deal</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-announces-major-advancements-in-its-suite-of-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-briefing-report-for-ndr-xdr-anomalies-dont-always-mean-incidents</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-broadens-its-ai-agents-to-bolster-cybersecurity-for-customers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-capabilities-in-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-ceo-discusses-og-ai-in-cybersecurity-at-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-clarity-program-for-mssps-meets-demand-for-top-tier-comprehensive-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-completes-groundbreaking-agent-portfolio-setting-new-standard-in-agentic-ai-for-enhanced-threat-detection-and-security-team-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-completes-groundbreaking-agent-portfolio-setting-new-standard-in-agentic-ai-for-enhanced-threat-detection-and-security-team-efficiency-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-delivers-holistic-proactive-security-posture-management-for-actively-changing-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-exec-on-growth-ai-impact-on-security-market</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-crowdstrike-partnership-to-launch-offering-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-its-ai-platform-to-combat-genai-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-leadership-in-hybrid-and-multi-cloud-defense-with-advanced-ai-platform-for-microsoft-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-partnership-with-crowdstrike-to-launch-offering-for-smb-and-midmarket-security-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-platform-to-enhance-soc-teams-proactive-defense-against-hybrid-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-xdr-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-xdr-platform-to-deliver-a-real-time-view-of-active-posture-to-monitor-exposure-to-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-expands-xdr-platform-to-deliver-a-real-time-view-of-active-posture-to-monitor-exposure-to-attackers-2ed88</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-focuses-on-proactive-security-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-helps-organizations-prevent-ai-powered-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-24x7-open-mxdr-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-clarity-program-for-mssps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-global-24x7-open-mxdr-service-built-to-defend-against-hybrid-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-mssp-program-strengthens-channel-only-focus</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-platform-to-protect-businesses-from-new-attack-vectors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-scholarship-program-to-foster-the-next-generation-of-cyber-talent</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-launches-the-industrys-first-global-24x7-open-mxdr-service-built-to-defend-against-hybrid-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-lumifi-forge-strategic-mssp-partnership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-lumifi-partner-to-enhance-xdr-security-and-soc-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-named-leader-in-2024-idc-marketscape-for-ndr-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-named-leader-in-2024-spark-matrix-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-named-leader-in-gigaom-radar-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-platform-enhancements-combat-genai-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-redefines-hybrid-resilience-across-the-attack-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-research-reveals-growing-distrust-for-threat-detection-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-scholarship-program-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-strengthens-executive-leadership-with-the-appointment-of-a-new-cfo-to-drive-profitable-growth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-strengthens-hybrid-detection-defense-with-crowdstrike-falcon-next-gen-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-strengthens-hybrid-detection-defense-with-crowdstrike-falcon-next-gen-siem-06d9b</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-strengthens-its-dominance-in-hybrid-and-multi-cloud-defense-with-the-most-comprehensive-ai-platform-to-combat-nonstop-cyber-attacks-on-microsoft-customers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-targets-hybrid-attack-gaps-with-unified-control-framework</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-unifies-threat-visibility-across-microsoft-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-updates-ai-agents-portfolio</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-warns-of-google-cloud-document-ai-vulnerability-allowing-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-xdr-platform-now-offers-real-time-attack-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-zscaler-expand-integration-deal</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ai-zscaler-team-up-to-boost-sase-traffic-visibility</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vectra-ceo-socs-need-ai-agents-to-keep-up-with-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/vibe-coding-when-everyone-s-a-developer-who-secures-the-code</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/westcon-comstor-and-vectra-ai-drive-mssp-and-aws-marketplace-growth-for-channel-partners</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/what-ai-can-tell-organizations-about-their-m-a-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/what-is-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/what-is-network-detection-and-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/what-role-does-artificial-intelligence-play-within-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/white-house-urges-switching-to-memory-safe-languages</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/why-2025-could-be-the-most-disruptive-year-for-ceos-in-decades</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/why-cyber-tools-fail-soc-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/why-genai-requires-a-heightened-focus-on-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/working-as-intended-the-unauditable-unmanageable-keys-in-google-cloud-by-kat-traxler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/media-coverage/zscaler-vectra-ai-expand-cloud-cybersecurity-partnership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/2019-gartner-market-guide-for-idps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/2019-healthcare-spotlight-report</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/access42-partners-with-vectra-to-enable-dutch-enterprises-to-expose-hidden-cyberattacks-faster-using-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/account-lockdown</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/anthony-collins</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/apac-annoucement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/ardagh-group-selects-vectra-ai-to-accelerate-threat-detection-and-investigation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/as-the-war-in-ukraine-spirals-vectra-ai-announces-free-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/australian-telco-superloop-chooses-vectra-ai-and-baidam-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/barry-university-stops-cyber-attack-in-progress-with-vectra-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/bolton-nhs-foundation-trust-selects-vectra-to-automate-threat-detection-and-expose-hidden-attackers-inside-its-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/businesses-grapple-with-stagnant-budgets-to-combat-rising-insider-security-threats-new-research-reveals</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/churches-of-christ-in-queensland-boosts-network-cybersecurity-with-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/cognito-from-vectra-is-named-overall-threat-detection-solution-of-the-year-by-cybersecurity-breakthrough-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/cognito-platform-from-vectra-wins-the-2019-fortress-cyber-security-award-for-incident-response-software-and-applications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/cognito-stream-release</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/curtiss-wright-collaborates-with-vectra-ai-to-bring-ai-ml-threat-detection-to-natsec-cyber-tactical-edge-communications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/de-vectra-ai-befordert-taj-el-khayat-zum-vp-emea-partner-sales-and-alliances</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/de-vectra-ai-starkt-hybrid-multi-cloud-abwehr-mit-ki-fur-microsoft-kunden</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/demisto-and-vectra-reduce-the-time-to-detect-and-respond-to-hidden-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/detect-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/dz-bank-news-release</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/ed-f-man</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/enterprise-management-associates-names-vectra-a-value-leader-and-technology-innovator-in-radar-report-for-network-based-security-analytics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/enterprise-strategy-group-and-vectra-ai-report-reveals-hybrid-network-visibility-as-the-key-to-modern-attack-resilience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/first-edition-of-the-post-breach-industry-report-reveals-what-attackers-do-once-bypassing-perimeter-defenses</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/fr-les-cinq-predictions-de-vectra-ai-sur-lia-et-la-cybersecurite-en-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/fr-vectra-ai-etend-sa-plateforme-dia-pour-lutter-contre-les-attaques-genai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/fr-vectra-ai-plateforme-cyberdefense-utilisateurs-microsoft-hybride-multi-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/fr-vectra-ai-programme-clarity-evolutif-mssp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/fr-vectra-ai-renforce-sa-direction-avec-la-nomination-dun-nouveau-cfo-pour-stimuler-la-rentabilite-de-lentreprise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/gartner-positions-vectra-networks-as-the-only-visionary-in-the-2018-magic-quadrant-for-intrusion-detection-and-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/global-survey-finds-71-of-cloud-users-suffered-up-to-seven-malicious-account-takeovers-in-last-year</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/iaas-paas-security-survey</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/interdata-partners-with-vectra-to-enable-french-enterprises-to-expose-cyberattacks-faster-using-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jeff-reed-as-chief-product-officer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-2024-state-of-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-announcing-the-industrys-first-ai-driven-fully-integrated-hybrid-cyber-attack-xdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-entetsu-group-adopt-vectra-ai-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-gartner-peers-insghts-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-it-trend-expo-2025-spring</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-itr-report-2023</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-japan-partner-award-japan-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-partnership-with-lac</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-acquires-netography-to-expand-its-ai-driven-cybersecurity-platform-with-pioneering-cloud-native-network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-advances-network-observability-with-proactive-exposure-management-built-for-ai-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-appoints-derek-phillips-as-chief-revenue-officer-to-accelerate-global-growth-and-strengthen-go-to-market-alignment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-appoints-new-vice-president-and-general-manager-for-asia-pacific-japan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-idc-report-marketscape-worldwide-ndr-leader-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-japan-itr-report-number1-ndr-marketing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-launches-next-generation-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-launches-scholarship-program-to-foster-the-next-generation-of-talent-in-ai-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-launches-the-industrys-first-global-24x7-open-mxdr-service-built-to-defend-against-hybrid-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-named-a-leader-in-the-first-ever-gartner-r-magic-quadrant-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-pioneers-a-new-era-of-continuous-control-across-the-hybrid-attack-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/jp-vectra-ai-protect-microsoft-attack-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/kpmg-and-vectra-ai-join-forces-to-reduce-cyber-risk-for-hybrid-cloud-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/metna</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/most-comprehensive-ai-platform-to-combat-nonstop-cyber-attacks-on-microsoft-customers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/new-post-intrusion-report-shows-surge-in-indicators-of-cyber-attackers-spreading-throughout-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/new-vectra-ai-research-finds-cyber-resilience-lagging-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/o365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/paa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/pressemitteilung-sva-und-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/randy-schirman-and-bonnie-simmons-of-vectra-ai-named-to-the-2024-crn-channel-chiefs-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/randy-schirman-and-bonnie-simmons-of-vectra-honored-as-a-2023-crn-channel-chiefs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/report-cryptocurrency-mining-runs-rampant-in-higher-education</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/report-cyberattackers-use-hidden-tunnels-to-spy-on-and-steal-from-financial-services-firms</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/report-cyberattacks-against-energy-and-utilities-industry-increasing-inside-enterprise-it-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/report-manufacturing-industry-is-at-risk-of-increased-cyberattacks-due-to-industrial-iot-devices-and-industry-40-initiatives-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/report-surge-in-attacker-access-to-privileged-accounts-and-services-puts-businesses-at-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/research-reveals-growing-distrust-for-threat-detection-tools-as-soc-teams-struggle-to-identify-real-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/research-reveals-significant-disconnect-between-security-operations-teams-and-the-effectiveness-of-threat-detection-tools-in-preventing-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/sans-institute-reveals-that-automated-threat-detection-helps-fulfill-protection-goals-of-critical-security-controls</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/santa-clara-university-leverages-vectra-networks-to-protect-against-advanced-persistent-threats-and-malware-on-campus-network</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/scott-collins-joins-vectra-as-director-of-north-america-channels</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/second-annual-byod-and-mobile-security-study-reveals-exploits-entering-organizations-via-mobile-devices-is-a-top-byod-security-concern-in-2014</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/securelink-partners-with-vectra-ai-to-power-real-time-detection-of-stealthy-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/shop-direct-automates-cyberattack-detection-with-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/sinet-names-vectra-networks-a-top-emerging-cybersecurity-company-in-2015</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/spotlight-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/tesorion-names-vectra-as-strategic-partner-for-advanced-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/texas-aandm-university-system-saves-7-million-in-one-year-with-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/the-launch-of-the-vectra-ai-clarity-program-for-mssps-meets-demand-for-top-tier-comprehensive-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/ticketmasters-vice-president-of-information-security-to-deliver-session-on-use-of-artificial-intelligence-to-automate-threat-hunting-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/top-10-detections</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-achieves-soc2-type2-compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-acquires-siriux-security-technologies</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-advances-security-ai-to-deliver-groundbreaking-attack-signal-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-acquires-netography-to-expand-its-ai-driven-cybersecurity-platform-with-pioneering-cloud-native-network-observability</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-adds-advanced-hybrid-attack-detection-investigation-and-response-capabilities-for-amazon-web-services-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-adds-myrna-soto-and-david-reilly-to-its-board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-advances-network-observability-with-proactive-exposure-management-built-for-ai-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-amazon-uebu-sabisu-aws-xiang-kenigao-du-nahaiburitudogong-ji-nojian-zhi-diao-cha-dui-ying-ji-neng-wozhui-jia</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-analyst-is-now-available-in-the-new-aws-marketplace-ai-agents-and-tools-category</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-bechtle-ag-expand-channel-partnership-to-strengthen-cybersecurity-offerings</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-gigamon-announce-new-oem-partnership-to-reduce-cybersecurity-risk-for-large-enterprise-organizations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-lumifi-forge-strategic-mssp-partnership-to-strengthen-premium-security-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-neutron-engineering-launch-state-of-the-art-security-operations-center-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-sans-institute-to-host-think-like-a-hybrid-attacker-solutions-forum-2023</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-starhub-launch-ai-powered-threat-detection-for-enterprises-in-singapore</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-and-zscaler-expand-their-alliance-to-unlock-unprecedented-visibility-into-sase-traffic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-announces-integration-with-chronicles-security-analytics-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-announces-new-genai-solutions-on-aws-powered-by-amazon-bedrock</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-announces-winners-of-inaugural-ai-scholars-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-chad-reese-as-senior-vice-president-global-channel-chief-to-accelerate-partner-led-growth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-derek-phillips-as-chief-revenue-officer-to-accelerate-global-growth-and-strengthen-go-to-market-alignment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-iitd-as-distributor-for-cis-and-ukraine-to-expand-access-to-ai-driven-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-new-vice-president-and-general-manager-for-asia-pacific-japan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-scott-dussault-as-chief-financial-officer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-appoints-taj-el-khayat-as-vp-emea-partner-sales-and-alliances-to-drive-growth-in-region</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-approved-for-us-navy-dadms</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-based-cybersecurity-solution-integrates-with-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-bolsters-executive-team-with-new-strategic-advisor-myrna-soto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-celebrates-inc-5000-debut-as-one-of-americas-fastest-growing-companies</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-completes-groundbreaking-agent-portfolio-setting-new-standard-in-agentic-ai-for-enhanced-threat-detection-and-security-team-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-demonstrates-how-iot-device-vulnerabilities-enable-hidden-backdoors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-discovers-high-severity-internet-explorer-11-zero-day-following-hacking-team-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-empowers-organizations-to-stop-the-ransomware-pandemic-with-real-time-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-empowers-partners-with-unified-microsoft-security-through-new-vectra-ai-shield-solution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-expands-its-ai-platform-to-combat-genai-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-expands-partnership-with-crowdstrike-to-launch-offering-for-smb-and-midmarket-security-teams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-expands-xdr-platform-to-deliver-a-real-time-view-of-active-posture-to-monitor-exposure-to-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-honored-with-5-star-rating-crn-2022</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-honors-its-channel-champions-in-inaugural-metna-partner-awards-ceremony</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-honors-partner-community-with-2022-partner-of-the-year-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-honors-partner-community-with-2023-partner-of-the-year-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-introduces-its-mcp-server-to-deliver-threat-investigations-via-ai-assistants</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-is-the-only-vendor-named-a-leader-and-outperformer-in-both-gigaom-radar-reports-for-identity-and-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-joins-microsoft-intelligent-security-association</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-launches-next-generation-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-launches-scholarship-program-to-foster-the-next-generation-of-talent-in-ai-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-launches-the-industrys-first-global-24x7-open-mxdr-service-built-to-defend-against-hybrid-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-a-leader-and-outperformer-in-the-gigaom-radar-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-a-leader-in-2024-idc-marketscape-for-worldwide-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-a-leader-in-the-first-ever-gartner-r-magic-quadrant-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-as-the-customers-choice-in-the-2024-gartner-peer-insights-voice-of-the-customer-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-to-crns-2024-security-100-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-named-winner-of-two-sc-awards-for-excellence-in-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-now-available-in-the-microsoft-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-opens-new-office-in-bangalore-india-as-next-phase-of-global-expansion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-partners-with-microsoft-on-zero-trust-security-framework</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-pioneers-a-new-era-of-continuous-control-across-the-hybrid-attack-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-platform-now-available-for-purchase-on-the-crowdstrike-marketplace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-raises-130-million-led-by-blackstone-growth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-recognized-as-a-microsoft-security-excellence-awards-finalist-for-security-customer-champion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-recognized-as-a-microsoft-security-excellence-awards-finalist-for-security-isv-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-recognized-as-a-microsoft-security-excellence-awards-winner-for-security-customer-champion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-recognized-on-the-first-ever-crn-ai-100-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-shores-up-its-partner-ecosystem-with-orca-tech-appointment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-strenghtens-hybrid-detection-defense-with-crowdstrike-falcon-next-gen-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-strengthens-executive-leadership-with-the-appointment-of-a-new-cfo-to-drive-profitable-growth</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-strengthens-leadership-team-with-new-chief-marketing-officer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-turns-nasdaq-entrepreneurial-center-into-ai-cybersecurity-hub-during-rsa-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-ai-wins-best-behaviour-analytics-enterprise-threat-detection-at-2022-sc-media-awards-europe</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-and-nec-asia-pacific-announce-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-and-zscaler-enable-zero-trust-access-visibility-into-business-critical-applications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-104-growth-in-annual-recurring-revenue-during-2018</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-138-growth-in-new-annual-recurring-revenue-during-the-first-half-of-2018-ai-platform-expansion-and-key-cybersecurity-partnership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-distributor-agreement-with-truvisor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-keith-wilkinson-as-its-new-vp-for-uki-to-drive-growth-and-strategy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-new-vp-of-sales-for-americas-to-drive-growth-and-customer-success</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-record-breaking-year-with-181-revenue-growth-enhancements-to-ai-platform-and-industry-recognition</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-announces-two-new-appointments-to-strengthen-emea-leadership</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-david-sajoto-as-vice-president-of-apj-region</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-garry-veale-as-regional-director-for-the-united-kingdom-and-ireland</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-jerome-jullien-as-vice-president-of-international-partner-sales</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-marc-gemassmer-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-taj-el-khayat-as-managing-director-for-growth-markets</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-willem-hendrickx-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-appoints-willem-hendrickx-vp-international-sales</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-aws-vpc-ingress-routing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-becomes-aws-security-competency-partner</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-chosen-as-a-2018-red-herring-top-100-north-america-winner</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-closes-strongest-quarter-in-company-history</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-cognito-now-available-in-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-cognito-now-available-in-the-microsoft-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-cognito-platform-and-chief-technology-officer-oliver-tavakoli-named-winners-in-the-2019-artificial-intelligence-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-cognito-platform-now-available-for-the-department-of-homeland-security-continuous-diagnostics-and-mitigation-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-collaborates-with-vmware-to-deliver-visibility-into-hidden-cyber-attacker-behaviors-throughout-virtualized-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-drives-strong-revenue-growth-and-momentum-across-asia-pacific-and-japan-in-first-half-of-2022</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-global-footprint-through-enriched-channel-partner-program-training-and-growth-into-commercial-market</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-integration-ecosystem-to-provide-100-visibility-and-automated-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-intelligent-cyberattack-detection-and-response-capabilities-with-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-intelligent-response-capabilities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-expands-leadership-team</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-extends-cloud-identity-detection-capabilities-with-microsoft-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-extends-support-for-amazon-security-lake</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-featured-on-crns-2023-security-100-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-honored-as-gold-winner-for-integrated-security-software-innovations-in-the-ninth-annual-2017-golden-bridge-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-honored-as-winner-of-three-cyber-defense-magazine-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-honored-as-winner-of-three-gold-awards-at-the-fifth-annual-2018-globee-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-honored-with-a-5-star-rating-in-the-2021-crn-partner-program-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-honours-uk-cyberdefense-partners-with-partner-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-integrates-network-threat-detection-and-response-for-microsoft-security-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-introduces-cognito-recall-to-deliver-ai-assisted-threat-hunting-and-enable-conclusive-incident-investigations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-is-honored-as-the-grand-trophy-winner-at-the-2018-golden-bridge-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-is-ranked-the-116th-fastest-growing-company-in-north-america-on-deloitte-s-2018-technology-fast-500</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-is-recognized-on-the-crn-2018-security-100-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-is-recognized-with-the-frost-and-sullivan-visionary-innovation-leadership-award-for-iot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-issued-five-us-patents-for-artificial-intelligence-that-automates-the-hunt-for-cyber-attacker-behaviors</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-joins-the-cloud-security-alliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-launches-new-advisory-and-operational-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-named-a-2018-tag-cyber-distinguished-vendor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-named-a-representative-vendor-in-the-inaugural-gartner-market-guide-for-network-traffic-analysis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-named-to-the-2019-cb-insights-ai-100-list-of-most-innovative-artificial-intelligence-startups</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-named-winner-of-the-coveted-infosec-awards-during-rsa-conference-2020</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-achieves-fips-140-2-encryption-validation-to-meet-federal-requirements</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-appoints-security-industry-executive-kevin-moore-to-lead-worldwide-sales</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-ceo-invited-to-participate-in-white-house-summit-on-cybersecurity-and-consumer-protection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-closes-landmark-year-with-record-sales-growth-large-customer-wins-and-continuous-recognition-in-2015</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-continues-to-gain-traction-in-higher-education-market-by-delivering-advanced-threat-protection-for-mobile-campus-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-delivers-industry-s-first-solution-to-fully-protect-distributed-enterprise-blind-spots-from-persistent-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-detects-previously-unseen-cyber-attacks-in-public-clouds-using-the-gigamon-visibility-platform-on-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-discovers-critical-microsoft-windows-vulnerability-that-allows-printer-watering-hole-attacks-to-spread-malware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-earns-computer-technology-review-mvp-award-for-protecting-networks-from-threats-malware-and-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-earns-three-global-excellence-awards-at-rsa-conference-honored-for-delivering-the-best-innovation-in-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-expands-into-emea</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-honored-as-cutting-edge-and-editor-s-choice-winner-in-annual-cyber-defense-magazine-infosecurity-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-honored-as-gold-winner-in-7th-annual-golden-bridge-awards-for-leading-advanced-persistent-threat-defense-system</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-honored-as-network-security-cutting-edge-award-winner-in-3rd-annual-2015-cyber-defense-magazine-awards-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-honored-with-multiple-stevie-awards-in-2015-american-business-awards-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-identifies-healthcare-as-the-industry-most-targeted-by-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-launches-new-global-channel-partner-program</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-named-a-cool-vendor-in-security-intelligence-by-gartner</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-named-as-finalist-for-multiple-awards-categories-in-2015-american-business-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-receives-highly-commended-award-for-best-behavior-analytics-enterprise-threat-detection-from-sc-magazine-uk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-receives-top-edtech-digest-2015-award-for-protecting-campus-networks-from-threats-malware-and-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-recognized-as-a-crn-2016-emerging-vendor</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-reveals-cyber-attackers-covert-encrypted-communications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-selected-as-finalist-for-rsa-conference-innovation-sandbox-contest-2015</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-selected-as-sc-magazine-2016-excellence-award-finalist</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-takes-on-backdoors-in-data-center-firewalls-planted-by-advanced-adversaries</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-to-demonstrate-real-time-detection-of-in-progress-cyber-attacks-at-gartner-security-and-risk-management-summit-next-week</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-networks-wins-best-of-black-hat-award-for-most-innovative-emerging-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-post-intrusion-report-shows-cyber-attackers-are-getting-quieter-inside-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-protect-helps-organizations-to-mitigate-risk-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-raises-100-million</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-raises-36-million-to-enable-enterprises-to-hunt-cyberattacks-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-recognized-on-crns-2019-security-100-list</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-recognized-on-crns-2019-security-100-list-again</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-research-89-of-security-leaders-think-traditional-security-approaches-are-failing-in-the-face-of-modern-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-research-attacks-using-encryption-are-breaching-70-of-organizations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-research-exposes-cybersecurity-health-crisis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-research-identifies-new-exploitable-attack-surface-within-cloud-services-and-remote-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-research-security-incident-2021</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-security-research-identifies-how-cyberattackers-use-microsoft-office-365-tools-against-organizations-to-steal-data</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-selected-as-a-2018-red-herring-top-100-global</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-strengthens-its-leadership-team-with-the-appointment-of-two-senior-executives</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-strikes-up-integration-with-microsoft-azure-to-detect-cyberattackers-in-hybrid-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-unifies-ai-driven-behavior-based-detection-and-signature-based-detection-in-a-single-solution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-unveils-global-mdr-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-unveils-winners-of-inaugural-partner-of-the-year-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-wins-four-gold-stevie-awards-at-the-2018-american-business-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-wins-overall-threat-detection-solution-of-the-year-at-cybersecurity-breakthrough-awards</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/vectra-xdr-platform-launch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/about/news/wipro-and-vectra-networks-partner-to-deliver-automated-threat-hunting-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/ethix-hotline</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/metadata-sharing-agreement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/privacy-notice</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/legal/trademarks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/automated-replication</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-cryptomining</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-ec2-enumeration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-ecr-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-lambda-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-logging-disabled</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-network-configuration-discovery</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-organization-discovery</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-ransomware-s3-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-root-credential-usage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-s3-enumeration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-security-tools-disabled</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-admin-privilege-granting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-console-pivot</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-credential-access-from-ec2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-credential-access-from-ecs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-credential-access-from-ssm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-discovery-from-ec2-instance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-escalation-reconnaissance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-external-access-granting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-login-profile-manipulation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-organization-exit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-public-ami-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-public-ebs-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-public-ec2-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-public-rds-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-public-s3-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-region-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspect-traffic-mirror-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-suspicious-credential-usage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-tor-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-user-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/aws-user-permissions-enumeration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-admin-account-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-change-to-trusted-ip-configuration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-login-from-suspicious-location</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-mfa-disabled</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-mfa-failed-suspicious-sign-on</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-new-partner-added-to-organization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-newly-created-admin-account</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-privilege-operation-anomaly</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-redundant-access-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-successful-brute-force</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspected-compromised-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspicious-access-from-cloud-provider</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspicious-device-registration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspicious-factor-registration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspicious-oauth-application</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-suspicious-sign-on</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-tor-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-ad-unusual-scripting-engine-usage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-anomalous-app-service-webjob-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-cryptomining</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-diagnostic-logging-disabled</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-managed-identity-anomaly</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-mass-resource-deletion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-privilege-anomaly-management-group-scope</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-privilege-anomaly-root-scope</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-resource-group-admin-privilege-granting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-resource-group-admin-role-unassigned</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-subscription-admin-privilege-granting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-subscription-admin-role-unassigned</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspect-app-service-deployment-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspect-credential-dump</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspect-key-vault-enumeration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspect-key-vault-privilege-granting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspect-public-storage-account-change</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-access-from-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-access-from-gcp-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-app-service-creation-or-modification</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-app-service-credential-download</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-app-service-deployment-configuration-download</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-automation-dsc-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-automation-staged</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-disk-download</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-hybrid-automation-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-hybrid-automation-test</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-hybrid-machine-extension-installation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-hybrid-machine-run-command-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-key-vault-extraction</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-policy-assignment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-policy-creation-or-modification</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-policy-remediation-task</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-serial-console-usage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-automation-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-automation-test</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-extension-installation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-run-command-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-scale-set-extension-installation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-suspicious-vm-scale-set-run-command-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/azure-tor-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/brute-force</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/cryptocurrency-mining</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/darknet-scan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/data-gathering</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/data-smuggler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/external-remote-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/file-share-enumeration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/hidden-dns-tunnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/hidden-http-tunnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/hidden-https-tunnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/icmp-tunnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/icmp-tunnel-client</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/icmp-tunnel-server</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/kerberoasting-cipher-downgrade</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/kerberoasting-spn-sweep</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/kerberoasting-targeted-weak-cipher-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/kerberos-account-scan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/kerberos-brute-sweep</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/m365-suspicious-copilot-for-m365-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/m365-suspicious-transport-rule</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/malware-update</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/multi-home-fronted-tunnel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-attacker-tool-ruler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-disabling-of-security-tools</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-dll-hijacking-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-ediscovery-exfil</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-exfiltration-before-termination</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-external-teams-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-internal-spearphishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-log-disabling-attempt</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-malware-stage-upload</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-power-automate-http-flow-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-risky-exchange-operation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspect-ediscovery-usage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspect-power-automate-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-compliance-search</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-download-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-exchange-transport-rule</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-mail-forwarding</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-mailbox-manipulation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-mailbox-rule-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-power-automate-flow-creation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-sharepoint-operation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-sharing-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-suspicious-teams-application</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/o365-unusual-ediscovery-search</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/outbound-dos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/outbound-port-sweep</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/peer-to-peer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-account-on-host</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-host</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-service-from-host</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-service-insider</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/privilege-anomaly-unusual-trio</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/ransomware-file-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/rdp-recon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/rpc-recon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/rpc-targeted-recon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/shell-knocker-client</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/shell-knocker-server</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/smash-and-grab</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/smb-account-scan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/smb-brute-force</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/sql-injection-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/stage-loader</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/stealth-http-post</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspect-dns-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspect-domain-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspect-http-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspect-https-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspect-tcp-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-active-directory-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-admin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-http</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-ldap-query</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-port-scan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-port-sweep</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-relay</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-remote-desktop-protocol</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/suspicious-remote-execution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/threat-intelligence-match</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/tor-activity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/detections/vectra-threat-intelligence-match</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/account-takeover</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/advanced-persistent-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/data-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/nation-state-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/solutions/attack-types/supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/tours/demo-aws-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/tours/demo-hybrid-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/tours/demo-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/tours/demo-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/asia-partner-summit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/blue-team-workshop-emea</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/blue-team-workshop-modern-network-attacks-singapore</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/blue-team-workshop-modern-network-attacks-thailand</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/blue-team-workshop-modern-network-attacks-vietnam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/the-attack-stockholm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/event/threat-briefing-the-post-login-kill-chain-feb-18</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/2023-state-of-threat-detection-the-defenders-dilemma</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/a-soc-that-stopped-attackers-in-their-tracks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/apj-outsmart-the-modern-hybrid-cyber-attacker-with-vectra-ai-and-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/attack-signal-intelligence-breaking-out-of-the-spiral-of-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/attackers-living-off-the-land-with-microsoft-copilot-for-m365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/automating-threat-detection-validation-with-powershell-empire-and-havoc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/blue-team-workshop-advanced-investigation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/blue-team-workshop-france</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/blue-team-workshop-italiano</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/blue-team-workshop-june18-ams</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/blue-team-workshop-modern-network-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/btw-tw-feb6</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/closing-microsoft-security-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/cloud-bridge-to-cloud-breach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/combating-non-stop-cyber-attacks-on-microsoft-going-beyond-the-basics-in-azure-and-hybrid-cloud-security-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/combining-ai-threat-detection-with-the-microsoft-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/combining-ai-threat-detection-with-the-microsoft-ecosystem-on-demand</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/dora-le-implicazioni-tecniche</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/endpoint-evasion-are-attackers-evading-your-endpoint-protection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/enhance-your-threat-detection-strategy-with-metadata-insights</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/from-credential-theft-to-ransomware-deployment</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/from-emerging-to-essential-the-rise-of-network-detection-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/gartner-magic-quadrant-leader</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/how-prepared-are-you-for-an-identity-based-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/how-sanofi-a-global-pharmaceutical-company-stopped-a-cyberattack-with-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/how-to-counter-mitre-attack-with-mitre-d3fend</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/how-to-survive-ransomware-season</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/identity-attacks-are-winning-here-is-the-gap-you-are-missing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/into-the-storm-how-midnight-blizzard-attacks-modern-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/introduction-to-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/live-demo-power-the-next-generation-soc-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/maximizing-security-with-vectra-mxdr-vectra-ai-platform-and-edr-technology</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/microsoft-azure-unpacking-real-world-hybrid-compromises-and-attack-techniques-targeting-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/microsoft-azure-verteidigung-gegen-moderne-hybride-angriffe-und-bedrohungen-in-der-cloud-mit-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/mind-your-attack-gaps-across-identity-network-cloud-and-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/modernizacion-del-soc-con-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/mongobleed-in-the-wild</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/outpacing-hybrid-cloud-attackers-with-vectra-ndr-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/outsmart-the-modern-hybrid-cyber-attacker-with-vectra-ai-and-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/ransomware-attacks-using-identity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/rethinking-siem-evolving-threat-detection-in-the-modern-security-stack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/safeguarding-critical-national-infrastructure-using-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/sans-threat-hunting-in-network-telemetry</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/securing-copilot-for-m365-learn-how-to-detect-investigate-and-stop-abuse</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/security-testing-on-multi-cloud-attacks-using-open-source-tool-halberd</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/the-defenders-dilemma-challenging-the-status-quo-in-the-2024-state-of-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/threat-briefing-scattered-spider-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/transforming-socs-with-ai-agents-and-no-code-automation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/unlock-the-power-of-vectra-ai-and-the-new-suricata-signature-engine</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/unmasking-encrypted-attacks-through-ai-driven-c2-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/unveiling-the-threat-defending-against-mfa-bypass-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-ai-attack-labs-understanding-modern-attacks-episode-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-ai-attack-labs-understanding-modern-attacks-episode-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-ai-attack-labs-understanding-modern-attacks-episode-3</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-ai-btw-kaohsiung-may13</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-fusion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/vectra-mxdr-and-microsoft-defender-maximize-soc-efficiency-and-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/webinars/why-ndr-is-becoming-essential-in-modern-security-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/8base</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/agrius</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/akira</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/alphv-blackcat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/apt1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/apt29</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/apt33</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/apt35</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/apt42</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/arkana-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/bianlian</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/blackbasta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/blacksuit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/brain-cipher</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/cicada3301</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/cl0p</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/conti</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/crimson-collective</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/eraleig-apt73-bashe</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/flax-typhoon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/funksec</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/ghost</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/global-group</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/hunters</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/inc-ransom</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/lapsus</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/lazarus</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/lockbit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/medusa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/muddywater</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/play</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/pryx</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/qilin</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/ra-group-raworld</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/ransomhub</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/rhysida</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/salt-typhoon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/scattered-spider</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/shinyhunters</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/sinobi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/unc3886</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/threat-actors/unc5221</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2020-spotlight-report-on-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2020-spotlight-report-on-privileged-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2020-vectra-attacker-behavior-industry-report</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2023-state-of-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2023-state-of-threat-detection-in-netherlands</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2024-state-of-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2024-threat-detection-and-response-efficiency-report</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/2026-state-of-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/3-reasons-your-edr-needs-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/5-reasons-edr-is-not-enough</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/8-different-ways-attackers-can-bypass-prevention-and-endpoint-protection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/a-breakdown-of-emerging-hybrid-attacker-methods</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/addressing-insecure-by-design-flaws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/advens-achieves-100x-investigation-workload-reduction-and-exposes-compliance-risks-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ai-driven-prioritization-for-your-xdr-strategy</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ai-driven-security-stops-hybrid-and-multicloud-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ai-enabled-threat-discovery-and-the-post-compromise-detection-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ai-in-xdr-what-it-means-and-where-it-fits</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/american-university</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/appliance-sensor-specifications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/applying-ai-to-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ardagh-group</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/are-you-feeling-underwhelmed-by-your-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/arm-your-soc-with-vectra-ai-instant-investigations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/artificial-intelligence-in-cyber-let-the-buyer-beware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/attack-exposure-gap-analysis-where-attackers-expose-beyond-edr-and-firewall-controls</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/attack-signal-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/attacks-as-a-service-with-the-derf</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/australian-private-health-fund</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/axios-supply-chain-compromise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/bad-guys-and-the-attack-framework</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/benefits-of-zero-trust-collaboration-demystifying-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/best-practices-guide-how-to-test-an-ndr-solution-effectively</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/best-practices-to-address-tool-sprawl-for-your-ndr-and-ids-solutions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/between-a-log-and-a-hard-place-misadventures-in-azure-logs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/blackstone</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/bolton-nhs-secures-patient-data-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/by-the-numbers-ai-in-the-soc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cdm-phase-3-defend</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cis-critical-security-controls</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/close-microsoft-threat-detection-investigation-response-gaps-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cloud-native-ransomware-how-attacks-on-availability-leverage-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cloud-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/comparing-csp-managed-machine-identities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/competitive-landscape-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/compliance-vectra-detect-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/compliance-vectra-detect-office-365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/copilot-for-m365-threat-briefing-part-1</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/copilot-for-m365-threat-briefing-part-2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/countering-the-unc3886-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/creating-your-custom-soc-upgrade</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/credential-stuffing-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/crowdstrike-and-vectra-integration-supports-the-soc-visibility-triad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cyber-threat-intelligence-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cybersecurity-compliance-standards-and-regulations-for-optimal-outcomes</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cybersecurity-maturity-model-certification</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/cyberthreats-enforcement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/defense-federal-acquisition-regulation-supplement</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/demo-vectra-ai-servicenow-integration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/detection-beyond-the-endpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ditch-the-powerpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/dz-bank</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ebook-a-new-threat-detection-model-that-closes-the-cybersecurity-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/effective-hybrid-attack-defense</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/elevating-defensive-cyber-operations-dco-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/endpoint-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/esg-report-the-evolving-role-of-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/esg-xdr-open-architecture</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/exposure-assessment-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/federal-financial-institutions-examination-council</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/fenaco</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/financial-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/fireside-chat-navigating-cybersecurity-in-tribal-communities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/five-ways-vectra-ai-ndr-supports-doge</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/fortune-500-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/fortune-500-financial-services-company-goes-beyond-the-basics-to-secure-microsoft-environment-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/from-detection-to-decision-how-vectra-ai-reduces-noise-and-provides-comprehensive-coverage-for-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gartner-hype-cycle-for-security-operations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gartner-redefining-ndr-from-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gartner-soc-model-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gartner-use-ndr-in-hybrid-networks-to-improve-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/genai-part-1-history-of-llm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/genai-part-2-what-are-llms</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/genai-part-3-how-llms-operate</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/genai-part-4-how-attackers-use-llms</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/genai-part-5-defenders-using-llms</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/general-data-protection-regulation-gdpr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/generative-ai-driven-attacks-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gigaom-itdr-radar-report-2025</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gigaom-radar-for-network-detection-and-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/global-2000-retail-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/global-security-leaders-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/globe-telecom-cuts-through-99-of-the-noise-in-one-year-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gmmh</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/goodwood-estate-strengthens-business-continuity-securely-with-gigamon-and-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/gov-authority-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/greenhill</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/halberd-open-source-multi-cloud-security-testing-tool</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/healthcare-organization-strengthens-microsoft-security-with-better-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hear-from-the-former-deputy-secretary-of-the-u-s-dept-of-homeland-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-advanced-investigation-streamlines-your-threat-investigation-approach</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-alj-stops-cyber-attacks-with-ease-and-reduces-noise-by-90</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-coop-saved-55-000-hours-investigating-threats-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-cyberattackers-evade-threat-signatures</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-federal-agencies-see-threats-and-stop-breaches</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-federal-agencies-use-zero-trust-ai-and-ml-to-combat-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-financial-institutions-can-stop-cyberattacks-in-their-tracks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-iris-imagerie-secures-more-than-1-000-ips-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-manufacturing-organizations-can-reduce-business-risk-from-cyberattackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-medical-device-manufacturers-can-safeguard-vital-ip</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-pharmaceutical-companies-can-protect-valuable-ip</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-this-government-authority-slashes-alert-fatigue-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-this-manufacturing-company-stopped-not-one-but-two-attacks-with-vectra-mdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-achieve-autonomous-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-achieve-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-detect-malicious-covert-communications</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-improve-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-make-better-informed-decisions-using-network-data</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-operationalize-ndr-with-ai-driven-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-protect-oil-and-gas-from-cyberthreats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-succeed-in-hunting-cyberattackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-to-use-ai-for-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-vectra-ai-enables-dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/how-verifone-secures-billions-in-transactions-globally-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hybrid-attack-journey</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hybrid-attackers-move-beyond-the-endpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hybrid-cloud-attacks-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hybrid-enterprises-and-the-spiral-of-more</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/hydro-ottawa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/idc-the-business-value-of-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/identifying-cyberattacker-behaviors-and-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/idps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/incident-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/inside-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-and-sentinel-one</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-amazon-security-lake</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-carbon-black</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-check-point</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-chronicle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-cpacket</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-cybereason</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-demisto</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-fireeye</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-forescout</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-fortinet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-juniper</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-keysight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-micro-focus-arcsight</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-microsoft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-nozomi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-pentera</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-profitap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-servicenow</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-siemplify</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-splunk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-swimlane</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-vmware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/integrating-vectra-ai-with-zscaler</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/international-private-healthcare-group</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/is-your-soc-hybrid-attack-ready</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/jp-kintetsu-enhancing-edr-with-vectra-ai-for-comprehensive-network-visibility</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/jp-latest-ndr-market-in-japan-2024</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/jp-ndr-has-evolved-so-far-vectra-ai-explained-comic</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/jp-threat-detection-and-response-in-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/jp-vectra-ai-platform-roi-building-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/key-findings-from-the-gartner-market-guide-for-managed-detection-and-response-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/key-findings-from-the-gartner-market-guide-for-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/key-security-pillars-for-zero-trust-compliance</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/kintetsu-department-store-closing-edr-gaps-with-vectra-ai-to-achieve-comprehensive-network-monitoring</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/kpmg-and-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/kpmg-effective-security-observability-with-attack-signal-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/living-off-the-land-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/luxgen-reduces-workload-with-vectra-ai-mdr-achieving-95-3-fewer-escalations</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/maad-af-microsoft-identity-security-testing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/maire-turns-the-tables-on-unknown-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/managed-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/manufacturing-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/meaningful-ai-for-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/medical-technology-company-drives-faster-smarter-threat-detection-investigation-and-response-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/meeting-the-dod-zero-trust-capabilities-activities-mapping</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/metadata-attributes-and-their-descriptions</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mfa-bypass-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mfa-bypass-via-phishing-how-attackers-exploit-weaknesses-and-what-you-can-do</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/midnight-blizzard-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mind-your-attack-gaps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mind-your-attack-gaps-across-identity-network-cloud-and-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mitigate-the-risk-from-privilege-identity-attacks-with-the-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mleasing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/mpac</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ndr-is-essential-to-stopping-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/network-threat-detection-and-response-for-amazon-web-services-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/network-traffic-analysis</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/new-york-state-department-of-financial-services-nysdfs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/nis2</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/nis2-compliance-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/nissho-electronics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/northside-hospital</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/not-everything-is-as-it-siems</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/online-gaming-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/palo-alto-cve-2024-3400-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/passing-the-pen-test</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/payment-card-industry-data-security-standard-pci-dss</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/pcap-packet-capture</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/pennine-care</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/pharmaceutical-company-post-incident-report</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/phishing-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/platform-features-and-benefits</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/post-incident-report-stopping-a-ransomop-before-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/private-research-institution</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/professional-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/protect-your-ot-environment-with-vectra-ndr-and-vectra-match</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/protect-your-ot-with-the-vectra-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/protecting-high-frequency-trading-hft-without-disrupting-business-with-network-detection-and-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/protecting-higher-education-networks-from-cyberthreats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/protecting-patient-health-and-privacy-from-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/pt-bank-hibank-indonesia-cuts-detection-and-response-time-by-nearly-50-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/ransomware-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/rcs-bolsters-detection-beyond-the-endpoint-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/real-time-container-level-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/recommendations-when-evaluating-ndr-for-iaas</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/reduce-critical-infrastructure-risk</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/reduce-siem-cost</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/remote-work</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/reporting-on-the-vectra-ai-platform</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/research-report-on-identity-threat-detection-and-response-itdr-requirements</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/rossmann</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sanofi</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sans-ransomware-impact-on-large-global-enterprises</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sans-state-of-cloud-security-in-the-enterprise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/scattered-spider-threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/schaefer-kalk-overcame-their-edr-visibility-gap</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/secops-stop-aws-account-compromise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/secure-your-business-with-powerful-cyber-defense-solutions-from-dell-and-vectra</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/securing-critical-national-infrastructure-with-network-detection-and-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/securing-hybrid-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/securing-iaas-and-paas</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/securities-exchange</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/security-leaders-research-workforce-survey</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sfs-group-eliminates-99-98-of-unnecessary-alerts-for-sharper-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/siem-vs-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/soboba-band-of-luiseno-indians-uses-vectra-to-identify-threats-for-their-government-and-casino</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/soc-efficiency-benchmark</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/soc-visibilty-triad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/spear-phishing-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/specialty-chemicals-and-advanced-materials</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sports-data-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/state-of-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stop-cyberattacks-on-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stop-identity-based-attacks-with-privilege-account-analytics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stop-ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stop-the-next-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stop-the-next-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/stories-from-the-soc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/sunburst-solarwinds-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/supporting-the-federal-governments-zero-trust-strategy-with-data-science-and-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/tag-security-annual-2023-special-reprint-edition</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/tallink-grupp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/telecommunications-company-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/telematics-company</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/texas-am</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-ai-behind-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-application-of-ai-vs-hybrid-attackers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-case-for-network-detection-and-response-ndr-as-a-critical-cybersecurity-tool</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-dark-side-of-darktrace</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-edag-group</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-evolution-of-ai-weaponization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-harris-center-for-mental-health-and-idd-rebuilds-security-operations-after-ransomware-attack-with-vectra-mdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-rising-hard-and-soft-costs-of-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-role-of-network-visibility-in-protecting-modern-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-science-behind-loading-screens-and-the-user-experience</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-uphill-battle-in-front-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-value-of-vectra-mxdr-in-numbers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/the-very-group</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-brute-ratel-brc4</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-ev-certificates</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-how-black-basta-bypassed-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-inside-the-genai-attack-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-the-npm-exploit-that-turned-into-a-self-spreading-worm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-briefing-why-attackers-target-aws-bedrock</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-detection-and-response-in-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-detection-without-decryption</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/threat-hunting-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/top-10-detections-across-education</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/top-10-detections-across-financial-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/top-10-detections-across-healthcare</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/top-10-detections-across-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/tri-state</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/true-digital-group-uses-vectra-ais-attack-signal-intelligence-to-prioritize-critical-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/under-armour</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/understanding-vectra-ai-detections</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/university-healthcare-system</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/unlock-the-power-of-vectra-ai-and-the-new-suricata-signature-engine</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/using-ai-to-detect-and-stop-lateral-movement-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/using-network-detection-and-response-ndr-for-microsegmentation-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/validated-user-review</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/value-of-the-vectra-ai-platform-for-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/van-gogh-museum-achieves-84-true-positive-rate-across-azure-identity-and-data-centers-with-vectra-ai</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-2024-spark-matrix-leader</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-analyst-experience-mxdr-and-rux-improves-upon-mdr-and-qux</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-crowdstrike-falcon-insight-xdr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-crowdstrike-falcon-next-gen-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-gigamon-integration</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-microsoft-hyper-v</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-nist</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-sentinelone-autonomous-multi-layered-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-superna</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-coverage</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-coverage-mapping-to-nist-framework</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-driven-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-driven-prioritization</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-fusion</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-gives-beauty-industry-retailer-a-cybersecurity-makeover</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-global-view-centralize-threat-detection-and-response-management-for-the-soc</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-leader-in-idc-marketscape-2024-for-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-mdr-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-microsoft-soc-triad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-platform-roi-building-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-premium-support-proactive-system-health-monitoring-and-remediation-service</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-replace-ids-ips</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-response-capabilities</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-services</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-shield-for-microsoft</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-signal-vs-darktrace-ai-noise</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-briefing-blackbasta</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-briefing-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-briefing-salt-typhoon</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-briefing-shodan-fofa</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-detection-and-response-for-azure</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-detection-and-response-integrates-with-microsoft-defender-for-endpoint</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-threat-detection-and-response-integrates-with-microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ai-zscaler-secure-zero-trust-access</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ais-blue-team-workshop-btw</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ais-purple-team-workshop-ptw</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-and-crowdstrike-integration-extend-visibility-beyond-endpoints</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-cdr-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-cdr-for-aws-with-aws-guardduty</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-cdr-for-m365</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-compliance-mitre-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-detect-for-aws</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-idr-for-microsoft-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-investigate-see-the-full-story-behind-every-threat</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-managed-extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-match-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-match-technology-overview</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-mdr-premium</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-ndr-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-platform-getting-started-guide</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-recall-overview</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-stream-overview</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-technical-support</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/vectra-vs-cisco-stealthwatch</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/voice-of-the-vectra-ai-customer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/wellington-college</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/what-federal-agencies-can-do-to-secure-cloud-deployments-with-ai-and-ml</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/what-to-demand-from-network-detection-and-response-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/whats-the-difference-between-siem-and-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/when-a-siem-just-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/when-network-perimeter-security-fails</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/where-signatures-and-simple-ml-fall-short-detecting-a-novel-new-attacker</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/why-ecosystem-integrations-matter-in-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/why-security-teams-are-replacing-ids-and-ips-with-ndr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/why-spin-your-wheels-on-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/why-the-hype-for-a-next-gen-siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/wp-best-practices-in-protecting-modern-networks-from-modern-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resources/zero-day-exploit-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/attack-anatomies</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/best-practices</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/datasheets</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/ebooks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/fact-sheet</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/industry-research</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/infographics</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/technology-overviews</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/videos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/resource-type/white-papers</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/account-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/brute-force</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/business-email-compromise-bec</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/cloud-misconfigurations-exploit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/cookie-hijacking</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/cryptomining</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/denial-of-service-dos</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/endpoint-vulnerability-exploit</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/kerberoasting</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/ldap-query</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/password-spraying</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/peer-to-peer</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/phishing</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/port-scan</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/ransomware</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/remote-desktop-protocol-rdp-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/remote-procedure-call-rpc-attacks</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/saas-file-sharing-abuse</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/smb-scanning</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/sql-injection</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/token-exploitation-attack</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/traffic-mirroring</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/attack-techniques/tunneling</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/casb</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/cnapp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/cspm</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/cwpp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/edr</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/email-security</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/epp</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/firewalls</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/iam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/idps</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/pam</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/sase</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/siem</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/soar</loc>
    </url>
    <url>
        <loc>https://www.vectra.ai/modern-attack/security-gap/ueba</loc>
    </url>
</urlset>